{"id":1275,"date":"2026-05-07T09:45:20","date_gmt":"2026-05-07T13:45:20","guid":{"rendered":"https:\/\/www.identiphoto.com\/blog\/?p=1275"},"modified":"2026-05-14T12:15:00","modified_gmt":"2026-05-14T16:15:00","slug":"are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials","status":"publish","type":"post","link":"https:\/\/www.identiphoto.com\/blog\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\/","title":{"rendered":"Are Proximity Cards a Security Risk? What Organizations Need to Know About Legacy Credentials"},"content":{"rendered":"\n<p>For decades, ID badges have been a simple and effective way to control access to and within buildings.<\/p>\n\n\n\n<p>An employee taps a badge.<br>A door unlocks.<br>The system logs the event.<\/p>\n\n\n\n<p>Because the process works so seamlessly, many organizations rarely think about the technology behind the credential.<\/p>\n\n\n\n<p>The reality, however, is that a large percentage of access credentials still in use today were designed more than thirty years ago. While cybersecurity defenses have evolved rapidly, many physical access control systems continue to rely on credential technologies that offer little protection against cloning or unauthorized duplication.<\/p>\n\n\n\n<p>At the same time, buildings themselves are becoming smarter. Access control systems are increasingly integrated with identity management platforms, surveillance systems, and operational technologies across the organization.<\/p>\n\n\n\n<p>As this ecosystem grows, the risks associated with legacy badge technologies are becoming increasingly difficult to ignore.<\/p>\n\n\n\n<p><strong>The Security Problem with 125 kHz Proximity Cards<\/strong><strong><br><\/strong>Low-frequency <strong>125 kHz proximity cards<\/strong>, commonly known as <a href=\"https:\/\/www.identiphoto.com\/cards\/technology-cards.html?techcard_technology=125+kHz+Prox\"><strong>Prox cards<\/strong><\/a>, remain one of the most widely deployed access credentials in North America.<\/p>\n\n\n\n<p>They gained popularity because they were simple, reliable, and inexpensive to deploy. For many years, they served organizations well as a convenient replacement for mechanical keys.<\/p>\n\n\n\n<p>However, they were never designed to defend against modern security threats.<\/p>\n\n\n\n<p>Proximity cards operate by transmitting a <strong>fixed identification number<\/strong> to a reader. If the information matches a credential stored in the access control database, the system grants access.<\/p>\n\n\n\n<p>The identifier itself is not encrypted.<\/p>\n\n\n\n<p>If someone captures that number, it can be copied.<\/p>\n\n\n\n<p>Devices capable of reading and duplicating Prox credentials are inexpensive and widely available. Security researchers and physical security professionals have repeatedly demonstrated how easily these cards can be cloned using handheld RFID tools.<\/p>\n\n\n\n<p>From the perspective of the access control system, the copied credential is indistinguishable from the original card.<\/p>\n\n\n\n<p>That means a cloned badge can unlock doors, trigger access events, work in additional systems utilizing the cards, and appear in security logs under the identity of the legitimate employee who owns the badge.<br><strong><br>A Real-World Example of Credential Cloning<br><\/strong>Security analysts have repeatedly demonstrated the weaknesses of legacy proximity cards.<\/p>\n\n\n\n<p>In one widely referenced physical security test, researchers used a low-cost RFID cloning device to copy several proximity credentials used in real facilities.<\/p>\n\n\n\n<p>The cloned cards worked immediately.<\/p>\n\n\n\n<p>Doors unlocked.<br>Access events were logged normally.<br>The systems treated the duplicated cards as legitimate credentials.<\/p>\n\n\n\n<p>From the system\u2019s perspective, nothing unusual occurred.<\/p>\n\n\n\n<p>In reality, however, <strong>two identical credentials now existed<\/strong>, and the organization had no reliable way to determine which one was used.<\/p>\n\n\n\n<p>This is one of the most significant concerns with legacy credential technologies. Once cloning occurs, accountability is lost.<\/p>\n\n\n\n<p><strong><br><\/strong><strong>Why Modern Security Ecosystems Raise the Stakes<\/strong><strong><br><\/strong>The risks associated with weak credentials become even greater as organizations move toward <strong>interoperable security systems<\/strong>.<\/p>\n\n\n\n<p>What are interoperable security systems? Interoperable security systems are security technologies designed to work together seamlessly, even if they come from different manufacturers or platforms.