A company wants to secure proprietary information that employees must access while working remotely. Which method would be the optimal solution to protect this information as it travels across potentially unsecured networks?
Ensure password-validated access is required to view sensitive documents.
Implement encryption on specific web services accessible to employees.
Configure network rules to manage which data packets are permitted to travel to and from the remote employees.
Establish a secure connection using encryption for data exchange between systems.
Deploy an automated system for threat detection and response on the company's network.