A healthcare clinic uses IoT wearables to monitor patients' vital signs remotely. The IT department is tasked with ensuring the security of patient data collected by these devices. Which of the following actions is MOST effective in preventing unauthorized access to the stored health data on these IoT wearables?
Implement a firewall on the network to which the wearables connect.
Regularly change the Wi-Fi password of the network the wearables connect to.
Encrypt the data on the wearables.
Disable unnecessary services and features on the IoT devices.