{"id":4566,"date":"2022-09-15T09:47:39","date_gmt":"2022-09-15T08:47:39","guid":{"rendered":"https:\/\/www.digitalid.co.uk\/blog\/?p=4566"},"modified":"2024-11-13T20:42:39","modified_gmt":"2024-11-13T19:42:39","slug":"prevent-access-control-card-cloning","status":"publish","type":"post","link":"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/","title":{"rendered":"How To Prevent Access Control Card Cloning"},"content":{"rendered":"\n<p>Access control cards are commonly used in organisations worldwide. However, more companies are becoming aware that cards can easily be cloned using cheap technology available online.<\/p>\n\n\n\n<p>But don&#8217;t worry &#8211; as <a href=\"https:\/\/www.digitalid.co.uk\/access-control\/contactless-cards\">access control card specialists<\/a>, we&#8217;re here to help.<\/p>\n\n\n\n<p>In this post, we&#8217;re sharing our top tips to help you protect your access control cards from being cloned.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How to prevent your access control cards from getting cloned<\/h2>\n\n\n\n<div class=\"wp-block-uagb-icon-list uagb-block-550eae6d\"><div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-26568e24\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Use modern, secure cards<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-e07ce5b2\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Use the security features available<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-d57a41db\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Opt for programmed cards<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-6cc37803\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Switch to mobile access control<\/span><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Use modern, secure cards<\/h2>\n\n\n\n<p>MIFARE Classic cards are the most popular choice of access control cards. However, they use legacy technology that has been around for years. This old technology hasn&#8217;t been updated and is now unable to keep up with modern threats &#8211; a huge <a href=\"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\">risk of using outdated access cards<\/a>.<\/p>\n\n\n\n<p>We recommend using modern, secure cards to stay protected against card cloning. Our top recommendations are <a href=\"https:\/\/www.digitalid.co.uk\/access-control\/mifare-cards\/mifare-desfire\">MIFARE DESFire cards<\/a> and <a href=\"https:\/\/www.digitalid.co.uk\/access-control\/hid-cards\/hid-iclass-seos\">HID iClass SEOS cards<\/a> which, to date, have not been cloned.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Use the security features available<\/h2>\n\n\n\n<p>To prevent access control cards from getting cloned, administrators should make use of the security features available.<\/p>\n\n\n\n<p>It&#8217;s worth noting that different cards come with different security features. For example, HID SEOS cards use secure cryptography to ensure better protection than any other HID access control card. SEOS cards automatically have their security features turned on.<\/p>\n\n\n\n<p>Other modern access control cards will offer different security features that will help protect your cards.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Opt for programmed cards<\/h2>\n\n\n\n<p>All access control cards come with a card serial number (CSN). Sometimes referred to as the UID, this number is publicly known and offers no security features. It&#8217;s similar to a house number in the sense that every house has a unique number to identify it. The CSN doesn&#8217;t provide secure access and can easily be cloned.<\/p>\n\n\n\n<p>Programming a card involves adding extra information like credential data to the card&#8217;s chip. Programming a card strengthens card security and protects cards from being cloned.<\/p>\n\n\n\n<p>You can find out more about programming an access card in our new blog post, coming soon.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Switch to mobile access control<\/h2>\n\n\n\n<p>One way to stop cards from being cloned is by not using cards at all.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.digitalid.co.uk\/mobile-access\">Mobile access control<\/a> involves using a smartphone to enter the building instead of a card. It uses the same SEOS technology found in iClass SEOS cards, ensuring the highest level of security.<\/p>\n\n\n\n<p>With mobile access, credentials are sent straight to a mobile device, away from prying eyes. What&#8217;s more, these credentials are encrypted and cannot be cloned.<\/p>\n\n\n\n<p>As more organisations become aware of the advancements in card cloning, there has been a large increase in companies switching to mobile access control. Mobile access is one of the most secure access technologies on the market and efficiently solves the access card cloning issue. You can learn more about the <a href=\"https:\/\/www.digitalid.co.uk\/blog\/benefits-of-mobile-access-control\">benefits of mobile access<\/a> here.<\/p>\n\n\n\n<p>The tips above should have provided helpful insights about how to prevent your access control cards from getting cloned. Now, let\u2019s take a brief look at the dangers of cloned access control cards.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The dangers of cloned access control cards<\/h2>\n\n\n\n<p>If an unauthorised individual or criminal gets hold of a cloned access card, they will be able to enter the premises. This could result in:<\/p>\n\n\n\n<div class=\"wp-block-uagb-icon-list uagb-block-98ac84af\"><div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-03fb54ee\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">A security breach<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-91de3259\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Harm being caused to the building, company, staff or data<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-0ef9b14d\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Reputational damage<\/span><\/div>\n<\/div><\/div>\n\n\n\n<p>If any of the above were to occur, they could be extremely costly for your company. That\u2019s why we recommend improving security measures now rather than after finding out your cards have been cloned.