in the last few modules, I showed you how these attacks work with some hands on labs of three different types of attacks.
In this video, we'll talk about some strategies to defend yourself against these attacks
because, as you know, they're rather hard to defend against. But there are a few things you can do.
Ah, the number one piece of advice I can give you always is to never plug in a strange USB device if you don't know whose it is, where it's coming from. Um, best advice. Just don't plug it in. May be turning into a lost and found
and let the last and found person Oh, hey, don't plug it in either, because that could, uh, get, uh,
it may be tempting to see what's inside, or he may be really wanting to help someone find and give it back to them,
but it's really not worth the risk. I mean, there's a number of things that you get. You get a key logger installed, get your financial information stolen.
Some type of Mao where it can be installed in computer ory, as we saw with the USB. Kill your computer could be destroyed, and that's really not worth it.
Attackers really put
a lot of thought and effort into these sorts of attacks, and they could be more sophisticated than you could imagine.
S so it's really just just stay away. Now, certain organizations do do a lot to protect themselves. They could put physical pieces of plastic to actually blocked ports,
although those don't really work as well cause a lot of times you can remove those with, like, knives or
They could disable USB ports. They could do that number ways through hardware or maybe through the registry. Um,
and some some companies just banned them, but they don't take steps to actually stop them from being used. And that doesn't really work. Ah, lot because people people find USB device is very, very convenient when they need need to move storage around.
So sometimes that doesn't always work.
Um, but you can do those things