You are a cybersecurity analyst tasked with responding to a ransomware attack on your company's network. Which of the following actions should be prioritized to limit the impact of the attack?
Initiate a legal hold on the compromised data
Isolate infected systems from the network
Implement compensating controls to protect other systems
Re-image the affected machines