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Let&#8217;s Recap<\/strong><\/h2>\n\n\n\n<p>No one wants their access cards to be cloned \u2013 cloned cards mean unauthorised visitors with malicious intent can enter the building and cause harm to your company, staff, data and entire security system.<\/p>\n\n\n\n<p>If that wasn\u2019t enough, cloned cards could also lead to reputational damage and security breaches.<\/p>\n\n\n\n<p>Get in touch on <strong>0800 988 2095<\/strong> to speak to a member of our expert team about improving the security of your access control cards. Our friendly team is available Monday &#8211; Friday from 9am \u2013 5pm and is always happy to help.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Access control cards are commonly used in organisations worldwide. However, more companies are becoming aware that cards can easily be cloned using cheap technology available online. But don&#8217;t worry &#8211; as access control card specialists, we&#8217;re here to help. In this post, we&#8217;re sharing our top tips to help you protect your access control cards [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":5032,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[16],"tags":[],"class_list":["post-4566","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-access-control"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How To Prevent Access Control Card Cloning | Digital ID<\/title>\n<meta name=\"description\" content=\"Access control cards can easily be cloned using cheap technology. Here are our top tips on how to protect your cards from getting copied or cloned.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How To Prevent Access Control Card Cloning | Digital ID\" \/>\n<meta property=\"og:description\" content=\"Access control cards can easily be cloned using cheap technology. Here are our top tips on how to protect your cards from getting copied or cloned.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/\" \/>\n<meta property=\"og:site_name\" content=\"| Digital ID\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/digitalidltd\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-15T08:47:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-13T19:42:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2022\/09\/How-To-Prevent-Access-Control-Card-Cloning.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"734\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Adam Bennett\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DigitalIDltd\" \/>\n<meta name=\"twitter:site\" content=\"@DigitalIDltd\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam Bennett\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/\"},\"author\":{\"name\":\"Adam Bennett\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/person\/90cb6fda6b4d61a914038827fb33a512\"},\"headline\":\"How To Prevent Access Control Card Cloning\",\"datePublished\":\"2022-09-15T08:47:39+00:00\",\"dateModified\":\"2024-11-13T19:42:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/\"},\"wordCount\":706,\"publisher\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2022\/09\/How-To-Prevent-Access-Control-Card-Cloning.png\",\"articleSection\":[\"Access Control\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/\",\"url\":\"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/\",\"name\":\"How To Prevent Access Control Card Cloning | Digital ID\",\"isPartOf\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2022\/09\/How-To-Prevent-Access-Control-Card-Cloning.png\",\"datePublished\":\"2022-09-15T08:47:39+00:00\",\"dateModified\":\"2024-11-13T19:42:39+00:00\",\"description\":\"Access control cards can easily be cloned using cheap technology. Here are our top tips on how to protect your cards from getting copied or cloned.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/#primaryimage\",\"url\":\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2022\/09\/How-To-Prevent-Access-Control-Card-Cloning.png\",\"contentUrl\":\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2022\/09\/How-To-Prevent-Access-Control-Card-Cloning.png\",\"width\":1100,\"height\":734,\"caption\":\"How To Prevent Access Control Card Cloning\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.digitalid.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Prevent Access Control Card Cloning\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#website\",\"url\":\"https:\/\/www.digitalid.co.uk\/blog\/\",\"name\":\"Digital ID Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.digitalid.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#organization\",\"name\":\"| Digital ID\",\"url\":\"https:\/\/www.digitalid.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2024\/11\/digital-ID-logo.png\",\"contentUrl\":\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2024\/11\/digital-ID-logo.png\",\"width\":640,\"height\":196,\"caption\":\"| Digital ID\"},\"image\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/digitalidltd\",\"https:\/\/x.com\/DigitalIDltd\",\"https:\/\/www.linkedin.com\/company\/digital-id\/\",\"https:\/\/www.youtube.com\/user\/DigitalIDltdUK\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/person\/90cb6fda6b4d61a914038827fb33a512\",\"name\":\"Adam Bennett\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/450becc7fde98eb90c0fea8ea793ab4606b813764cdc306fc6da8154d4e62d87?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/450becc7fde98eb90c0fea8ea793ab4606b813764cdc306fc6da8154d4e62d87?s=96&d=mm&r=g\",\"caption\":\"Adam Bennett\"},\"description\":\"Adam is Head of Marketing at Digital ID. He is in charge of the content creation and overseeing all aspects of digital marketing. His work has led him to become a leading authority in the space, being featured in publications such as The Telegraph, Entrepreneur.com, Newsweek and Huffington Post.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How To Prevent Access Control Card Cloning | Digital ID","description":"Access control cards can easily be cloned using cheap technology. Here are our top tips on how to protect your cards from getting copied or cloned.