A company's proprietary application is critical for daily operations, but it runs on an operating system that no longer receives vendor updates. The company's IT team is currently unable to upgrade the system or migrate the application due to compatibility issues. What is the most effective risk mitigation strategy the IT team should implement to secure the legacy system against potential threats?
Conduct regular security audits on the system to ensure compliance with security policies
Implement network segmentation and restrict the system's network connectivity to essential services
Encourage users to employ stronger passwords for system access
Increase security monitoring specifically targeting the unsupported system to detect anomalies