During a routine security audit, an IT administrator notices unexpected and irregular traffic patterns when reviewing network logs. The traffic anomalies are consistent with the interception of data between two network nodes. Which security measure should be immediately evaluated and reinforced to mitigate this type of threat?
Implement strong encryption protocols for data transmissions
Improve physical security around networked devices
Update antivirus software on all endpoints
Enable network firewalls to filter incoming and outgoing traffic
Change all network device passwords