<\/p>\n\n\n\n<p>Instead of operating in isolation, these systems share data, communicate in real time, and coordinate responses.<\/p>\n\n\n\n<p>Access control platforms today rarely operate as standalone systems. Instead, they are integrated with a wide range of technologies across the organization, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Video surveillance platforms<\/li>\n\n\n\n<li>Visitor management systems<\/li>\n\n\n\n<li>Human resources and identity governance platforms<\/li>\n\n\n\n<li>Building automation systems<\/li>\n\n\n\n<li>Incident management tools<\/li>\n<\/ul>\n\n\n\n<p>These integrations allow organizations to automate provisioning, manage identities more efficiently, and improve operational visibility across facilities.<\/p>\n\n\n\n<p>But they also mean that <strong>a compromised credential can impact multiple systems simultaneously<\/strong>.<\/p>\n\n\n\n<p>A cloned badge may not simply unlock a door. It could also generate inaccurate identity records, trigger automated building events, or grant unauthorized access to multiple restricted areas.<\/p>\n\n\n\n<p>As organizations build more connected security environments, the strength of the credential itself becomes more critical.<br><\/p>\n\n\n\n<p><strong>ID Cards Are Now Used for Much More Than Doors<br><\/strong>Credential technologies such as <a href=\"https:\/\/www.identiphoto.com\/cards\/technology-cards.html?techcard_mfg=HID&amp;techcard_technology=13.56+MHz+iClass+Seos\"><strong>HID SEOS<\/strong><\/a> provide strong encryptionand allow a single badge to securely support multiple services throughout an organization. Prox technology can also support multiple functions, but if compromised, the cards will work across all associated systems, making encryption critical in today&#8217;s security and IT ecosystems.&nbsp;<\/p>\n\n\n\n<p>In many environments today, ID cards support functions such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Time and Attendance Management<\/li>\n\n\n\n<li>Healthcare Identification and Medical Workflows<\/li>\n\n\n\n<li>Cashless Payments<\/li>\n\n\n\n<li>Visitor Management<\/li>\n\n\n\n<li>Logical Access<\/li>\n\n\n\n<li>Smart Printing<\/li>\n<\/ul>\n\n\n\n<p>Many organizations are also deploying <strong>multi-technology credentials<\/strong> that combine several chip technologies on a single badge. This enables organizations to support multiple systems at the same time while gradually transitioning to newer technologies. These cards also make it easier to move from legacy access control readers to models that support more secure technologies. Large organizations often need to replace thousands of readers, and the new generation of access control readers, such as HID Signo, can support both legacy technology (Prox) and newer, more secure technology (HID SEOS) simultaneously during the transition.&nbsp;<\/p>\n\n\n\n<p>For example, a single card may support secure building access, secure printing, and payment systems, while still maintaining compatibility with older infrastructure during transition periods.<\/p>\n\n\n\n<p>Organizations exploring these strategies can learn more about this approach in this article: <a href=\"https:\/\/www.identiphoto.com\/blog\/the-power-of-combining-technologies-on-id-cards-for-enhanced-functionality\/\"><strong>The Power of Combining Technologies on ID Cards for Enhanced Functionality<\/strong><\/a><\/p>\n\n\n\n<p>When a credential becomes the key to multiple operational systems, protecting that credential becomes significantly more important.<\/p>\n\n\n\n<p>A cloned badge no longer represents only a door access problem. It can affect time and attendance, operational systems, and identity records across the organization.<\/p>\n\n\n\n<p><strong>Credential Technology Comparison<\/strong><strong><br><\/strong>As organizations evaluate upgrades, it helps to understand the differences between common credential technologies.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"692\" src=\"https:\/\/www.identiphoto.com\/blog\/wp-content\/uploads\/2026\/05\/screenshot-2026-05-14-at-12.12.10-pm-1024x692.png\" alt=\"Table comparing access control credential types, showing frequency, security level, encryption, common risks, and typical use cases for Prox, iCLASS, HID SEOS, and HID Mobile credentials.