SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
The Best Defense -YOU!
Office creepers are professional
thieves who try to blend into an
office building or other setting by
looking and acting just like any
other employee, tenant, visitor or
contractor. They look for things easy
to steal that may be left out in the
open or left in an unsecured drawer,
such as wallets, keys, cash, equip-
ment and most commonly, laptop
computers. They steal quickly and
look for things that are of value and
are easy to steal. And, of course,
they don’t want to be observed or
caught, so they prey on offices left
open or where tenants and employ-
ees are in meetings or not in their
offices. They even use props – like
umbrellas, brief cases, fake ID’s and
even business cards along with cloth-
ing and equipment commonly used
in the building they are targeting – to
make you think they belong and are
legitimate. But make no mistake, the
office creeper is a hardened criminal
and who steals billions of dollars of
assets each year from companies,
buildings and office complexes.
YOU are the best defense against
the office creeper! If you see the
following, report the person to
security or building management or
simply ask if you can help them:
n	 An unfamiliar person going from 		
	 room to room or office to office;
n	 A person standing in a hallway for 		
	 a long period of time or wandering in 	
	 a hallway or common areas;
n	 A person waiting outside of the 		
	 building near the time that the
	 building will be opening or closing;
n	 A person without an employee or 		
	 visitor badge (If your building or 		
	 office uses these)
n	 A maintenance employee or contrac-		
	 tor who you have not seen before or 		
	 who may not be wearing any ID;
n	 A person who looks lost or not sure 		
	 where he or she is going and
n	 Watch out for the “ Head Popper.”
	 A “Head Popper” is an opportunistic 	
	 thief or burglar who peers his/		
	 her head quickly into a room or 		
	 opens a wrong door, pretending to 		
	 look for a specific office or person. 		
	 Their intention is to deprive the
	 rightful owner of property (i.e.,
	 credit cards, money, car keys, laptop 	
	 computer, etc.).
The office creeper is a
very good actor and may
pose as an employee,
business person, job
applicant and even a
maintenance contractor
or janitor.
As we do each year, this
month we focus on the
“Office Creeper”who
may be looking at a way
to get into your office to
take your computer and
other valuables.
Common SecurityTips
Everyone Should Follow
n	 Keep your purse, wallet, keys,or 	
	 other valuable items with you at 	
	 all times or locked in a drawer 	
	 or closet.
n	 Always let someone know
	 where you’ll be, whether it’s
	 working late, going to the copier 	
	 room or mailroom, going out to 	
	 lunch or a meeting.
n	 Never leave your reception area 	
	 unattended; install a door bell so 	
	 you know when the door opens 	
	 or secure the door when your 	
	 co-workers are in a meeting, 	
	 gone to lunch or are on a
	 conference call.
n	 Be Secure. Lock office doors, 	
	 cabinets, storage areas when
	 you are not around. Secure
	 unsupervised laptops when out 	
	 of the office.
n	 Don’t Assume. Ask for ID
	 or call building property
	 management to confirm that a
	 maintenance or janitorial worker 	
	 is legitimate.
n	 Lock and/or put away your
	 laptop computer when you are
	 going to be away from it even if 	
	 it’s just for lunch.
n	 Secure your laptop in your
	 trunk before getting to your
	 destination. Many laptops are 	
	 stolen from parked vehicles 	
	 either because the owner left the 	
	 computer in plain view or placed 	
	 it in the trunk when they got out 	
	 of their vehicle.
n	 Consider installing remote 	
	 laptop security (RLS) software 	
	 that allows you to encrypt
	 computer files and protect 	
	 against theft and unauthorized 	
	 computer access.
n	 Protect ID badges, garage and 	
	 building access cards or fobs, 	
	 office keys and computer and 	
	 door codes; these should always 	
	 be with you or secured.
n	 Don’t send confidential
	 information over your e-mail 	
	 system or place in the trash.
n	 Use a password system on your 	
	 computer to prohibit unauthor-	
	 ized users from accessing your 	
	 computer. Avoid using personal 	
	 information such as a birth date 	
	 maiden name, or your initials for 	
	 your password, and change your
	 password frequently.
n	 Docking stations advertise
	 you have a laptop.
	 Most employees will take their
	 laptops out of the docking station 	
	 and place them in file cabinets 	
	 when they leave for the day. Locks 	
	 on these cabinets can easily be 	
	 opened. So, make sure you secure
	 your laptop in a cabinet or room 	
	 with a good lock or, better yet, take 	
	 it with you.
	
