Mechanisms exist to utilize honeyclients that proactively seek to identify malicious websites and/or web-based malicious code.
Does the organization utilize honeyclients that proactively seek to identify malicious websites and/or web-based malicious code?