\" class=\"wp-image-1295\" srcset=\"https:\/\/www.identiphoto.com\/blog\/wp-content\/uploads\/2026\/05\/screenshot-2026-05-14-at-12.12.10-pm-1024x692.png 1024w, https:\/\/www.identiphoto.com\/blog\/wp-content\/uploads\/2026\/05\/screenshot-2026-05-14-at-12.12.10-pm-300x203.png 300w, https:\/\/www.identiphoto.com\/blog\/wp-content\/uploads\/2026\/05\/screenshot-2026-05-14-at-12.12.10-pm-768x519.png 768w, https:\/\/www.identiphoto.com\/blog\/wp-content\/uploads\/2026\/05\/screenshot-2026-05-14-at-12.12.10-pm.png 1308w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Stay tuned for part two, where we discuss why organizations are migrating to secure smart credentials and how that helps their future strategy. Then, part three will discuss mobile credentials.&nbsp;<\/p>\n\n\n\n<p>Not sure where to start? If you would like to discuss your organization\u2019s ID program, security goals, or upcoming projects, we would be happy to help. Call <strong>(800) 860-9111, <\/strong>contact your ID consultant,<strong> <\/strong>or <a href=\"https:\/\/www.identiphoto.com\/contact\"><strong>Contact Us<\/strong><\/a> to schedule a consultation and explore the options available for your environment.<\/p>\n\n\n\n<p>ABOUT THE AUTHOR: Since starting in 2015, Bill Eglet has become a seasoned professional who has served as Vice President of Sales and Marketing in the Identification industry. With extensive experience, Bill has unmatched expertise in ID badging, visitor management, and broader identification solutions. His insights offer valuable perspectives for navigating the complex world of identification technologies and industry trends, helping you stay ahead in this constantly evolving field.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For decades, ID badges have been a simple and effective way to control access to and within buildings. An employee taps a badge.A door unlocks.The system logs the event. Because the process works so seamlessly, many organizations rarely think about the technology behind the credential. The reality, however, is that a large percentage of access [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1277,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[21,26],"tags":[51,52,20,49,48,50,19],"class_list":["post-1275","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-id-solutions","category-mobile-solutions","tag-access-control","tag-hid-seos","tag-id-card","tag-id-solutions","tag-prox-cards","tag-security-systems","tag-visitor-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Are Proximity Cards a Security Risk? What Organizations Need to Know About Legacy Credentials - ID Insights<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.identiphoto.com\/blog\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are Proximity Cards a Security Risk? What Organizations Need to Know About Legacy Credentials - ID Insights\" \/>\n<meta property=\"og:description\" content=\"For decades, ID badges have been a simple and effective way to control access to and within buildings. An employee taps a badge.A door unlocks.The system logs the event. Because the process works so seamlessly, many organizations rarely think about the technology behind the credential. The reality, however, is that a large percentage of access [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.identiphoto.com\/blog\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\/\" \/>\n<meta property=\"og:site_name\" content=\"ID Insights\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-07T13:45:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-14T16:15:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.identiphoto.com\/blog\/wp-content\/uploads\/2026\/05\/image002-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"371\" \/>\n\t<meta property=\"og:image:height\" content=\"246\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Bill Eglet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bill Eglet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\\\/\"},\"author\":{\"name\":\"Bill Eglet\",\"@id\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/#\\\/schema\\\/person\\\/0ed94215b72acfd30c963bd886633eb6\"},\"headline\":\"Are Proximity Cards a Security Risk? What Organizations Need to Know About Legacy Credentials\",\"datePublished\":\"2026-05-07T13:45:20+00:00\",\"dateModified\":\"2026-05-14T16:15:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\\\/\"},\"wordCount\":1066,\"publisher\":{\"@id\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/image002-1.png\",\"keywords\":[\"access control\",\"HID SEOS\",\"ID card\",\"ID Solutions\",\"Prox Cards\",\"security systems\",\"visitor management\"],\"articleSection\":[\"ID Solutions\",\"Mobile Solutions\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\\\/\",\"url\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\\\/\",\"name\":\"Are Proximity Cards a Security Risk? What Organizations Need to Know About Legacy Credentials - ID Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/image002-1.png\",\"datePublished\":\"2026-05-07T13:45:20+00:00\",\"dateModified\":\"2026-05-14T16:15:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/image002-1.png\",\"contentUrl\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/image002-1.png\",\"width\":371,\"height\":246,\"caption\":\"A person stands in front of a wooden door, holding a key card up to an electronic access panel.