Examples of Unauthorized Access

The following are additional examples of malicious insider activities in order to obtain unauthorized access:

  • Asking to “borrow” or taking another employee’s badge.
  • Trying to “piggyback” by following another individual through access doors.
  • Logging on to a computer using a co-worker’s password or credentials.
Man using his coworker’s badge to access the restricted area