How to Isolate Malicious Devices Fast – and Protect Your Company and Career