With so much of the world online these days, it can be easy to overlook the security of physical spaces like your organization’s offices. But criminals are still interested in gaining unauthorized, physical access to restricted areas like server rooms, or in stealing company documents and computers to retrieve sensitive data. They often use social engineering techniques to do so.

This can result in not only robbery but also malware installation, data breaches, corporate espionage and the loss of access control in and out of your property due to stolen identification.

Next steps

  • Train employees on how to prevent tailgating and piggyback rides: Criminals will often gain unauthorized entry to restricted spaces by tailgating (slipping in behind someone when entering a restricted area) or piggybacking (using social engineering to convince someone to provide access to a restricted area). Employee training is critical to being able to identify social engineering techniques, as well as overcoming common courtesies like holding the door open for someone right behind you when they should have to swipe a keycard to get through that door.
  • Make sure everything is locked: Lock devices, doors and drawers to help prevent unwanted access. Also, test automatic locks and keypads on a regular basis. Keypad batteries die, leaving doors automatically unlocked for fire safety reasons and allowing an opportunity for a breach.
  • Shred documents: Frequently shred documents with any sensitive information and ensure these shredded documents are disposed of properly. Many organizations have locked containers throughout offices that allow employees to insert documents to later be shredded by authorized personnel.