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are Proximity Cards a Security Risk? What Organizations Need to Know About Legacy Credentials\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/\",\"name\":\"ID Insights\",\"description\":\"Discover the latest insights and industry expertise on cutting-edge ID badging software, visitor management solutions, and industry-specific identification practices on IDentiphoto Company&#039;s ID Insights blog.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/#organization\",\"name\":\"ID Insights\",\"url\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/identiphoto-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/identiphoto-logo.png\",\"width\":707,\"height\":130,\"caption\":\"ID Insights\"},\"image\":{\"@id\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/#\\\/schema\\\/person\\\/0ed94215b72acfd30c963bd886633eb6\",\"name\":\"Bill Eglet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1d5bd081870ea9ef65df27fa392c2bf0b50b319e669d9760e3a121b29b9c5d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1d5bd081870ea9ef65df27fa392c2bf0b50b319e669d9760e3a121b29b9c5d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1d5bd081870ea9ef65df27fa392c2bf0b50b319e669d9760e3a121b29b9c5d?s=96&d=mm&r=g\",\"caption\":\"Bill Eglet\"},\"url\":\"https:\\\/\\\/www.identiphoto.com\\\/blog\\\/author\\\/bill-eglet\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Are Proximity Cards a Security Risk? What Organizations Need to Know About Legacy Credentials - ID Insights","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.identiphoto.com\/blog\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\/","og_locale":"en_US","og_type":"article","og_title":"Are Proximity Cards a Security Risk? What Organizations Need to Know About Legacy Credentials - ID Insights","og_description":"For decades, ID badges have been a simple and effective way to control access to and within buildings. An employee taps a badge.A door unlocks.The system logs the event. Because the process works so seamlessly, many organizations rarely think about the technology behind the credential. The reality, however, is that a large percentage of access [&hellip;]","og_url":"https:\/\/www.identiphoto.com\/blog\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\/","og_site_name":"ID Insights","article_published_time":"2026-05-07T13:45:20+00:00","article_modified_time":"2026-05-14T16:15:00+00:00","og_image":[{"width":371,"height":246,"url":"https:\/\/www.identiphoto.com\/blog\/wp-content\/uploads\/2026\/05\/image002-1.png","type":"image\/png"}],"author":"Bill Eglet","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bill Eglet","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.identiphoto.com\/blog\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\/#article","isPartOf":{"@id":"https:\/\/www.identiphoto.com\/blog\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\/"},"author":{"name":"Bill Eglet","@id":"https:\/\/www.identiphoto.com\/blog\/#\/schema\/person\/0ed94215b72acfd30c963bd886633eb6"},"headline":"Are Proximity Cards a Security Risk? What Organizations Need to Know About Legacy Credentials","datePublished":"2026-05-07T13:45:20+00:00","dateModified":"2026-05-14T16:15:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.identiphoto.com\/blog\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\/"},"wordCount":1066,"publisher":{"@id":"https:\/\/www.identiphoto.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.identiphoto.com\/blog\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\/#primaryimage"},"thumbnailUrl":"https:\/\/www.identiphoto.com\/blog\/wp-content\/uploads\/2026\/05\/image002-1.png","keywords":["access control","HID SEOS","ID card","ID Solutions","Prox Cards","security systems","visitor management"],"articleSection":["ID Solutions","Mobile Solutions"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.identiphoto.com\/blog\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\/","url":"https:\/\/www.identiphoto.com\/blog\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\/","name":"Are Proximity Cards a Security Risk? What Organizations Need to Know About Legacy Credentials - ID Insights","isPartOf":{"@id":"https:\/\/www.identiphoto.