A security analyst at a small regional bank has received an alert that nation states are attempting to infiltrate financial institutions via phishing campaigns. Which of the following techniques should the analyst recommend as a proactive measure to defend against this type of threat?
A. Honeypot
B. Location-based NAC
C. System isolation
D. Mandatory access control
E. Bastion host