Detecting and Preventing Data Exfiltration Follow