A cybersecurity analyst discovers that a critical network component is running software that the vendor no longer supports. Which of the following actions should the analyst recommend to BEST mitigate the associated risk?
Create a custom patch for the component's software.
Isolate the component from the network until it can be updated or replaced.
Implement an AI-based security solution to detect anomalies related to the component.
Increase monitoring of network traffic to and from the outdated component.