During a routine security audit, an IT administrator notices unexpected and irregular traffic patterns when reviewing network logs. The traffic anomalies are consistent with the interception of data between two network nodes. Which security measure should be immediately evaluated and reinforced to mitigate this type of threat?
Enable network firewalls to filter incoming and outgoing traffic
Implement strong encryption protocols for data transmissions
Update antivirus software on all endpoints
Change all network device passwords
Improve physical security around networked devices