A large financial institution discovers unusual network traffic patterns at 2 AM. Initial investigation reveals encrypted data being transferred from a server containing customer financial records to an unknown external IP address. The CISO is immediately notified. System logs indicate that the suspicious activity originated from a privileged account belonging to a recently terminated system administrator. The account was supposed to have been disabled during off-boarding last week. What should be the FIRST priority for the incident response team?