Allen, a cybersecurity specialist, obtained event logs from the firewalls, Intrusion Detection Systems (IDS), and proxy servers across a company's network. Upon attempting to correlate the events in the logs, he discovered a discrepancy in their sequence. What could be the cause of this issue?