Detecting Office 365 Data
Leakage by an Attacker

An employee gave credentials to a criminal group. The criminal group used these credentials to log into Office 365 from the same geo-location the employee was in, and used the employee’s permissions to read classified information.
Detecting Salesforce Data
Leakage by an Employee

An employee had been approached by one of the company’s competitors to extract Salesforce customer data for competitive advantage.