Mechanisms exist to continuously monitor inbound and outbound communications traffic for unusual or unauthorized activities or conditions.
Does the organization continuously monitor inbound and outbound communications traffic for unusual or unauthorized activities or conditions?