After reviewing security logs, it is noticed that sensitive data is being transferred over an insecure network.
Which of the following would a cybersecurity analyst BEST recommend that the organization implement?
A . Use a VPN
B . Update the data classification matrix.
C . Segment the networks.
D . Use FI
F . Use a digital watermark.
Answer: A