Which of the following is the BEST method for mitigating the threat?