Prevent Computer Tailgating with Automatic Lock.
Tailgating is a type of social engineering attack and a serious issue for cybersecurity posture. Tailgating is a physical social engineering attack that involves gaining access to a restricted area or system by using an authorized person. Ever let a coworker "check their email" on your workstation? Have you ever let someone into your building out of courtesy even though they didn't have a key to get in? "Hold the door, please" they said so kindly. Maybe they have a bag of food and you thought they were delivering food. Did they look like they worked there and said they just "forgot their badge" at home? We're taught to be courteous, not skeptical.
In the office, insider threats are the biggest problems when it comes to tailgating. They already have a certain level of credibility from being around. But if someone leaves their computer unlocked, an opportunistic (or planned) person can simply walk up to the unlocked computer and have access to whatever is on that computer. The system still thinks the originally logged in user is there. This is a problem stemming from how passwords are designed: passwords get you into a system not locking it when you leave. Since many people still leave computers unlocked, anyone could tailgate in and do all kinds of damage - install malware, look up confidential information, steal data, corporate espionage; identity theft, and more.
GateKeeper Proximity combats tailgating through continuous authentication. No matter how "strong" an authentication solution is, if the system cannot determine that the authorized user is still there, then this leaves a huge vulnerability for tailgating opportunities and all the damage that follows. Unlike conventional authentication solutions, GateKeeper constantly checks to make sure the authorized user's token is still present and active. If the user leaves, the system automatically locks to prevent any tailgating attempt onto the intended victim's computer.
An unlocked computer is very dangerous because it allows attackers to bypass the authentication method entirely. Without having to shoulder surf, gain credentials, or hacking, an attacker can gain unauthorized access easily. This is especially a risk factor for organizations that have computers placed in areas that allow access to the public such as hospitals or police stations/squad cars. If a busy doctor leaves a computer unlocked in one room before leaving, and a stranger walks in, they have full access to the EMR and any other medical records accessible from the unlocked computer. Not only is this a security hole, but a serious HIPAA violation that has incurred fines.
For any additional questions or concerns regarding continuous authentication, security, proximity settings, computer locking, credential management, or compliance, please contact GateKeeper Enterprise support using the Support Ticket form on https://gkaccess.com/support/ or email firstname.lastname@example.org.
GateKeeper prevents tailgating; piggybacking prevention; How to prevent tailgating and piggybacking with GateKeeper.; How to prevent piggybacking with GateKeeper.; How to prevent tailgating with GateKeeper.; stop tailgating; stop account takeover attacks; antitailgating; anti-tailgating methods;