Many business and security personnel are concerned about issues such as duplicated security cards and hacking, but piggybacking is actually far less sophisticated and much more accessible to those who want to gain unauthorized access; particularly for access points that are subject to a high volume of both employee and visitor traffic.