Office and Building
SecurityWebsites:
n www.ncpc.org
n www.onguardonline.com
n www.consumersreports.org
IfyouobserveIt,REPORTIt!
If you see someone acting
suspiciously, report the person
to security, your supervisor or
building management
immediately. Get a good
description of the suspect, such
as age, height, weight, eye
and hair color.Where did you
last see the suspect? Where
was he or she going? Look for
distinguishing personal
characteristics, such as scars,
tattoos, and hairstyle. Observe
the suspect’s jewelry, clothing,
colors and style. NEVER try to
physically restrain a possible
officer creeper!
Get help or call the police!
“Tailgating”and“Piggy Backing”–The Opportunity a criminal hopes for!
Tailgating and piggybacking are terms associated with holding a secure door (a locked door or a door that
is secured by a card reader) open for persons not known by a legitimate building occupant or allowing a
potentially unauthorized person (such as on office creeper) inside a building by following a building
occupant inside an access-controlled space.
Tailgating
	The term “tailgating” is used to describe the situation where one or more people follow an authorized person
through a secured door or other entrance when the authorized person opens the door legitimately, in general,
without the authorized person’s knowledge and/or consent. A “tailgater” can be an unauthorized intruder, but
can also be a normally-authorized person who has forgotten or lost their access key, pass or fob, or finds the
access procedure inconvenient.
Piggy Backing
Piggybacking refers to when a person tags along with another person who is authorized to gain entry into a
restricted area, or pass a certain checkpoint, in general. in collusion with the authorized person.
Tailgaters and piggybackers have various methods of breeching security.
These may include:
	n	 	Surreptitiously following an individual authorized to enter a location, giving the appearance of being
			legitimately escorted
	n	 	Joining a large crowd authorized to enter, and pretending to be a member of the crowd that is largely
			unchecked
	n	 	Finding an authorized person who either carelessly disregards the law or the rules of the facility, or is
			tricked into believing the piggybacker is authorized, and agreeably allows the piggybacker to tag along
Tailgating and Piggy Backing
are two common methods
criminals use to access a secured
building.
WhatYou Can Do to Help StopTailgating and Piggy-Backing
Many individuals who tailgate and piggy back are using the opportunity to do so to enter a building and
commit a criminal act, such as stealing a laptop or other asset. They also can be a disgruntled former employee,
customer, contractor or estranged significant other of a building occupant who seeks to commit a property or
violent crime against a particular company or individual. And even more disturbing (and increasingly more
plausible), they could be a terrorist who wants to enter the facility as part of their terror planning or to execute
an actual terror attack.
Secured access card-protected entry points can be a lobby door, elevator or office suite.
Here’s how you can help keep out un-authorized visitors:
n	 	Never let someone you don’t know into a protected space such as a lobby door, perimeter door, lab,
			employee entrance, dock, elevator or other protected area
n	 	Never hold a door open for someone unless you absolutely know the person is a legitimate tenant or
			employee or is someone who is authorized to be in the building
n	 	If you are unsure as to whom someone is, politely ask them how you can help them. If they claim to be a 		
			building employee, ask them to show you their building ID card or access control card
n	 	If they cannot produce an ID or access control card, DO NOT LET THEM IN (even if you have seen them 		
			in the building before; they could have been recently terminated); politely advise them to go to the building 		
			reception area and then call building security to let them know what just happened
n	 	If someone looks lost or appears to be waiting for a door to be opened by a legitimate person, ask them if 		
			you can help them or inform building security of your observations
n	 	Refer all persons or deliveries trying to enter a protected or secured door to the appropriate reception area 		
			(i.e., lobby, dock, etc.)
n	 	Report anyone suspicious to building security immediately
Many times all it takes for an unauthorized person to leave is to be confronted by a building occupant and asked
if they need assistance. Being observant and polite may all that it takes for a criminal to take flight!
Remember, you are the front line of your building’s security program. If you see anything suspicious or out-of-the-
ordinary – no matter how minor you think it is – say something and contact building security or call 911!
As a tenant or employee in a
building or facility, you have a
critical responsibility to help
make sure unauthorized
individuals are not allowed into
the building through a secured or
access card-protected door.

