A network administrator is evaluating methods to protect the corporate network from external attackers aiming to exploit publicly known software vulnerabilities. Which of the following practices is the BEST approach to minimize the risk of such attacks?
Applying regular patches and firmware updates to systems and applications
Enforcing a policy for frequent password changes among users
Deploying intrusion detection systems to monitor traffic patterns
Configuring a honeypot to attract and analyze attacker behavior