A loan officer at a multistate banking company was urged by her middle school-aged son to check out some new music he was listening to. Since she was rushing to get to work, he loaded it from his laptop onto a flash drive so she could bring it along. She arrived at work, poured herself a cup of coffee, logged in to her computer, plugged in the portable drive, and opened a music listening program. While she was listening to the new music, malware from her son’s laptop infiltrated the bank’s system, took over her computer, and began spreading. By lunchtime, the private financial information of thousands of customers had been compromised.