This is reminiscent of how phishing and some of the first ransomware attacks began – with physical mail. People would receive CD-ROMs or floppy disks in the mail claiming to have some valuable information or program on them. As soon as they insert it into their computer, the malware that was actually on the disk would execute, just as with this USB. This is a healthy reminder that phishing is not just in email format and users certainly can\’t trust the devices that are out there. That\’s why the whole concept of zero trust first came to light. It\’s important for organizations to continue cyber security awareness training while also implementing policies (such as restricting use of external media) and solutions (such as OS isolation platforms) that can prevent even accidental end user errors from causing significant damage.