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.identiphoto.com\/blog\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\/#primaryimage"},"image":{"@id":"https:\/\/www.identiphoto.com\/blog\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\/#primaryimage"},"thumbnailUrl":"https:\/\/www.identiphoto.com\/blog\/wp-content\/uploads\/2026\/05\/image002-1.png","datePublished":"2026-05-07T13:45:20+00:00","dateModified":"2026-05-14T16:15:00+00:00","breadcrumb":{"@id":"https:\/\/www.identiphoto.com\/blog\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.identiphoto.com\/blog\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.identiphoto.com\/blog\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\/#primaryimage","url":"https:\/\/www.identiphoto.com\/blog\/wp-content\/uploads\/2026\/05\/image002-1.png","contentUrl":"https:\/\/www.identiphoto.com\/blog\/wp-content\/uploads\/2026\/05\/image002-1.png","width":371,"height":246,"caption":"A person stands in front of a wooden door, holding a key card up to an electronic access panel."},{"@type":"BreadcrumbList","@id":"https:\/\/www.identiphoto.com\/blog\/are-proximity-cards-a-security-risk-what-organizations-need-to-know-about-legacy-credentials\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.identiphoto.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Are Proximity Cards a Security Risk? What Organizations Need to Know About Legacy Credentials"}]},{"@type":"WebSite","@id":"https:\/\/www.identiphoto.com\/blog\/#website","url":"https:\/\/www.identiphoto.com\/blog\/","name":"ID Insights","description":"Discover the latest insights and industry expertise on cutting-edge ID badging software, visitor management solutions, and industry-specific identification practices on IDentiphoto Company&#039;s ID Insights blog.","publisher":{"@id":"https:\/\/www.identiphoto.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.identiphoto.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.identiphoto.com\/blog\/#organization","name":"ID Insights","url":"https:\/\/www.identiphoto.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.identiphoto.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.identiphoto.com\/blog\/wp-content\/uploads\/2026\/03\/identiphoto-logo.png","contentUrl":"https:\/\/www.identiphoto.com\/blog\/wp-content\/uploads\/2026\/03\/identiphoto-logo.png","width":707,"height":130,"caption":"ID Insights"},"image":{"@id":"https:\/\/www.identiphoto.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.identiphoto.com\/blog\/#\/schema\/person\/0ed94215b72acfd30c963bd886633eb6","name":"Bill Eglet","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1d5bd081870ea9ef65df27fa392c2bf0b50b319e669d9760e3a121b29b9c5d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1d5bd081870ea9ef65df27fa392c2bf0b50b319e669d9760e3a121b29b9c5d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1d5bd081870ea9ef65df27fa392c2bf0b50b319e669d9760e3a121b29b9c5d?s=96&d=mm&r=g","caption":"Bill Eglet"},"url":"https:\/\/www.identiphoto.com\/blog\/author\/bill-eglet\/"}]}},"_links":{"self":[{"href":"https:\/\/www.identiphoto.com\/blog\/wp-json\/wp\/v2\/posts\/1275","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.identiphoto.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identiphoto.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identiphoto.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identiphoto.com\/blog\/wp-json\/wp\/v2\/comments?post=1275"}],"version-history":[{"count":4,"href":"https:\/\/www.identiphoto.com\/blog\/wp-json\/wp\/v2\/posts\/1275\/revisions"}],"predecessor-version":[{"id":1297,"href":"https:\/\/www.identiphoto.com\/blog\/wp-json\/wp\/v2\/posts\/1275\/revisions\/1297"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.identiphoto.com\/blog\/wp-json\/wp\/v2\/media\/1277"}],"wp:attachment":[{"href":"https:\/\/www.identiphoto.com\/blog\/wp-json\/wp\/v2\/media?parent=1275"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identiphoto.com\/blog\/wp-json\/wp\/v2\/categories?post=1275"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identiphoto.com\/blog\/wp-json\/wp\/v2\/tags?post=1275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}