This is how you end up with three layers of VMs for browsing the internet. Some gov organizations go a little into the deep end of security in the security-usability continuum.
on disposable VM reached via thin client remote desktop software on an air gapped PC in a windowless room in the basement behind a locked door with a warning sign: beware of the leopard