While reviewing access logs for a financial institution, an IT Auditor notices an unusual pattern of multiple failed login attempts on an employee's account. What immediate actions would the Auditor recommend to address this potential security incident?