Automated mechanisms exist to analyze network traffic to detect covert data exfiltration.
Does the organization use automated mechanisms to analyze network traffic to detect covert data exfiltration?