Weitere ähnliche Inhalte

Andere mochten auch

The Dorm Shop
The Dorm ShopThe Dorm Shop
The Dorm ShopIOSIGNITE
 
Hady
HadyHady
Hadyhadyc
 
Best Practices for Managing Archive Migrations
Best Practices for Managing Archive MigrationsBest Practices for Managing Archive Migrations
Best Practices for Managing Archive MigrationsOsterman Research, Inc.
 
Factores a considerar en la escritura
Factores a considerar en la escrituraFactores a considerar en la escritura
Factores a considerar en la escriturafont Fawn
 
Bipolar Disorder Vs Borderline Personality Disorder
Bipolar Disorder Vs Borderline Personality DisorderBipolar Disorder Vs Borderline Personality Disorder
Bipolar Disorder Vs Borderline Personality DisorderMario Mendoza M
 
Modelo de negocios internacionales 15 nestle
Modelo de negocios internacionales 15  nestleModelo de negocios internacionales 15  nestle
Modelo de negocios internacionales 15 nestleJairo Rodriguez
 
How To Drive Readers To Your Website With Locable's Print-to-Web Strategy [Re...
How To Drive Readers To Your Website With Locable's Print-to-Web Strategy [Re...How To Drive Readers To Your Website With Locable's Print-to-Web Strategy [Re...
How To Drive Readers To Your Website With Locable's Print-to-Web Strategy [Re...Locable (Hyper Local Media)
 

Andere mochten auch (12)

The Dorm Shop
The Dorm ShopThe Dorm Shop
The Dorm Shop
 
Hady
HadyHady
Hady
 
Best Practices for Managing Archive Migrations
Best Practices for Managing Archive MigrationsBest Practices for Managing Archive Migrations
Best Practices for Managing Archive Migrations
 
Football Magazine Questionnaire
Football Magazine QuestionnaireFootball Magazine Questionnaire
Football Magazine Questionnaire
 
Factores a considerar en la escritura
Factores a considerar en la escrituraFactores a considerar en la escritura
Factores a considerar en la escritura
 
Bipolar Disorder Vs Borderline Personality Disorder
Bipolar Disorder Vs Borderline Personality DisorderBipolar Disorder Vs Borderline Personality Disorder
Bipolar Disorder Vs Borderline Personality Disorder
 
Tobillo y pie
Tobillo y pieTobillo y pie
Tobillo y pie
 
Tricotilomania
TricotilomaniaTricotilomania
Tricotilomania
 
Modelo de negocios internacionales 15 nestle
Modelo de negocios internacionales 15  nestleModelo de negocios internacionales 15  nestle
Modelo de negocios internacionales 15 nestle
 
How To Drive Readers To Your Website With Locable's Print-to-Web Strategy [Re...
How To Drive Readers To Your Website With Locable's Print-to-Web Strategy [Re...How To Drive Readers To Your Website With Locable's Print-to-Web Strategy [Re...
How To Drive Readers To Your Website With Locable's Print-to-Web Strategy [Re...
 
