|
National KE-CIRT/CC Cybersecurity Best Practice Guide of the Week
TAILGATING |
|
|
In This Issue:
|
Just as a driver can tailgate another driver’s car by following too closely, in the security sense, tailgating is one of the most common and innocent security breaches – an employee opening a door and holding it open for others, visitors without badges, or the passive acceptance of a uniformed worker. Tailgating is actually a form of social engineering, whereby someone who is not authorized to enter a particular area does so by following closely behind someone who is authorized.
Tailgating can also come about in the print area once one leaves the printer unlocked to auto lock, stepping out of the office and leaving the computer to auto lock. People can gain access to these items before they lock and can use them for malice. BUILD THE CULTURE
Have the above security tips in mind as you supervise children as they use their mobile devices. Report any cybercrime incident/activity to incidents@ke-cirt.go.ke. / www.ke-cirt.go.ke |
|