IsThisAScam
HjemBlogPriserOm ossHistoryAPIExtension
Upgrade
NO
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
Produkt
  • Home
  • Blog
  • Pricing
  • Om oss
  • History
  • Chrome Extension
Resources
  • Developers
  • API-dokumentasjon
  • Phishing brief
  • Romance scams
  • Tech support
  • Crypto scams
  • Apple scams
  • PayPal scams
Juridisk
  • Personvernpolicy
  • Vilkår for bruk
  • product@zeplik.com

© 2026 Zeplik, Inc. Alle rettigheter forbeholdt.

Built for the calm, the cautious, and the careful.

Home/Glossary/Tailgating
Glossary · Social Engineering

What Is Tailgating?

A physical security breach where an unauthorized person follows an authorized individual through a secured entrance or checkpoint, exploiting politeness and social norms to bypass access controls.

Quick Definition

A physical security breach where an unauthorized person follows an authorized individual through a secured entrance or checkpoint, exploiting politeness and social norms to bypass access controls.

Think you've been targeted?

Paste the suspicious content here for an instant analysis.

No signup · 6 detection layers · Results in seconds · Cmd+Enter

01Tailgating explained.

Tailgating, also called piggybacking, is one of the simplest yet most effective social engineering techniques. It exploits the basic human instinct to hold doors open for others. An attacker simply waits near a secured entrance and follows an authorized person through.

This technique is surprisingly effective in corporate environments. Most people feel awkward challenging someone who appears to belong, especially if they're carrying boxes, wearing a company lanyard, or chatting casually on a phone.

Once inside a secured area, the attacker can access sensitive equipment, plant listening devices, steal documents, install malware on unattended computers, or simply gather intelligence about the organization's security posture.

02How it works.

01The attacker observes the secured entrance to understand access patterns and peak times
02They prepare a plausible reason for being there — carrying boxes, wearing a uniform, having a fake badge
03When an authorized person enters, the attacker follows closely behind or asks them to hold the door
04Social pressure prevents the authorized person from questioning or refusing entry
05Once inside, the attacker has physical access to the secured area

03Real-world example.

A penetration tester gained access to a Fortune 500 company's server room by wearing a polo shirt with the HVAC company's logo, carrying a clipboard, and confidently telling the receptionist he was there for a scheduled maintenance check. No one verified his identity at any point.

04How to protect yourself.

01Never hold doors open for people you don't recognize, even if it feels impolite
02Challenge unfamiliar individuals in secured areas — ask to see their badge or who they're visiting
03Use mantrap doors, turnstiles, or badge-activated barriers that prevent tailgating
04Train employees that questioning unknown visitors is expected, not rude
05Report suspicious individuals to security immediately
Related Terms
Social EngineeringPretextingShoulder Surfing
Explore Scam Types
phishingromancecryptoinvestmenttech supportdelivery
Suspect Something?

Run a scan on the message you received.

Run a scan →