Tailgating
Locking Up
Laptop Security
Visitor Management
Lost & Found
100

The act of someone gaining unauthorized access by following an authorized person.

What is tailgating in security terms?

100

Laptop, confidential files, keys, badge, drawers.

What items should you lock before leaving?

100

Press Windows + L to lock the screen.

Shortcut to lock your computer (Windows)?

100

Anyone not employed or contracted by the company, including clients and vendors.

Who qualifies as a visitor?

100

Report it immediately to security or your manager and get the badge deactivated.

What should you do if you lose your badge?

200

It allows unauthorized people to enter secure areas, risking data theft or sabotage.

Why is tailgating dangerous in a workplace?

200

A policy requiring desks to be clear of sensitive material when not in use.

What is a clean desk policy?

200

A device that physically tethers a laptop to a desk to deter theft.

What is a laptop lock/cable?

200

A visible, time-stamped visitor badge.

What should a visitor wear while onsite?

200

Notify IT/security so they can check it for malware or ownership.

Who should you notify if you find a USB stick?

300

Use badge readers with anti-tailgating alarms or politely stop and question unknown followers.

One way to prevent tailgating?

300

They secure sensitive printed material and reduce risk of theft or unauthorized access.

Why are file cabinets with locks important?

300

It protects data even if the device is stolen.

Why is full disk encryption important?

300

To ensure the visitor stays only in permitted areas and doesn't access restricted data.

What is the purpose of visitor escorting?

300

Prevents malicious use, ensures asset control, and helps in breach investigations.

Why is reporting found hardware important?

400

Politely stop them and direct them to register or badge in properly.

What should you do if someone tries to follow you in?

400

Immediately when stepping away from your desk, even briefly.

When should a screen be locked?

400

Take it with you or lock it with a cable; avoid leaving it unattended.

What should you do before leaving your laptop at a café?

400

Name, company, purpose, time of entry/exit, person being visited.

What should be included in a visitor log?

400

Use a chain of custody log, and never return unless verified with ID or ownership proof.

What is a secure way to return a lost device to its owner?

500

They wait near entrances during peak hours, blending in with crowds to slip inside unnoticed.

How do attackers exploit tailgating during busy office hours?

500

Unauthorized access to sensitive information, compliance violations, or data leaks.

What’s the risk of not locking up confidential documents?

500

Avoid public Wi-Fi, use VPN, don’t leave it in hotel rooms unattended, and encrypt data.

What’s a good policy for business travel with a laptop?

500

Wandering, asking to use unattended devices, taking photos of whiteboards or screens.

What are red flags in visitor behavior?

500

Asset tagging, reminders, policy enforcement, and designated drop zones.

How can companies reduce lost equipment incidents?

M
e
n
u