{"id":32324,"date":"2023-08-07T20:27:45","date_gmt":"2023-08-07T20:27:45","guid":{"rendered":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/?p=32324"},"modified":"2023-08-07T20:27:46","modified_gmt":"2023-08-07T20:27:46","slug":"whats-tailgating-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/08\/07\/whats-tailgating-in-cybersecurity\/","title":{"rendered":"What&#8217;s Tailgating in Cybersecurity?"},"content":{"rendered":"<p><\/p>\n<div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Tailgating. It\u2019s an American football tradition almost as old as the sport itself &#8211; rife with fans, fun, and food. Within the IT world, nonetheless, the term tailgating takes on a more nefarious context.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">So what&#8217;s tailgating in cybersecurity? To members of the digital realm, tailgating is an attack method hackers use to realize access to sensitive, password-protected data and data. They do that by closely following a licensed person into the system.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Organizations polled in a recent survey say social engineering attacks like tailgating were one of the <a href=\"https:\/\/www.liquidweb.com\/blog\/most-common-web-security-problems\/\">common cybersecurity issues<\/a> \u2013 answerable for <a href=\"https:\/\/www.cshub.com\/attacks\/news\/social-engineering-most-dangerous-threat-say-75-of-security-professionals#:~:text=In%20the%20CS%20Hub%20Mid,security%20expertise%20(30%20percent).\" target=\"_blank\" rel=\"noreferrer noopener\">75% of their cybersecurity threats<\/a>. Consequently, IT managers and system admins need to concentrate on tailgating \u2013 what it&#8217;s, why it\u2019s so dangerous, and what they&#8217;ll do to stop it.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Nonetheless, education precedes awareness. That\u2019s why Liquid Web is here to offer the whole rundown of tailgating in cybersecurity. Every thing it&#8217;s essential to know might be covered in this text, so bookmark it as your go-to resource to raised protect yourself and your clients.<\/p>\n<\/div>\n<h2 id=\"h-the-definition-of-tailgating-in-cybersecurity\" class=\"Heading__SHeading-sc-o0nhd6-0\"><strong>The Definition of Tailgating in Cybersecurity\u00a0<\/strong><\/h2>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Tailgating is a hacking method where digital threat actors (or other unauthorized users) \u201cride the coattails\u201d of a licensed user to realize access to essential system data.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Once hackers infiltrate a system through tailgating, they may extract sensitive data. Typically, the info they\u2019re pilfering at this stage isn\u2019t the top goal. Launching a tailgating attack is just step one, and this data might be used to determine a more significant, intricate attack. That is crucial, as stopping tailgating will prevent more dangerous attacks like ransomware.<\/p>\n<\/div>\n<h3 id=\"h-tailgating-attacks-vs-piggybacking\" class=\"Heading__SHeading-sc-o0nhd6-0\"><strong>Tailgating Attacks vs. Piggybacking\u00a0<\/strong><\/h3>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Tailgating is something known as piggybacking. While the terms are used interchangeably by the cybersecurity community at large, they aren\u2019t the identical.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Each attacks seek advice from an unauthorized user following a licensed user, but piggybacking typically refers back to the attack used to realize access to a physical location. Tailgating\u2019s definition in cybersecurity refers back to the attack used to access sensitive data inside a company\u2019s digital infrastructure.<\/p>\n<\/div>\n<h2 id=\"h-how-does-tailgating-in-cybersecurity-work\" class=\"Heading__SHeading-sc-o0nhd6-0\"><strong>How Does Tailgating in Cybersecurity Work?<\/strong><\/h2>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Tailgating\u2019s meaning in cybersecurity inherently implies that it relies on other users inside a company\u2019s system. Sometimes the user is unaware of the unauthorized user following them into the system. Other times \u2013 in additional malicious cases \u2013 they&#8217;re aware of the breach beforehand.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">You could wonder why someone would let an unauthorized user into the system. Like most social engineering attacks, tailgating affects the human nature of a company\u2019s employees and end users. For instance, a hacker may send a phishing email that manipulates someone into acting.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Using digital tools, digital threat actors can track authorized users as they enter their login ID and password. Once that user hits Enter or clicks Login, the hacker enters the system together with them. Consequently, they now have access to the identical level of confidential and proprietary data as the top user.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">A hacker following a licensed user into the system will be very dangerous, depending on the user\u2019s access and permissions. While a breach is rarely  thing, it will possibly be particularly damaging to <a href=\"https:\/\/www.liquidweb.com\/blog\/enterprise-cybersecurity\/\">enterprise cybersecurity<\/a> if a hacker were to tailgate an upper-level manager or C-level executive into the system.