A security analyst is reviewing network logs and notices multiple failed login attempts on a user's account from a foreign IP address. The source IP is repeatedly attempting to authenticate using different password combinations from a list found on a recent dark web posting. The analyst should implement which of the following to BEST mitigate this type of attack?
Enhancing network monitoring
Conducting security awareness training
Implement a HIDS and NIPS
Implementing an account lockout policy
Regularly patching systems