Mechanisms exist to detect and respond to anomalous behavior that could indicate account compromise or other malicious activities.
Does the organization detect and respond to anomalous behavior that could indicate account compromise or other malicious activities?