An organization has noticed that employees are accessing sensitive files unrelated to their responsibilities. The company wants to ensure that users can access only the data required for their tasks. Which of the following methods would BEST address this issue?
Enforcing multi-factor authentication
Applying network segmentation
Encrypting all sensitive files
Implementing role-based access control