Did you think that this only happens in the movies? Think again. Your existing known-to-be-vulnerable devices (i.e., wireless HID devices using MouseJack payload) may be easily exploited by attackers to overcome your ZT efforts. Embrace Zero Trust Hardware Access to verify that ALL of your devices may be trusted. Sepio’s HAC-1: Visibility. Control. RDM. Trust.