- Tailgating
- This is when an unauthorized person follows an authorized person through a door. It’s a simple and common method of bypassing security doors.
- REX Spoofing
- Some REX systems use motion detectors to sense when someone is exiting. An intruder might use a piece of cardboard, a mirror, or other tools to “spoof” the motion detector into thinking someone is exiting.
- Forced Entry
- This is a brute force method where the intruder physically breaks the door or lock to gain entry. This is less subtle and more likely to trigger alarms.
- Lock Picking/Bypassing
- If the door is secured with a lock, an intruder might try to pick or bypass the lock. This requires specific tools and skills.
- Using a Duplicate or Stolen Key/Card
- If the intruder has access to a duplicate or stolen key or access card, they can simply use that to open the door.
- Social Engineering
- This involves manipulating people into opening the door or giving the intruder their access card or key. This could involve impersonating a maintenance worker, a new employee, or other trusted individuals.
Remember, the effectiveness of these methods will depend on the specific REX system and other security measures in place. Regular security audits and updates to security systems can help mitigate these risks.
