What is tailgating in cyber security?

August 6, 2025

Cybersecurity threats don’t always come through your inbox or dodgy downloads—sometimes, they walk right through your front door. Literally. Tailgating, also known as “piggybacking,” is a common but often overlooked security risk that blends social engineering with a bit of cheeky opportunism. So what is tailgating in cyber security, and why does it matter?

At IT Backbone, we help businesses stay protected from both digital and physical threats. In this article we explain what is tailgating in cyber security, how it works, and what you can do to prevent it.


What is a tailgating attack?

Tailgating is when someone who isn’t authorised to access a secure area or system sneaks in by closely following someone who is. Understanding what is tailgating in cyber security helps highlight why it’s considered such a dangerous insider threat.

It usually happens in physical settings (like someone following you into an office), but it can also occur digitally—like someone using stolen login credentials to access your network. Tailgating is often just the first step in a bigger plan, such as stealing data, installing malware, or launching more sophisticated attacks.


How does tailgating work?

It’s all about exploiting human behaviour—things like trust, helpfulness, or simple forgetfulness. In practice, tailgating in cyber security often looks like someone asking you to hold a door or pretending to be a contractor.

For example:

  • An attacker might wait outside a secure building and ask an employee to hold the door.
  • Someone might pose as a delivery driver or IT technician to blend in.
  • They might even ask to borrow a device (“my phone died, can I send a quick email?”) and then install spyware or harvest credentials.

It’s sneaky, but it works—especially in busy workplaces where people don’t want to seem rude or suspicious.


Tailgating attacks vs. piggybacking

People often confuse these two terms. They’re similar but not quite the same.

With tailgating, the person entering doesn’t know they’re being followed—it’s completely unauthorised. The intruder takes advantage of an open door or an inattentive moment to sneak in unnoticed.

Piggybacking, on the other hand, happens when the person holding the door knows someone is following them—but assumes they’re supposed to be there. Maybe it’s someone they vaguely recognise, or someone who gives a convincing excuse. Either way, both pose the same risk: unauthorised access to restricted areas or systems.


Tailgating social engineering: what is tailgating in cyber security in practice?

Tailgating in cyber security is a classic form of social engineering—where attackers manipulate people instead of hacking machines.

They might:

  • Dress like a contractor or delivery person
  • Pretend they forgot their ID badge
  • Blend into a crowd of employees
  • Start a casual conversation to build trust

And digitally? They’ll send fake emails, messages, or links pretending to be IT support or your boss, asking for login credentials or access.

In sensitive environments like the NHS, tailgating can compromise patient privacy; NHS Digital’s Help Us to Stay Safe and Secure campaign provides clear advice for staff to challenge suspicious access attempts.


Who is most at risk for tailgating attacks?

Certain sectors are prime targets. By asking what is tailgating in cyber security, businesses can better identify vulnerable employees, like new starters or frontline staff. Some examples of vulnerable staff:

  • New employees who don’t know everyone yet
  • Staff in high-turnover or frontline roles (e.g. reception or logistics)
  • Teams working in open-plan offices or co-working spaces
  • Companies with little to no access control or visitor tracking

And if your business handles sensitive data (healthcare, finance, legal, etc.), you’re a prime target.


Examples of tailgating attacks

Here are some real-world scenarios of tailgating in cyber security:

  • The Friendly Stranger: A person follows an employee through a secure entrance while chatting casually.
  • Delivery Disguise: Someone poses as a food or parcel delivery person, gets waved through without ID.
  • Borrowed Device Trick: An attacker pretends their device is dead and asks to use an employee’s laptop, only to install malware or harvest passwords.
  • After-Hours Intrusion: The attacker waits until the office is nearly empty and blends in with the night shift.
courier tailgating cyber security

5 ways to prevent tailgating attacks

Stopping tailgating in cyber security starts with awareness—and a bit of planning. Here are five simple but powerful ways to reduce the risk:

1. Install physical barriers

Use turnstiles, security doors, or mantraps that only allow one person in at a time.

2. Set up CCTV and sensors

Modern video systems can spot unusual access behaviour and even count people entering.

3. Train your team

Regular security training keeps people alert to tailgating, phishing, and other sneaky tactics.

4. Use ID badges and biometric access

Make it clear who should (and shouldn’t) be in the building. Badges or biometrics make it easier to check.

5. Create a “no tailgating” culture

Encourage staff to speak up and challenge suspicious behaviour—even if it feels awkward.

We will often recommend that a security audit is performed to identify areas of weakness that may but you at risk.


How to detect tailgating?

Tailgating isn’t always easy to spot. That’s the point—it relies on going unnoticed. But here’s what helps:

  • Review security footage regularly
  • Use digital access logs to spot anomalies
  • Train staff to report anything odd—even “just in case”

Technology like people-counting sensors or AI-powered cameras can also alert you to multiple entries with one badge swipe.


What to do if you’ve been tailgated

If you suspect someone has tailgated into your building or systems, act fast. First, report it to your IT or security team right away. Don’t assume someone else has done it—they might not even realise what happened.

If there’s a chance that login credentials were stolen or a device was accessed, change your passwords immediately and monitor for any unusual activity. Review access logs and CCTV footage to understand what happened, and let your team know so they can stay alert for follow-ups.

Once the immediate risk is under control, it’s worth reviewing your security procedures to see what went wrong and how to prevent it next time. A quick audit and refresher training session can go a long way.


Tailgating in cyber security FAQs

Why are tailgating attacks considered social engineering?

Because they exploit human behaviour—kindness, trust, and the urge to be polite—rather than relying on hacking or technical exploits.

What are the most common tailgating methods?

  • Slipping through secure doors behind someone
  • Pretending to be a staff member or contractor
  • Using fake emails or messages to access systems (digital tailgating)

Who is at risk of tailgating attacks?

Any business with staff, visitors, or shared access points—especially in busy buildings or open-plan offices. Sectors like healthcare, finance, or government are at higher risk due to the sensitive data they handle.

What’s the difference between tailgating and pretexting?

Tailgating is physical or digital access through deception. Pretexting is when an attacker creates a fake identity or scenario to trick someone (e.g., pretending to be from IT support). Both are forms of social engineering.

For comprehensive protection, consider our 24/7 Cyber Security service, which integrates physical and digital defences to reduce the risk of tailgating.


FAQs About IT Backbone

Who is IT Backbone?

We’re a UK-based IT support and cybersecurity provider helping businesses stay secure—whether they’re working remotely, on-site, or somewhere in between.

What services do you offer?

Managed IT support, cloud solutions, cyber security audits, Zero Trust implementation, and tailored strategies to protect your data and systems.

Can you help with tailgating prevention?

Absolutely. We assess your physical and digital security risks, recommend the right tools, and provide training to keep your people alert and protected.


Need help securing your business from threats like tailgating?
Get in touch with IT Backbone today for a friendly chat and a free cybersecurity assessment.

Key metrics

We’re proud of how we perform

15 mins

Avg. response time

< 2 hours

Avg. resolution time

100%

positive feedback

79%

First contact resolution