The concept of security that this relates to is threat detection. If the company's authentication system detected a login from a different region and device. This is a potential sign of unauthorized access. The company should investigate this login and take steps to prevent unauthorized access in the future.