A security analyst is reviewing network logs and notices multiple failed login attempts on a user's account from a foreign IP address. The source IP is repeatedly attempting to authenticate using different password combinations from a list found on a recent dark web posting. The analyst should implement which of the following to BEST mitigate this type of attack?
Enhancing network monitoring
Implementing an account lockout policy
Conducting security awareness training
Implementing two-factor authentication
Regularly patching systems