Whitepaper zum-online-marketing
Whitepaper zum-online-marketingWhitepaper zum-online-marketing
Whitepaper zum-online-marketing
 
Las Perdidas de la Historia
Las Perdidas de la HistoriaLas Perdidas de la Historia
Las Perdidas de la Historia
 

Kürzlich hochgeladen

4S Sector 59 In Gurugram | Invest, Nest, Rest
4S Sector 59  In Gurugram | Invest, Nest, Rest4S Sector 59  In Gurugram | Invest, Nest, Rest
4S Sector 59 In Gurugram | Invest, Nest, Restbhattrishabh270
 
Kalpataru Jade Skyline Baner Pune | A New Way Of Living At An Affordable Price
Kalpataru Jade Skyline Baner Pune | A New Way Of Living At An Affordable PriceKalpataru Jade Skyline Baner Pune | A New Way Of Living At An Affordable Price
Kalpataru Jade Skyline Baner Pune | A New Way Of Living At An Affordable Priceaidasheikh47
 
Commercial Lots for Sale - Pederson Crossing Blvd., DeForest,WI
Commercial Lots for Sale - Pederson Crossing Blvd., DeForest,WICommercial Lots for Sale - Pederson Crossing Blvd., DeForest,WI
Commercial Lots for Sale - Pederson Crossing Blvd., DeForest,WILee & Associates of Madison, WI
 
Mahindra Lifespaces Kandivali East | Expansive spaces for your family
Mahindra Lifespaces Kandivali East | Expansive spaces for your familyMahindra Lifespaces Kandivali East | Expansive spaces for your family
Mahindra Lifespaces Kandivali East | Expansive spaces for your familyaidasheikh47
 
Common House Flipping Mistakes and How to Avoid Them
Common House Flipping Mistakes and How to Avoid ThemCommon House Flipping Mistakes and How to Avoid Them
Common House Flipping Mistakes and How to Avoid ThemHampton Luzak
 
Birla-Alokya Whitefield, Banglore-e-Brochure.pdf
Birla-Alokya Whitefield, Banglore-e-Brochure.pdfBirla-Alokya Whitefield, Banglore-e-Brochure.pdf
Birla-Alokya Whitefield, Banglore-e-Brochure.pdffaheemali990101
 
REALTORS Land Institute 2023 Land Market Survey
REALTORS Land Institute 2023 Land Market SurveyREALTORS Land Institute 2023 Land Market Survey
REALTORS Land Institute 2023 Land Market SurveyREALTORS® Land Institute
 
2023 NAR Profile of Home Buyers and Sellers
2023 NAR Profile of Home Buyers and Sellers2023 NAR Profile of Home Buyers and Sellers
2023 NAR Profile of Home Buyers and SellersTom Blefko
 
Provident Manchester IVC Road Bangalore.pdf
Provident Manchester IVC Road Bangalore.pdfProvident Manchester IVC Road Bangalore.pdf
Provident Manchester IVC Road Bangalore.pdfashiyadav24
 
4 & 5 BHK Spacious Apartments for sale in Anamika High Point, Off SG Highway ...
4 & 5 BHK Spacious Apartments for sale in Anamika High Point, Off SG Highway ...4 & 5 BHK Spacious Apartments for sale in Anamika High Point, Off SG Highway ...
4 & 5 BHK Spacious Apartments for sale in Anamika High Point, Off SG Highway ...RE/MAX Realty Solutions
 
Unique Spaces Envogue1 Mundhwa Pune E- Brochure .pdf
Unique Spaces Envogue1 Mundhwa Pune  E- Brochure .pdfUnique Spaces Envogue1 Mundhwa Pune  E- Brochure .pdf
Unique Spaces Envogue1 Mundhwa Pune E- Brochure .pdfManishSaxena95
 
LCAR Unit 14 - Real Estate Brokerage - 14th Edition Revised
LCAR Unit 14 - Real Estate Brokerage - 14th Edition RevisedLCAR Unit 14 - Real Estate Brokerage - 14th Edition Revised
LCAR Unit 14 - Real Estate Brokerage - 14th Edition RevisedTom Blefko
 
