Case Study: Buckman

Buckman Combines Technology with Employee Education to Fight Cybercrime

industry_chemical

INDUSTRY: Chemical

Challneges

CHALLENGE

Preventing a security breach that impacts their customer data is a top priority for Buckman, yet without credential exposure reporting, they were at constant risk.

Solutions

SOLUTION

Buckman consistently monitors employee credentials against SpyCloud’s database of stolen credentials to proactively catch account takeover exposure early, before criminals have the opportunity to compromise employee accounts.

Results

RESULT

With accurate, real-time exposure data at their fingertips, Buckman is able to prove risk, helping executives and employees become more aware of the threat of account takeover and be proactive to prevent it.

Buckman Combines Technology with Employee Education to Fight Cybercrime

Buckman is a global company specializing in innovative chemicals and smart solutions. The company works with customers in pulp and paper, leather, performance chemicals, and industrial water treatment process chemistry. Its goal is to help customers improve their operations by boosting productivity, increasing profitability and ensuring safety, compliance and sustainability.

Challenge: Visibility into The Real Threat of Exposed Credentials

One of Buckman’s strategic initiatives is to apply digital technology in the process of not only applying chemicals but helping customers ensure their processes are efficient and effective. With cyber threats front and center, the company is equally invested in taking appropriate protections to mitigate their own risk by protecting sensitive data.

“Much of what we do is not only to gain the trust of our customers with our chemical and process expertise but with how we treat their private information,” says Scott Herren, director of Global IT Infrastructure at Buckman. “We can’t afford to have a security breach that impacts their data.”

As a Buckman veteran well-versed in cybersecurity, Herren understands many of the attackers find entry points into organizations via unsuspecting employees. Whether by using their company credentials on personal accounts or responding to phishing emails that download malware, employees are often the easiest targets for cybercriminals. Many of Buckman’s employees use multiple devices to access systems with corporate or customer information, compounding the risk.

In fact, Buckman has experienced account takeover of this nature in the past with a phishing attack that made its way to the CEO. “Our CEO had his email account taken over and the cybercriminal sent out a bogus email to a finance associate claiming Buckman’s financial officer authorized a wire transfer,” explains Herren. “The email was convincing, even using actual names and private information.” Fortunately, the team member was well trained in spotting suspicious emails and went directly to the finance officer to verify the email was a scam.

Even with best practices in place, Herren recognized the company needed to add credential exposure reporting to its repertoire of security solutions. Many of its executives didn’t realize their information was exposed and associates didn’t believe their stolen credentials would harm the company or customers. In order to prove the risk to them, Herren wanted hard data to show them the threat was real, from the CEO to the most entry-level associate.

icon-quoteOur CEO had his email account taken over and the cybercriminal sent out a bogus email to a finance associate claiming Buckman’s financial officer authorized a wire transfer.

Solution: Real-time, Usable Data for Immediate Remediation

Buckman already had multiple layers of technology safeguards in place, such as firewalls, automatic security updates, malware prevention, and automatic monitoring of assets. The one thing it lacked was consistent monitoring of employee credentials against a database of stolen credentials. For that, Herren chose SpyCloud.

“We are a chemical company, not a cybersecurity company,” says Herren. “SpyCloud watches multiple areas of the dark web for us, gathers exposed credential data that we never had access to before and presents it in a simple way we can share with associates and corporate leaders to help them understand the level of risk we are facing,” says Herren. “The SpyCloud data is more specific and actionable than any other solution we found, giving us employee, account-level and source detail we need to prove the threat and take immediate action. SpyCloud also shared best practices we could immediately employ. Combined with real-time exposure data, our employees are continually improving their cyber-knowledge and skills.”

Employee education has been a major focus for Herren and something to which SpyCloud has contributed greatly. Teaching associates and executives about the tactics cybercriminals use and the steps they must take to safeguard their accounts are just as important as the technology in place to protect their information, brand and reputation. Today, all Buckman employees understand they are all potential targets and know what to do to lessen the risk.

icon-emailOver 2,000 exposed employee records were detected across 65 different 3rd party breaches since becoming a SpyCloud customer.

Results: Continual Improvement of Cyber Awareness, Skills and Protection

Since implementing SpyCloud as part of its overall technology stack, Buckman has dramatically reduced the risk of a breach. Its executives and associates are proactive in contributing to the company’s security stance, particularly as they receive data on exposed credentials. Information from SpyCloud empowers them to take control of their corporate credentials, which in turn, helps them protect their personal accounts as well.

The success of the SpyCloud solution has been measurable, so much so, that it enabled Herren to obtain budget for weekly phishing prevention training from industry experts. It has become an expectation that associates continually develop their cyber skills and adhere to best practices, including changing their passwords on a regular basis, choosing strong and unique passwords, multi-factor authentication and not using corporate IDs for personal business.

“Criminals have been doing the same thing they’ve been doing for centuries,” says Herren. “They’re just doing it differently now. We can’t fight it all with technology alone. We must also transform our habits to reduce the risk. Our security strategy has come a long way, but we are never complacent. I sleep better at night knowing we are doing as much as we can, while at the same time, always have one eye open to what we need to do next.”

icon-quoteThe SpyCloud data is more specific and actionable than any other solution we’ve found, giving us employee, account-level and source detail we need to mitigate the threat and take immediate action.

Download the PDF version of the case study to print or share with others