After identifying a critical vulnerability in a legacy system for which no patch currently exists, what is the BEST action to reduce the risk?
Increase monitoring and alerting for the affected system to detect potential exploits.
Implement network segmentation to isolate the vulnerable system from the rest of the network.
Communicate the vulnerability to all stakeholders and monitor for any vendor updates.
Disable all network services on the affected system to prevent any potential attack.