Acqua Eden Bhutani Goa Brochure Download
Acqua Eden Bhutani Goa Brochure DownloadAcqua Eden Bhutani Goa Brochure Download
Acqua Eden Bhutani Goa Brochure DownloadMKBInfotech
 
Anshul Kanvas Wagholi Pune Apartments Brochure.pdf
Anshul Kanvas Wagholi Pune Apartments Brochure.pdfAnshul Kanvas Wagholi Pune Apartments Brochure.pdf
Anshul Kanvas Wagholi Pune Apartments Brochure.pdfsabhyara24
 
Evolving Work Trends Require New-age Businesses to Design Thoughtful Workspac...
Evolving Work Trends Require New-age Businesses to Design Thoughtful Workspac...Evolving Work Trends Require New-age Businesses to Design Thoughtful Workspac...
Evolving Work Trends Require New-age Businesses to Design Thoughtful Workspac...GMRAerocityHyderabad
 
LCAR Unit 13 - The Real Estate Business - 14th Edition Revised
LCAR Unit 13 - The Real Estate Business - 14th Edition RevisedLCAR Unit 13 - The Real Estate Business - 14th Edition Revised
LCAR Unit 13 - The Real Estate Business - 14th Edition RevisedTom Blefko
 
ALSTINE -300 (Aluminium Coating Chemical)
ALSTINE -300 (Aluminium Coating Chemical)ALSTINE -300 (Aluminium Coating Chemical)
ALSTINE -300 (Aluminium Coating Chemical)JAIBAN ORGANICS
 
Experience Tranquility: Serenity in Springfield, Idaho's Architectural Animat...
Experience Tranquility: Serenity in Springfield, Idaho's Architectural Animat...Experience Tranquility: Serenity in Springfield, Idaho's Architectural Animat...
Experience Tranquility: Serenity in Springfield, Idaho's Architectural Animat...Yantram Animation Studio Corporation
 
K Raheja Amaltis Sion Mumbai | A Return To Better Living
K Raheja Amaltis Sion Mumbai | A Return To Better LivingK Raheja Amaltis Sion Mumbai | A Return To Better Living
K Raheja Amaltis Sion Mumbai | A Return To Better Livingaidasheikh47
 
Godrej Shettigere - Where Dreams Take Root in Luxurious Villa Plots of North ...
Godrej Shettigere - Where Dreams Take Root in Luxurious Villa Plots of North ...Godrej Shettigere - Where Dreams Take Root in Luxurious Villa Plots of North ...
Godrej Shettigere - Where Dreams Take Root in Luxurious Villa Plots of North ...JagadishKR1
 

Kürzlich hochgeladen (20)

4S Sector 59 In Gurugram | Invest, Nest, Rest
4S Sector 59  In Gurugram | Invest, Nest, Rest4S Sector 59  In Gurugram | Invest, Nest, Rest
4S Sector 59 In Gurugram | Invest, Nest, Rest
 
Kalpataru Jade Skyline Baner Pune | A New Way Of Living At An Affordable Price
Kalpataru Jade Skyline Baner Pune | A New Way Of Living At An Affordable PriceKalpataru Jade Skyline Baner Pune | A New Way Of Living At An Affordable Price
Kalpataru Jade Skyline Baner Pune | A New Way Of Living At An Affordable Price
 
Commercial Lots for Sale - Pederson Crossing Blvd., DeForest,WI
Commercial Lots for Sale - Pederson Crossing Blvd., DeForest,WICommercial Lots for Sale - Pederson Crossing Blvd., DeForest,WI
Commercial Lots for Sale - Pederson Crossing Blvd., DeForest,WI
 
Mahindra Lifespaces Kandivali East | Expansive spaces for your family
Mahindra Lifespaces Kandivali East | Expansive spaces for your familyMahindra Lifespaces Kandivali East | Expansive spaces for your family
Mahindra Lifespaces Kandivali East | Expansive spaces for your family
 
