What is tailgating
Last updated: April 1, 2026
Key Facts
- Tailgating exploits human psychology and social norms, as people naturally tend to hold doors open for others appearing to belong in the facility
- It is considered a significant physical security vulnerability affecting office buildings, data centers, laboratories, and other restricted access facilities
- Social engineering techniques are frequently combined with tailgating to increase success rates by creating a false sense of legitimacy
- Security countermeasures against tailgating include mantrap doors, turnstiles, access control systems, and security personnel monitoring entry points
- Tailgating is a serious breach of facility security protocols and can result in unauthorized access to confidential information or sensitive systems
Understanding Tailgating in Security
Tailgating is a physical security breach technique where an unauthorized person gains entry to a restricted area by closely following an authorized individual through a secure door, gate, or checkpoint. The unauthorized person avoids providing credentials or authentication by relying on the open door created by the authorized person. This method bypasses technological security measures by exploiting human behavior and social courtesy.
How Tailgating Works
Tailgating succeeds through social engineering and psychological manipulation. A tailgater might dress appropriately for the environment, carry folders or equipment to appear legitimate, or engage in friendly conversation to seem like they belong. When approaching a secured entrance, the tailgater positions themselves closely behind an authorized person, timing their entry to slip through before the door closes. Most people instinctively hold doors open for others, making them unlikely to challenge someone who appears confident and professional.
Common Tailgating Scenarios
Tailgating occurs frequently in corporate environments, particularly in office buildings with card-access doors. An unauthorized person might follow employees into a workplace during busy periods when entry volume makes individual verification difficult. In data centers and laboratories, tailgating represents a critical vulnerability as it can provide access to sensitive systems, research materials, or confidential information. Healthcare facilities, government buildings, and financial institutions are particularly vulnerable due to the sensitive nature of information stored within these locations.
Security Vulnerabilities and Risks
Tailgating represents a significant gap in facility security because it bypasses technological controls like key cards and biometric systems. An intruder gaining physical access to restricted areas can potentially steal proprietary information, install malware on computer systems, sabotage equipment, or compromise sensitive materials. The difficulty in detecting tailgating—particularly in large facilities with high foot traffic—makes it an attractive method for social engineers and insider threats.
Prevention and Countermeasures
Technological controls include mantrap doors that allow only one person to pass per credential swipe, turnstiles that physically prevent tailgating, and security cameras positioned at entry points. Procedural countermeasures involve training employees to challenge unfamiliar individuals, implementing visitor sign-in requirements, and establishing clear protocols for escorting guests. Behavioral solutions include security awareness programs teaching employees about tailgating risks and encouraging them to not prop open secure doors or hold them open for unverified persons.
Related Questions
What is social engineering in security?
Social engineering is a technique that manipulates people into revealing confidential information or performing actions that compromise security. Tailgating is one example of social engineering that exploits human psychology and social courtesy to gain unauthorized physical access.
What is the difference between tailgating and piggybacking?
Tailgating and piggybacking are similar terms often used interchangeably in security contexts, both referring to unauthorized entry by following an authorized person. Some sources distinguish piggybacking as requiring the authorized person's knowledge or assistance, while tailgating involves unauthorized following without the person's awareness.
How can I prevent tailgating in my workplace?
Prevent tailgating by implementing mantrap doors, security cameras at entry points, employee training on security protocols, visitor verification systems, and creating a culture where challenging unfamiliar individuals is encouraged. Regular security audits can identify vulnerabilities in access control procedures.
More What Is in Technology
- What Is Machine LearningMachine learning is a subset of artificial intelligence where computer systems learn and improve fro…
- What is agentic aiAgentic AI refers to artificial intelligence systems that can autonomously perceive their environmen…
- What is an ai agentAn AI agent is a software system that perceives its environment, analyzes information, and autonomou…
- What is au pairAn au pair is a young foreign national who lives with a family and provides childcare in exchange fo…
- What is aya universe dubaiAya Universe Dubai is an immersive digital art and technology experience venue in Dubai featuring AI…
- What is azelaic acidAzelaic acid is a naturally occurring dicarboxylic acid found in grains like barley and rye, commonl…
- What is bcc in emailBCC (Blind Carbon Copy) is an email feature that allows you to send messages to multiple recipients …
- What is bhai doojBhai Dooj is a Hindu festival celebrating the bond between brothers and sisters, typically observed …
- What is bjj trainingBJJ training refers to structured sessions where practitioners learn and practice Brazilian Jiu-Jits…
- What is bkk airportBKK is the IATA airport code for Suvarnabhumi Airport, the primary international airport serving Ban…
- What is bna airportBNA is the airport code for Nashville International Airport, located in Nashville, Tennessee. It's t…
- What is bnb chainBNB Chain is a blockchain network created by Binance that supports smart contracts and decentralized…
- What is brainrotBrainrot is internet slang describing cognitive decline or mental degradation caused by excessive co…
- What is bvs in easypaisaBVS in Easypaisa typically refers to a Business Verification Service that authenticates and verifies…
- What is cc in emailCC in email stands for carbon copy, a feature that sends a copy of your message to additional recipi…
- What is chainsaw man aboutChainsaw Man is a Japanese manga series about Denji, a poor young man who becomes a hybrid demon hun…
- What is cloud computingCloud computing is the delivery of computing resources including servers, storage, databases, and so…
- What is cloudflareCloudflare is a cloud infrastructure and web performance company that provides content delivery, sec…
- What is claude aiClaude AI is a large language model powered by transformer neural networks, trained on diverse text …
- What is cqb trainingCQB training, or Close Quarters Battle training, is specialized military and law enforcement instruc…
Also in Technology
- How Does GPS Work
- Difference Between HTTP and HTTPS
- How To Learn Programming
- difference between ai and ml
- How to make my website secure
- Is it safe to download from internet archive
- How Does WiFi Work
- Does the ‘click’ ever happen when learning programming
- How to code any project before AI
- How does ai work
- How does ai use water
- When was ai invented
- How do I deal with wasting my degree
- How does claude code work
- How does file metadata work? .mp3
More "What Is" Questions
Trending on WhatAnswer
Browse by Topic
Browse by Question Type
Sources
- Wikipedia - Tailgating (Security) CC-BY-SA-4.0
- National Institute of Standards and Technology - Cybersecurity Guidance Public Domain