After reviewing security logs, it is noticed that sensitive data is being transferred over an insecure network. Which of the following would a cybersecurity analyst BEST recommend that the organization implement?
A. Use a VPN
B. Update the data classification matrix.
C. Segment the networks.
D. Use FIM.
E. Use a digital watermark.