Infographic

How to Detect and Mitigate Gold Souvenir

Protect your organization from ransomware attacks


What You’ll Learn

  • The importance of implementing extended monitoring and detection
  • Ways to monitor for unusual usage of legitimate tools
  • Why network segmentation and patching are critical

Gold Souvenir uses a variety of methods to target its victims, including sending phishing emails, exploiting vulnerabilities, and encrypting data.

This infographic provides ways you can safeguard your organization from ransomware attacks.

View Infographic