Browse Definitions :
Definition

piggybacking

What is piggybacking?

Piggybacking, in the context of Wi-Fi, is the use of a wireless connection to gain access to the internet without proper authority. Piggybacking is also sometimes referred to as Wi-Fi squatting and tailgating.

What is the purpose of piggybacking?

The purpose of piggybacking is simply to gain free network access.

Often this isn't done with malicious intent, but it is still considered theft because the user is taking advantage of a service that they have not paid for or don't have the legal right to use.

A network that is vulnerable to piggybacking for network access is equally vulnerable when the purpose is a data breach, dissemination of viruses or some other illicit activity.

Best practices for avoiding data breaches
Piggybacking can lead to data breaches, plus loss of money and property.

How does piggybacking work?

Piggybacking worked in the past because all one would have to do was take advantage of the fact that most Wi-Fi networks were not encrypted. This means that anyone within range of the signal could access the network without having to enter a password.

To access an unsecured wireless network, all you had to do was to get into the range of a Wi-Fi hotspot's signal and select your chosen network from the options presented.

Today most Wi-Fi networks are encrypted with passwords, which makes piggybacking much more difficult. It is still possible for someone to access a network if they have the password or if they can crack the encryption.

What are the consequences of piggybacking?

Chart of wireless vs. WLAN vs. Wi-FI
Piggybacking can lead to slower internet speeds for everyone on a Wi-Fi network and comprise security.

As stated previously, piggybacking is illegal. People have been fined for accessing hotspots from outside businesses, such as coffee shops, that provide free Wi-Fi for customers' use.

In some cases, people have been arrested for accessing Wi-Fi networks without permission.

Piggybacking can also lead to slower internet speeds for everyone on the network, as well as decreased security.

How can you prevent piggybacking?

The best way to prevent piggybacking is to make sure that the Wi-Fi network and router are properly secured with a strong password.

Also, keep an eye out for people loitering outside of businesses or other places where Wi-Fi is accessible. If users see someone hanging around who doesn't seem to belong, let a manager know.

People should also use a strong password for their Wi-Fi network and make sure that it is not easily guessed. A strong password should be at least eight characters long and include a mix of letters, numbers and special characters.

You can also consider using a virtual private network (VPN) to encrypt your internet traffic and keep your data safe from prying eyes when using public Wi-Fi hotspots that are open to the public.

See also: watering hole attack, dumpster diving, shoulder surfing, social engineering, ransomware

This was last updated in November 2022

Continue Reading About piggybacking

Networking
  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between...

Security
  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or...

  • What is security information and event management (SIEM)?

    Security information and event management (SIEM) is an approach to security management that combines security information ...

CIO
  • product development (new product development)

    Product development -- also called new product management -- is a series of steps that includes the conceptualization, design, ...

  • innovation culture

    Innovation culture is the work environment that leaders cultivate to nurture unorthodox thinking and its application.

  • technology addiction

    Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video ...

HRSoftware
  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
  • contact center agent (call center agent)

    A contact center agent is a person who handles incoming or outgoing customer communications for an organization.

  • contact center management

    Contact center management is the process of overseeing contact center operations with the goal of providing an outstanding ...

  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

Close