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">These organization members have access to the corporate&#8217;s digital infrastructure&#8217;s most sensitive data and areas. Consequently, a hacker reaching those corners of the network could drastically impact the business, its employees, and its customers.<\/p>\n<\/div>\n<h2 id=\"h-reasons-for-tailgating\" class=\"Heading__SHeading-sc-o0nhd6-0\"><strong>Reasons for Tailgating\u00a0<\/strong><\/h2>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Below are a number of examples of what tailgating in cybersecurity is used for:<\/p>\n<\/div>\n<div data-lw-block-type=\"list\" data-lw-block-attributes=\"\">\n<ul class=\"list-disc list-outside\">\n<li>Gain access to secure, sensitive data.<\/li>\n<li>Exploit end users for financial gain.<\/li>\n<li>Leverage the info gained from tailgating for a bigger, more sophisticated attack.<\/li>\n<li>Competitors performing corporate espionage.<\/li>\n<li>Disgruntled employees wanting to sabotage the business.<\/li>\n<\/ul>\n<\/div>\n<div data-lw-block-type=\"html\" data-lw-block-attributes=\"\">\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large lw-drop-shadow\"><\/figure>\n<\/div>\n<\/div>\n<h2 id=\"h-dangers-of-tailgating\" class=\"Heading__SHeading-sc-o0nhd6-0\"><strong>Dangers of Tailgating<\/strong><\/h2>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">The perpetrator of a tailgating attack might be almost anyone. Vandals, disgruntled employees, thieves, hackers, and more could all be attempting to access your organization\u2019s most secure sectors and data stores.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Criminals who gain physical access to a facility through tailgating could also be after unsupervised equipment corresponding to laptops, hard drives, and more. Once inside, they could even try and install malicious software like spyware in server rooms to present themselves access to the network once they leave.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Digital tailgating works in much the identical way. Once inside an internal network, hackers virtually have free reign of all of the sensitive files and data throughout the system. The magnitude and sort of damage they&#8217;ll inflict at this point are almost limitless.<\/p>\n<\/div>\n<h2 id=\"h-preventing-tailgating-in-cybersecurity\" class=\"Heading__SHeading-sc-o0nhd6-0\"><strong>Stopping Tailgating in Cybersecurity<\/strong><\/h2>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Now that you just understand what tailgating is in cybersecurity, the subsequent step is prevention. Organizations have to deal with access controls to their facilities to stop physical tailgating.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">A number of ways they&#8217;ll do which are:<\/p>\n<\/div>\n<div data-lw-block-type=\"list\" data-lw-block-attributes=\"\">\n<ul class=\"list-disc list-outside\">\n<li>Implement stringent policies for worker ID cards.<\/li>\n<li>Use biometric scans for high-sensitivity areas.<\/li>\n<li>Leverage security tools that require employees to validate their identity.<\/li>\n<li>Install cameras in critical areas.<\/li>\n<\/ul>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">In terms of stopping digital tailgating, business owners have to rely heavily on education. You possibly can have essentially the most robust veil of cybersecurity protection available, but in case your team clicks the fallacious link, opens the fallacious email, or downloads the fallacious file, none of that may matter.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Managers and IT system admins should take the time to present detailed <a href=\"https:\/\/www.liquidweb.com\/blog\/cyber-security\/\">cybersecurity lessons<\/a> to <em>all<\/em> employees on what to search for to stop social engineering attacks. Show team members the right way to spot red flags for suspicious email, link, or file activity, and ensure your internal IT team receives adequate training on the right <a href=\"https:\/\/www.liquidweb.com\/insights\/how-companies-respond-post-cyber-attack\/\">response to cyberattacks<\/a>.<\/p>\n<\/div>\n<h3 id=\"h-in-conclusion\" class=\"Heading__SHeading-sc-o0nhd6-0\"><strong>In Conclusion\u00a0<\/strong><\/h3>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Though tailgating might sound innocuous, within the cybersecurity world, it will possibly have profound implications. Hackers can use tailgating to access sensitive data, which may then be used to wreak havoc on an organization or individual. Thankfully, there are methods to stop tailgating attacks from happening. By being <a href=\"https:\/\/www.liquidweb.com\/blog\/cybersecurity-risk-assessment\/\">aware of the risks<\/a> of tailgating and taking measures to stop it, you may help keep yourself, your data, and your organization protected from harm.<\/p>\n<\/div>\n<h4 id=\"h-are-you-doing-everything-you-can-to-prevent-tailgating-attacks\" class=\"Heading__SHeading-sc-o0nhd6-0\">Are you doing every part you&#8217;ll be able to to stop tailgating attacks?<\/h4>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Liquid Web is here to assist protect you and your team from the ever-present threat of tailgating. If you happen to\u2019re unsure where to begin, <a href=\"https:\/\/www.liquidweb.com\/contact-us\/\">contact<\/a> certainly one of the Most Helpful Humans in Hosting<strong>\u00ae<\/strong> today.