What is tailgating

Last updated: April 1, 2026

Quick Answer: In technology and physical security, tailgating is the unauthorized access into restricted areas or secure facilities by following closely behind someone with legitimate access without providing proper authentication.

Key Facts

Understanding Tailgating in Security

Tailgating is a physical security breach technique where an unauthorized person gains entry to a restricted area by closely following an authorized individual through a secure door, gate, or checkpoint. The unauthorized person avoids providing credentials or authentication by relying on the open door created by the authorized person. This method bypasses technological security measures by exploiting human behavior and social courtesy.

How Tailgating Works

Tailgating succeeds through social engineering and psychological manipulation. A tailgater might dress appropriately for the environment, carry folders or equipment to appear legitimate, or engage in friendly conversation to seem like they belong. When approaching a secured entrance, the tailgater positions themselves closely behind an authorized person, timing their entry to slip through before the door closes. Most people instinctively hold doors open for others, making them unlikely to challenge someone who appears confident and professional.

Common Tailgating Scenarios

Tailgating occurs frequently in corporate environments, particularly in office buildings with card-access doors. An unauthorized person might follow employees into a workplace during busy periods when entry volume makes individual verification difficult. In data centers and laboratories, tailgating represents a critical vulnerability as it can provide access to sensitive systems, research materials, or confidential information. Healthcare facilities, government buildings, and financial institutions are particularly vulnerable due to the sensitive nature of information stored within these locations.

Security Vulnerabilities and Risks

Tailgating represents a significant gap in facility security because it bypasses technological controls like key cards and biometric systems. An intruder gaining physical access to restricted areas can potentially steal proprietary information, install malware on computer systems, sabotage equipment, or compromise sensitive materials. The difficulty in detecting tailgating—particularly in large facilities with high foot traffic—makes it an attractive method for social engineers and insider threats.

Prevention and Countermeasures

Technological controls include mantrap doors that allow only one person to pass per credential swipe, turnstiles that physically prevent tailgating, and security cameras positioned at entry points. Procedural countermeasures involve training employees to challenge unfamiliar individuals, implementing visitor sign-in requirements, and establishing clear protocols for escorting guests. Behavioral solutions include security awareness programs teaching employees about tailgating risks and encouraging them to not prop open secure doors or hold them open for unverified persons.

Related Questions

What is social engineering in security?

Social engineering is a technique that manipulates people into revealing confidential information or performing actions that compromise security. Tailgating is one example of social engineering that exploits human psychology and social courtesy to gain unauthorized physical access.

What is the difference between tailgating and piggybacking?

Tailgating and piggybacking are similar terms often used interchangeably in security contexts, both referring to unauthorized entry by following an authorized person. Some sources distinguish piggybacking as requiring the authorized person's knowledge or assistance, while tailgating involves unauthorized following without the person's awareness.

How can I prevent tailgating in my workplace?

Prevent tailgating by implementing mantrap doors, security cameras at entry points, employee training on security protocols, visitor verification systems, and creating a culture where challenging unfamiliar individuals is encouraged. Regular security audits can identify vulnerabilities in access control procedures.

Sources

  1. Wikipedia - Tailgating (Security) CC-BY-SA-4.0
  2. National Institute of Standards and Technology - Cybersecurity Guidance Public Domain