Lisa is a network administrator and has been reviewing the types of data being transmitted over the network. She discovers that there are several email attachments and files being uploaded to a remote server via FTP that potentially contain PII. What might help her to prevent these files and confidential information from being transmitted outside the organization?