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/","og_locale":"en_GB","og_type":"article","og_title":"How To Prevent Access Control Card Cloning | Digital ID","og_description":"Access control cards can easily be cloned using cheap technology. Here are our top tips on how to protect your cards from getting copied or cloned.","og_url":"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/","og_site_name":"| Digital ID","article_publisher":"https:\/\/www.facebook.com\/digitalidltd","article_published_time":"2022-09-15T08:47:39+00:00","article_modified_time":"2024-11-13T19:42:39+00:00","og_image":[{"width":1100,"height":734,"url":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2022\/09\/How-To-Prevent-Access-Control-Card-Cloning.png","type":"image\/png"}],"author":"Adam Bennett","twitter_card":"summary_large_image","twitter_creator":"@DigitalIDltd","twitter_site":"@DigitalIDltd","twitter_misc":{"Written by":"Adam Bennett","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/#article","isPartOf":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/"},"author":{"name":"Adam Bennett","@id":"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/person\/90cb6fda6b4d61a914038827fb33a512"},"headline":"How To Prevent Access Control Card Cloning","datePublished":"2022-09-15T08:47:39+00:00","dateModified":"2024-11-13T19:42:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/"},"wordCount":706,"publisher":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2022\/09\/How-To-Prevent-Access-Control-Card-Cloning.png","articleSection":["Access Control"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/","url":"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/","name":"How To Prevent Access Control Card Cloning | Digital ID","isPartOf":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2022\/09\/How-To-Prevent-Access-Control-Card-Cloning.png","datePublished":"2022-09-15T08:47:39+00:00","dateModified":"2024-11-13T19:42:39+00:00","description":"Access control cards can easily be cloned using cheap technology. Here are our top tips on how to protect your cards from getting copied or cloned.","breadcrumb":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/#primaryimage","url":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2022\/09\/How-To-Prevent-Access-Control-Card-Cloning.png","contentUrl":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2022\/09\/How-To-Prevent-Access-Control-Card-Cloning.png","width":1100,"height":734,"caption":"How To Prevent Access Control Card Cloning"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalid.co.uk\/blog\/prevent-access-control-card-cloning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.digitalid.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"How To Prevent Access Control Card Cloning"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalid.co.uk\/blog\/#website","url":"https:\/\/www.digitalid.co.uk\/blog\/","name":"Digital ID Blog","description":"","publisher":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalid.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.digitalid.co.uk\/blog\/#organization","name":"| Digital ID","url":"https:\/\/www.digitalid.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2024\/11\/digital-ID-logo.png","contentUrl":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2024\/11\/digital-ID-logo.png","width":640,"height":196,"caption":"| Digital ID"},"image":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/digitalidltd","https:\/\/x.com\/DigitalIDltd","https:\/\/www.linkedin.com\/company\/digital-id\/","https:\/\/www.youtube.com\/user\/DigitalIDltdUK"]},{"@type":"Person","@id":"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/person\/90cb6fda6b4d61a914038827fb33a512","name":"Adam Bennett","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/450becc7fde98eb90c0fea8ea793ab4606b813764cdc306fc6da8154d4e62d87?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/450becc7fde98eb90c0fea8ea793ab4606b813764cdc306fc6da8154d4e62d87?s=96&d=mm&r=g","caption":"Adam Bennett"},"description":"Adam is Head of Marketing at Digital ID. He is in charge of the content creation and overseeing all aspects of digital marketing. His work has led him to become a leading authority in the space, being featured in publications such as The Telegraph, Entrepreneur.com, Newsweek and Huffington Post."}]}},"uagb_featured_image_src":{"full":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2022\/09\/How-To-Prevent-Access-Control-Card-Cloning.png",1100,734,false],"thumbnail":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2022\/09\/How-To-Prevent-Access-Control-Card-Cloning-150x150.png",150,150,true],"medium":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2022\/09\/How-To-Prevent-Access-Control-Card-Cloning-300x200.png",300,200,true],"medium_large":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2022\/09\/How-To-Prevent-Access-Control-Card-Cloning-768x512.png",768,512,true],"large":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2022\/09\/How-To-Prevent-Access-Control-Card-Cloning-1024x683.png",800,534,true],"1536x1536":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2022\/09\/How-To-Prevent-Access-Control-Card-Cloning.png",1100,734,false],"2048x2048":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2022\/09\/How-To-Prevent-Access-Control-Card-Cloning.png",1100,734,false]},"uagb_author_info":{"display_name":"Adam Bennett","author_link":"https:\/\/www.digitalid.co.uk\/blog\/author\/adam-bennett\/"},"uagb_comment_info":0,"uagb_excerpt":"Access control cards are commonly used in organisations worldwide. However, more companies are becoming aware that cards can easily be cloned using cheap technology available online. But don&#8217;t worry &#8211; as access control card specialists, we&#8217;re here to help. In this post, we&#8217;re sharing our top tips to help you protect your access control cards&hellip;","_links":{"self":[{"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=4566"}],"version-history":[{"count":2,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4566\/revisions"}],"predecessor-version":[{"id":5366,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4566\/revisions\/5366"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/media\/5032"}],"wp:attachment":[{"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=4566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=4566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=4566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}