A company is performing an audit of their IT assets and discovers several workstations running an operating system that has reached end-of-life status. What is the BEST course of action to mitigate security risks associated with these systems?
Isolate the EOL systems from the network to limit potential exposure.
Perform regular manual security audits on the EOL systems to check for vulnerabilities.
Upgrade the workstations to a currently supported operating system.
Install additional antivirus software on the affected systems.
Implement more stringent network security monitoring to detect any unauthorized access.
Increase cybersecurity awareness training for employees to reduce the chance of a security breach.