An automated vulnerability assessment report indicates the presence of insecure encryption protocols on the web server hosting an online storefront. Further investigation reveals the server is configured to permit the use of algorithms susceptible to decryption attacks. Which of the following recommendations should the security analyst make to enhance the secure transmission of data?
Modify the server configuration to enforce the use of strong encryption algorithms and eliminate support for the outdated and insecure ones.
Renew the digital certificates associated with the server, as they might be contributing to the vulnerability.
Perform an immediate update of the web platform software to the most current release to address any underlying vulnerabilities.
Turn off encryption on the server to bypass the complexity of configuring protocols until a permanent solution is devised.