Common House Flipping Mistakes and How to Avoid Them
Common House Flipping Mistakes and How to Avoid ThemCommon House Flipping Mistakes and How to Avoid Them
Common House Flipping Mistakes and How to Avoid Them
 
Birla-Alokya Whitefield, Banglore-e-Brochure.pdf
Birla-Alokya Whitefield, Banglore-e-Brochure.pdfBirla-Alokya Whitefield, Banglore-e-Brochure.pdf
Birla-Alokya Whitefield, Banglore-e-Brochure.pdf
 
REALTORS Land Institute 2023 Land Market Survey
REALTORS Land Institute 2023 Land Market SurveyREALTORS Land Institute 2023 Land Market Survey
REALTORS Land Institute 2023 Land Market Survey
 
2023 NAR Profile of Home Buyers and Sellers
2023 NAR Profile of Home Buyers and Sellers2023 NAR Profile of Home Buyers and Sellers
2023 NAR Profile of Home Buyers and Sellers
 
Provident Manchester IVC Road Bangalore.pdf
Provident Manchester IVC Road Bangalore.pdfProvident Manchester IVC Road Bangalore.pdf
Provident Manchester IVC Road Bangalore.pdf
 
4 & 5 BHK Spacious Apartments for sale in Anamika High Point, Off SG Highway ...
4 & 5 BHK Spacious Apartments for sale in Anamika High Point, Off SG Highway ...4 & 5 BHK Spacious Apartments for sale in Anamika High Point, Off SG Highway ...
4 & 5 BHK Spacious Apartments for sale in Anamika High Point, Off SG Highway ...
 
Unique Spaces Envogue1 Mundhwa Pune E- Brochure .pdf
Unique Spaces Envogue1 Mundhwa Pune  E- Brochure .pdfUnique Spaces Envogue1 Mundhwa Pune  E- Brochure .pdf
Unique Spaces Envogue1 Mundhwa Pune E- Brochure .pdf
 
LCAR Unit 14 - Real Estate Brokerage - 14th Edition Revised
LCAR Unit 14 - Real Estate Brokerage - 14th Edition RevisedLCAR Unit 14 - Real Estate Brokerage - 14th Edition Revised
LCAR Unit 14 - Real Estate Brokerage - 14th Edition Revised
 
Acqua Eden Bhutani Goa Brochure Download
Acqua Eden Bhutani Goa Brochure DownloadAcqua Eden Bhutani Goa Brochure Download
Acqua Eden Bhutani Goa Brochure Download
 
Anshul Kanvas Wagholi Pune Apartments Brochure.pdf
Anshul Kanvas Wagholi Pune Apartments Brochure.pdfAnshul Kanvas Wagholi Pune Apartments Brochure.pdf
Anshul Kanvas Wagholi Pune Apartments Brochure.pdf
 
Evolving Work Trends Require New-age Businesses to Design Thoughtful Workspac...
Evolving Work Trends Require New-age Businesses to Design Thoughtful Workspac...Evolving Work Trends Require New-age Businesses to Design Thoughtful Workspac...
Evolving Work Trends Require New-age Businesses to Design Thoughtful Workspac...
 
LCAR Unit 13 - The Real Estate Business - 14th Edition Revised
LCAR Unit 13 - The Real Estate Business - 14th Edition RevisedLCAR Unit 13 - The Real Estate Business - 14th Edition Revised
LCAR Unit 13 - The Real Estate Business - 14th Edition Revised
 
ALSTINE -300 (Aluminium Coating Chemical)
ALSTINE -300 (Aluminium Coating Chemical)ALSTINE -300 (Aluminium Coating Chemical)
ALSTINE -300 (Aluminium Coating Chemical)
 
Experience Tranquility: Serenity in Springfield, Idaho's Architectural Animat...
Experience Tranquility: Serenity in Springfield, Idaho's Architectural Animat...Experience Tranquility: Serenity in Springfield, Idaho's Architectural Animat...
Experience Tranquility: Serenity in Springfield, Idaho's Architectural Animat...
 
