An employee in the accounting department created a potential security incident by emailing an internal spreadsheet to an external email address. The spreadsheet contained thousands of payment card numbers. A security administrator queried the following filter log and filter policy settings:
Outbound filter log information for the email:
Outbound filter policy settings:
Which of the following would best prevent this scenario from reoccurring without causing disruptions to normal business operations?