Company XYZ has suffered leaks of internally distributed confidential documents. Ann the network security analyst has been tasked to track down the culprit. She has decided to embed a four letter string of characters in documents containing proprietary information. Which of the following initial steps should Ann implement before sending documents?
A. Store one of the documents in a honey pot
B. Start antivirus scan on all the suspected computers
C. Add a signature to the NIDS containing the four letter string
D. Ask employees to report suspicious behaviors