K Raheja Amaltis Sion Mumbai | A Return To Better Living
K Raheja Amaltis Sion Mumbai | A Return To Better LivingK Raheja Amaltis Sion Mumbai | A Return To Better Living
K Raheja Amaltis Sion Mumbai | A Return To Better Living
 
Godrej Shettigere - Where Dreams Take Root in Luxurious Villa Plots of North ...
Godrej Shettigere - Where Dreams Take Root in Luxurious Villa Plots of North ...Godrej Shettigere - Where Dreams Take Root in Luxurious Villa Plots of North ...
Godrej Shettigere - Where Dreams Take Root in Luxurious Villa Plots of North ...
 

SecurAlert April 2014 - Office Creeper Vulnerability

  • 1. The Best Defense -YOU! Office creepers are professional thieves who try to blend into an office building or other setting by looking and acting just like any other employee, tenant, visitor or contractor. They look for things easy to steal that may be left out in the open or left in an unsecured drawer, such as wallets, keys, cash, equip- ment and most commonly, laptop computers. They steal quickly and look for things that are of value and are easy to steal. And, of course, they don’t want to be observed or caught, so they prey on offices left open or where tenants and employ- ees are in meetings or not in their offices. They even use props – like umbrellas, brief cases, fake ID’s and even business cards along with cloth- ing and equipment commonly used in the building they are targeting – to make you think they belong and are legitimate. But make no mistake, the office creeper is a hardened criminal and who steals billions of dollars of assets each year from companies, buildings and office complexes. YOU are the best defense against the office creeper! If you see the following, report the person to security or building management or simply ask if you can help them: n An unfamiliar person going from room to room or office to office; n A person standing in a hallway for a long period of time or wandering in a hallway or common areas; n A person waiting outside of the building near the time that the building will be opening or closing; n A person without an employee or visitor badge (If your building or office uses these) n A maintenance employee or contrac- tor who you have not seen before or who may not be wearing any ID; n A person who looks lost or not sure where he or she is going and n Watch out for the “ Head Popper.” A “Head Popper” is an opportunistic thief or burglar who peers his/ her head quickly into a room or opens a wrong door, pretending to look for a specific office or person. Their intention is to deprive the rightful owner of property (i.e., credit cards, money, car keys, laptop computer, etc.). The office creeper is a very good actor and may pose as an employee, business person, job applicant and even a maintenance contractor or janitor. As we do each year, this month we focus on the “Office Creeper”who may be looking at a way to get into your office to take your computer and other valuables.
  • 2. Common SecurityTips Everyone Should Follow n Keep your purse, wallet, keys,or other valuable items with you at all times or locked in a drawer or closet. n Always let someone know where you’ll be, whether it’s working late, going to the copier room or mailroom, going out to lunch or a meeting. n Never leave your reception area unattended; install a door bell so you know when the door opens or secure the door when your co-workers are in a meeting, gone to lunch or are on a conference call. n Be Secure. Lock office doors, cabinets, storage areas when you are not around. Secure unsupervised laptops when out of the office. n Don’t Assume. Ask for ID or call building property management to confirm that a maintenance or janitorial worker is legitimate. n Lock and/or put away your laptop computer when you are going to be away from it even if it’s just for lunch. n Secure your laptop in your trunk before getting to your destination. Many laptops are stolen from parked vehicles either because the owner left the computer in plain view or placed it in the trunk when they got out of their vehicle. n Consider installing remote laptop security (RLS) software that allows you to encrypt computer files and protect against theft and unauthorized computer access. n Protect ID badges, garage and building access cards or fobs, office keys and computer and door codes; these should always be with you or secured. n Don’t send confidential information over your e-mail system or place in the trash. n Use a password system on your computer to prohibit unauthor- ized users from accessing your computer. Avoid using personal information such as a birth date maiden name, or your initials for your password, and change your password frequently. n Docking stations advertise you have a laptop. Most employees will take their laptops out of the docking station and place them in file cabinets when they leave for the day. Locks on these cabinets can easily be opened. So, make sure you secure your laptop in a cabinet or room with a good lock or, better yet, take it with you. Office and Building SecurityWebsites: n www.ncpc.org n www.onguardonline.com n www.consumersreports.org IfyouobserveIt,REPORTIt! If you see someone acting suspiciously, report the person to security, your supervisor or building management immediately. Get a good description of the suspect, such as age, height, weight, eye and hair color.Where did you last see the suspect? Where was he or she going? Look for distinguishing personal characteristics, such as scars, tattoos, and hairstyle. Observe the suspect’s jewelry, clothing, colors and style. NEVER try to physically restrain a possible officer creeper! Get help or call the police!