<\/p>\n<\/div>\n<div data-lw-block-type=\"html\" data-lw-block-attributes=\"\"><a href=\"https:\/\/hub.liquidweb.com\/ebooks\/liquid-web-smb-cybersecurity-checklist\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter wp-image-63533 size-full lw-drop-shadow\" src=\"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2018\/07\/eBook-SMB-Security-Checklist.jpg\" alt=\"eBook - SMB Security Checklist\" width=\"500\" height=\"250\" loading=\"lazy\"><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Tailgating. It\u2019s an American football tradition almost as old as the sport itself &#8211; rife with fans, fun, and food. Within the IT world, nonetheless, the term tailgating takes on a more nefarious context.\u00a0 So what&#8217;s tailgating in cybersecurity? To members of the digital realm, tailgating is an attack method hackers use to realize access [&#8230;]\n","protected":false},"author":1,"featured_media":32325,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"fifu_image_url":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/11\/What-Is-Tailgating-in-Cybersecurity-social-tile.jpg","fifu_image_alt":"","two_page_speed":[],"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[97],"tags":[2676,2675],"class_list":["post-32324","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cybersecurity","tag-tailgating"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What&#039;s Tailgating in Cybersecurity? - Daniels Marketing BLC<\/title>\n<meta name=\"description\" content=\"Tailgating. It\u2019s an American football tradition almost as old as the sport itself - rife with fans, fun, and food. Within the IT world, nonetheless, the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/08\/07\/whats-tailgating-in-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What&#039;s Tailgating in Cybersecurity? - Daniels Marketing BLC\" \/>\n<meta property=\"og:description\" content=\"Tailgating. It\u2019s an American football tradition almost as old as the sport itself - rife with fans, fun, and food. Within the IT world, nonetheless, the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/08\/07\/whats-tailgating-in-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Daniels Marketing BLC\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-07T20:27:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-07T20:27:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/11\/What-Is-Tailgating-in-Cybersecurity-social-tile.jpg\" \/>\n<meta name=\"author\" content=\"info\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/11\/What-Is-Tailgating-in-Cybersecurity-social-tile.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"info\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/08\\\/07\\\/whats-tailgating-in-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/08\\\/07\\\/whats-tailgating-in-cybersecurity\\\/\"},\"author\":{\"name\":\"info\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/#\\\/schema\\\/person\\\/6a0a5d2e1a48d29297b62e635a4db33f\"},\"headline\":\"What&#8217;s Tailgating in Cybersecurity?\",\"datePublished\":\"2023-08-07T20:27:45+00:00\",\"dateModified\":\"2023-08-07T20:27:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/08\\\/07\\\/whats-tailgating-in-cybersecurity\\\/\"},\"wordCount\":1067,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/08\\\/07\\\/whats-tailgating-in-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/lwgatsby\\\/f_auto\\\/www\\\/uploads\\\/2022\\\/11\\\/What-Is-Tailgating-in-Cybersecurity-social-tile.jpg\",\"keywords\":[\"Cybersecurity\",\"Tailgating\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/08\\\/07\\\/whats-tailgating-in-cybersecurity\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/08\\\/07\\\/whats-tailgating-in-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/08\\\/07\\\/whats-tailgating-in-cybersecurity\\\/\",\"name\":\"What's Tailgating in Cybersecurity? - Daniels Marketing BLC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/08\\\/07\\\/whats-tailgating-in-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/08\\\/07\\\/whats-tailgating-in-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/lwgatsby\\\/f_auto\\\/www\\\/uploads\\\/2022\\\/11\\\/What-Is-Tailgating-in-Cybersecurity-social-tile.jpg\",\"datePublished\":\"2023-08-07T20:27:45+00:00\",\"dateModified\":\"2023-08-07T20:27:46+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/#\\\/schema\\\/person\\\/6a0a5d2e1a48d29297b62e635a4db33f\"},\"description\":\"Tailgating. It\u2019s an American football tradition almost as old as the sport itself - rife with fans, fun, and food. Within the IT world, nonetheless, the\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/08\\\/07\\\/whats-tailgating-in-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/08\\\/07\\\/whats-tailgating-in-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/08\\\/07\\\/whats-tailgating-in-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/res.cloudinary.com\\\/lwgatsby\\\/f_auto\\\/www\\\/uploads\\\/2022\\\/11\\\/What-Is-Tailgating-in-Cybersecurity-social-tile.jpg\",\"contentUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/lwgatsby\\\/f_auto\\\/www\\\/uploads\\\/2022\\\/11\\\/What-Is-Tailgating-in-Cybersecurity-social-tile.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/08\\\/07\\\/whats-tailgating-in-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What&#8217;s Tailgating in Cybersecurity?