A storage administrator is auditing an environment and finds that an unknown person accessed the company silo and removed a number of tapes. These tapes had sensitive company IP and PII on them, now putting the company in a legally precarious situation. Which of the following could the administrator do to ensure that lost data is not usable by an unauthorized person in the future?
A. Password encryption
B. Tape encryption
C. Disk encryption
D. Network encryption