Tailgating
Posted in Hass and Associates Cyber Security, hass associates online
Also called piggybacking, this scheme is used in gaining access even without having any authorization by simply riding on another individual’s credentials. This includes faking an ID or presenting excuses in order to make the person believe the hacker is harmless.
Read full article
Read full article
0 comments: