Your organization uses a popular office suite for document creation and spreadsheet management. The security team has discovered a reported vulnerability in the suite's document rendering component that could allow an attacker to execute arbitrary code. What is the FIRST action that should be taken to mitigate this threat?
Disable internet access for all systems running the vulnerable version of the office suite.
Change the default document format used within the organization to an alternative format.
Install a new, more powerful antivirus solution to detect potential exploitation attempts.
Apply the latest software patch provided by the vendor addressing the vulnerability.