  • 3. “Tailgating”and“Piggy Backing”–The Opportunity a criminal hopes for! Tailgating and piggybacking are terms associated with holding a secure door (a locked door or a door that is secured by a card reader) open for persons not known by a legitimate building occupant or allowing a potentially unauthorized person (such as on office creeper) inside a building by following a building occupant inside an access-controlled space. Tailgating The term “tailgating” is used to describe the situation where one or more people follow an authorized person through a secured door or other entrance when the authorized person opens the door legitimately, in general, without the authorized person’s knowledge and/or consent. A “tailgater” can be an unauthorized intruder, but can also be a normally-authorized person who has forgotten or lost their access key, pass or fob, or finds the access procedure inconvenient. Piggy Backing Piggybacking refers to when a person tags along with another person who is authorized to gain entry into a restricted area, or pass a certain checkpoint, in general. in collusion with the authorized person. Tailgaters and piggybackers have various methods of breeching security. These may include: n Surreptitiously following an individual authorized to enter a location, giving the appearance of being legitimately escorted n Joining a large crowd authorized to enter, and pretending to be a member of the crowd that is largely unchecked n Finding an authorized person who either carelessly disregards the law or the rules of the facility, or is tricked into believing the piggybacker is authorized, and agreeably allows the piggybacker to tag along Tailgating and Piggy Backing are two common methods criminals use to access a secured building.
  • 4. WhatYou Can Do to Help StopTailgating and Piggy-Backing Many individuals who tailgate and piggy back are using the opportunity to do so to enter a building and commit a criminal act, such as stealing a laptop or other asset. They also can be a disgruntled former employee, customer, contractor or estranged significant other of a building occupant who seeks to commit a property or violent crime against a particular company or individual. And even more disturbing (and increasingly more plausible), they could be a terrorist who wants to enter the facility as part of their terror planning or to execute an actual terror attack. Secured access card-protected entry points can be a lobby door, elevator or office suite. Here’s how you can help keep out un-authorized visitors: n Never let someone you don’t know into a protected space such as a lobby door, perimeter door, lab, employee entrance, dock, elevator or other protected area n Never hold a door open for someone unless you absolutely know the person is a legitimate tenant or employee or is someone who is authorized to be in the building n If you are unsure as to whom someone is, politely ask them how you can help them. If they claim to be a building employee, ask them to show you their building ID card or access control card n If they cannot produce an ID or access control card, DO NOT LET THEM IN (even if you have seen them in the building before; they could have been recently terminated); politely advise them to go to the building reception area and then call building security to let them know what just happened n If someone looks lost or appears to be waiting for a door to be opened by a legitimate person, ask them if you can help them or inform building security of your observations n Refer all persons or deliveries trying to enter a protected or secured door to the appropriate reception area (i.e., lobby, dock, etc.) n Report anyone suspicious to building security immediately Many times all it takes for an unauthorized person to leave is to be confronted by a building occupant and asked if they need assistance. Being observant and polite may all that it takes for a criminal to take flight! Remember, you are the front line of your building’s security program. If you see anything suspicious or out-of-the- ordinary – no matter how minor you think it is – say something and contact building security or call 911! As a tenant or employee in a building or facility, you have a critical responsibility to help make sure unauthorized individuals are not allowed into the building through a secured or access card-protected door.