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/#website\",\"url\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/\",\"name\":\"Daniels Marketing BLC\",\"description\":\"All About Health &amp; Marketing\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/#\\\/schema\\\/person\\\/6a0a5d2e1a48d29297b62e635a4db33f\",\"name\":\"info\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g\",\"caption\":\"info\"},\"url\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/author\\\/info\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What's Tailgating in Cybersecurity? - Daniels Marketing BLC","description":"Tailgating. It\u2019s an American football tradition almost as old as the sport itself - rife with fans, fun, and food. Within the IT world, nonetheless, the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/08\/07\/whats-tailgating-in-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"What's Tailgating in Cybersecurity? - Daniels Marketing BLC","og_description":"Tailgating. It\u2019s an American football tradition almost as old as the sport itself - rife with fans, fun, and food. Within the IT world, nonetheless, the","og_url":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/08\/07\/whats-tailgating-in-cybersecurity\/","og_site_name":"Daniels Marketing BLC","article_published_time":"2023-08-07T20:27:45+00:00","article_modified_time":"2023-08-07T20:27:46+00:00","og_image":[{"url":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/11\/What-Is-Tailgating-in-Cybersecurity-social-tile.jpg","type":"","width":"","height":""}],"author":"info","twitter_card":"summary_large_image","twitter_image":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/11\/What-Is-Tailgating-in-Cybersecurity-social-tile.jpg","twitter_misc":{"Written by":"info","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/08\/07\/whats-tailgating-in-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/08\/07\/whats-tailgating-in-cybersecurity\/"},"author":{"name":"info","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/#\/schema\/person\/6a0a5d2e1a48d29297b62e635a4db33f"},"headline":"What&#8217;s Tailgating in Cybersecurity?","datePublished":"2023-08-07T20:27:45+00:00","dateModified":"2023-08-07T20:27:46+00:00","mainEntityOfPage":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/08\/07\/whats-tailgating-in-cybersecurity\/"},"wordCount":1067,"commentCount":0,"image":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/08\/07\/whats-tailgating-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/11\/What-Is-Tailgating-in-Cybersecurity-social-tile.jpg","keywords":["Cybersecurity","Tailgating"],"articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/08\/07\/whats-tailgating-in-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/08\/07\/whats-tailgating-in-cybersecurity\/","url":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/08\/07\/whats-tailgating-in-cybersecurity\/","name":"What's Tailgating in Cybersecurity? - Daniels Marketing BLC","isPartOf":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/#website"},"primaryImageOfPage":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/08\/07\/whats-tailgating-in-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/08\/07\/whats-tailgating-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/11\/What-Is-Tailgating-in-Cybersecurity-social-tile.jpg","datePublished":"2023-08-07T20:27:45+00:00","dateModified":"2023-08-07T20:27:46+00:00","author":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/#\/schema\/person\/6a0a5d2e1a48d29297b62e635a4db33f"},"description":"Tailgating. It\u2019s an American football tradition almost as old as the sport itself - rife with fans, fun, and food. Within the IT world, nonetheless, the","breadcrumb":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/08\/07\/whats-tailgating-in-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/08\/07\/whats-tailgating-in-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/08\/07\/whats-tailgating-in-cybersecurity\/#primaryimage","url":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/11\/What-Is-Tailgating-in-Cybersecurity-social-tile.jpg","contentUrl":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/11\/What-Is-Tailgating-in-Cybersecurity-social-tile.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/08\/07\/whats-tailgating-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/"},{"@type":"ListItem","position":2,"name":"What&#8217;s Tailgating in Cybersecurity?"}]},{"@type":"WebSite","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/#website","url":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/","name":"Daniels Marketing BLC","description":"All About Health &amp; Marketing","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/#\/schema\/person\/6a0a5d2e1a48d29297b62e635a4db33f","name":"info","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g","caption":"info"},"url":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/author\/info\/"}]}},"jetpack_featured_media_url":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/11\/What-Is-Tailgating-in-Cybersecurity-social-tile.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/posts\/32324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/comments?post=32324"}],"version-history":[{"count":2,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/posts\/32324\/revisions"}],"predecessor-version":[{"id":32327,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/posts\/32324\/revisions\/32327"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/media\/32325"}],"wp:attachment":[{"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/media?parent=32324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/categories?post=32324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/tags?post=32324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}