Mechanisms exist to automatically alert incident response personnel to inappropriate or anomalous activities that have potential security incident implications.
Does the organization automatically alert incident response personnel to inappropriate or anomalous activities that have potential security incident implications?