Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

Pt. 1: 5 Scary security stories to learn from

December 30, 2020

Pt. 1: 5 Scary security stories to learn from
powered by Sounder

This is the third episode in Ingram Micro’s replay series, where we share with you some of our favorite episodes over the last year that will be helpful to you right now.

If you love the movie Oceans 11 (or 12, 13, or 8)…

you’ll love this 2-part episode about organized crime.  

In this episode from October 2019, Chris Paffrath and Bill Vogtsberger, two of Ingram’s top security leaders, discuss fascinating yet scary real life examples of organized crime. 


In the first part of this episode you’ll get to hear about how a new facility became the perfect scenario for being attacked, lessons learned on how to be prepared, and why you need to educate your staff on security. 

As we head into the new year, now is a great time to make sure your security is up to date and ready to take on new challenges. Learn more about how to be involved with Ingram Micro’s Security BU program by contacting Irma Garcia.


1. The Harrisburg Break-In

The situation: As Ingram Micro was still establishing its facility in Harrisburg, PA, there was a strong influence in the area from Eastern European crime groups.
The YACS, as they like to call themselves, is a criminal organization made up of Yugoslavian, Albanian, Croatian, and Serbian individuals.
Due to their intensive research and planning, YACS was able to infiltrate and steal product to resell at 100% markup.
What we learned: 
  • Have security redundancies in place
  • Establish a cellular backup plan for any threats
  • Simulate a break-in to test security processes
"Do a complete walk test of your facility prior to assuming everything's functional." - Chris Paffrath


2. The Driver Collusion in Jonestown

The situation: A driver cleverly convinced a disgruntled Ingram Micro employee to print duplicate shipping labels in order to sell the extra product on the grey market.
The con man and his assistant loaded the product onto his truck, bypassing any other workers who might’ve noticed.
What we learned:
Although it’s impossible to completely stop collusion, having a system of checks and balances significantly lessens the chance of two or more individuals teaming up for criminal activity.
“You can’t control the human element.” - Bill Vogtsberger


3. The Corporate ID Theft

The situation: Through exhaustive research and planning, a criminal group based out of Western Africa was able to mirror a Fortune 500 corporation.
Posing as individuals at this Fortune 500, the group was able to open reseller accounts on credit at Ingram Micro and several of its competitors.
What we learned: 
  • Have internal anti-phishing campaigns in place
  • Educate employees on identifying threats

These stories have helped Ingram Micro consistently improve its security and processes. We hope these lessons also help your team prevent security breaches.