An international finance company has implemented a security solution to prevent sensitive information from being shared externally through emails. A security analyst notices that an employee has successfully sent an email containing encrypted credit card information to a personal email address. Which of the following is most likely the reason the security system failed to detect and block this event?
The security solution does not inspect encrypted email contents.
The security solution does not support monitoring for financial data.
The security solution was not configured to monitor emails sent to personal email addresses.
The employee used a personal email client which bypasses the security solution.