The act of someone gaining unauthorized access by following an authorized person.
What is tailgating in security terms?
Laptop, confidential files, keys, badge, drawers.
What items should you lock before leaving?
Press Windows + L to lock the screen.
Shortcut to lock your computer (Windows)?
Anyone not employed or contracted by the company, including clients and vendors.
Who qualifies as a visitor?
Report it immediately to security or your manager and get the badge deactivated.
What should you do if you lose your badge?
It allows unauthorized people to enter secure areas, risking data theft or sabotage.
Why is tailgating dangerous in a workplace?
A policy requiring desks to be clear of sensitive material when not in use.
What is a clean desk policy?
A device that physically tethers a laptop to a desk to deter theft.
What is a laptop lock/cable?
A visible, time-stamped visitor badge.
What should a visitor wear while onsite?
Notify IT/security so they can check it for malware or ownership.
Who should you notify if you find a USB stick?
Use badge readers with anti-tailgating alarms or politely stop and question unknown followers.
One way to prevent tailgating?
They secure sensitive printed material and reduce risk of theft or unauthorized access.
Why are file cabinets with locks important?
It protects data even if the device is stolen.
Why is full disk encryption important?
To ensure the visitor stays only in permitted areas and doesn't access restricted data.
What is the purpose of visitor escorting?
Prevents malicious use, ensures asset control, and helps in breach investigations.
Why is reporting found hardware important?
Politely stop them and direct them to register or badge in properly.
What should you do if someone tries to follow you in?
Immediately when stepping away from your desk, even briefly.
When should a screen be locked?
Take it with you or lock it with a cable; avoid leaving it unattended.
What should you do before leaving your laptop at a café?
Name, company, purpose, time of entry/exit, person being visited.
What should be included in a visitor log?
Use a chain of custody log, and never return unless verified with ID or ownership proof.
What is a secure way to return a lost device to its owner?
They wait near entrances during peak hours, blending in with crowds to slip inside unnoticed.
How do attackers exploit tailgating during busy office hours?
Unauthorized access to sensitive information, compliance violations, or data leaks.
What’s the risk of not locking up confidential documents?
Avoid public Wi-Fi, use VPN, don’t leave it in hotel rooms unattended, and encrypt data.
What’s a good policy for business travel with a laptop?
Wandering, asking to use unattended devices, taking photos of whiteboards or screens.
What are red flags in visitor behavior?
Asset tagging, reminders, policy enforcement, and designated drop zones.
How can companies reduce lost equipment incidents?