In a security incident response scenario, a security analyst has discovered that a user account has been compromised and used to perform unauthorized activities on the network. Which of the following steps should the analyst take to mitigate the risk and prevent further unauthorized access?