National KE-CIRT/CC Cybersecurity Best Practice Guide of the Week

 

TAILGATING

 

In This Issue:

*        Tailgating

 

 

 

 

 

 

 

 

 

 

 

 

 

Just as a driver can tailgate another driver’s car by following too closely, in the security sense, tailgating is one of the most common and innocent security breaches – an employee opening a door and holding it open for others, visitors without badges, or the passive acceptance of a uniformed worker. Tailgating is actually a form of social engineering, whereby someone who is not authorized to enter a particular area does so by following closely behind someone who is authorized.

 

Tailgating can also come about in the print area once one leaves the printer unlocked to auto lock, stepping out of the office and leaving the computer to auto lock. People can gain access to these items before they lock and can use them for malice.

BUILD THE CULTURE
You can install the most advanced security system on the market, but your security measures will fail if your occupants aren’t on board.The simplest way to deal with tailgating is to build a culture of the challenge. Lock any device that is meant to be locked after use and challenge unfamiliar faces.

 

 

Have the above security tips in mind as you supervise children as they use their mobile devices. Report any cybercrime incident/activity to  incidents@ke-cirt.go.ke. / www.ke-cirt.go.ke