Overview of Progent's Ransomware Forensics Investigation and Reporting in Addison
Progent's ransomware forensics consultants can capture the system state after a ransomware assault and perform a comprehensive forensics analysis without interfering with activity required for operational continuity and data restoration. Your Addison organization can utilize Progent's post-attack ransomware forensics documentation to combat future ransomware attacks, validate the recovery of encrypted data, and meet insurance and regulatory requirements.
Ransomware forensics investigation is aimed at discovering and documenting the ransomware assault's progress throughout the targeted network from beginning to end. This history of how a ransomware assault travelled within the network assists your IT staff to assess the impact and brings to light weaknesses in policies or processes that should be corrected to prevent future breaches. Forensic analysis is commonly assigned a high priority by the insurance carrier and is often required by government and industry regulations. Because forensic analysis can be time consuming, it is essential that other key recovery processes such as operational continuity are executed concurrently. Progent maintains a large team of IT and security experts with the skills required to carry out the work of containment, operational resumption, and data recovery without disrupting forensic analysis.
Ransomware forensics investigation is arduous and calls for close cooperation with the teams focused on data cleanup and, if needed, payment discussions with the ransomware attacker. forensics typically require the review of logs, registry, GPO, Active Directory, DNS servers, routers, firewalls, schedulers, and basic Windows systems to check for anomalies.
Activities involved with forensics investigation include:
- Disconnect but avoid shutting off all potentially suspect devices from the system. This may involve closing all Remote Desktop Protocol (RDP) ports and Internet connected network-attached storage, changing admin credentials and user PWs, and implementing 2FA to protect backups.
- Copy forensically valid images of all exposed devices so your file recovery group can proceed
- Save firewall, VPN, and additional critical logs as quickly as feasible
- Identify the kind of ransomware used in the attack
- Inspect every computer and storage device on the network including cloud-hosted storage for indications of encryption
- Catalog all encrypted devices
- Determine the type of ransomware used in the assault
- Review logs and user sessions in order to determine the time frame of the attack and to identify any potential sideways movement from the originally compromised system
- Identify the security gaps used to perpetrate the ransomware assault
- Search for the creation of executables surrounding the first encrypted files or system compromise
- Parse Outlook web archives
- Analyze email attachments
- Extract any URLs embedded in messages and check to see whether they are malware
- Provide extensive attack reporting to satisfy your insurance carrier and compliance regulations
- List recommendations to shore up security gaps and enforce workflows that reduce the exposure to a future ransomware breach
Progent's Qualifications
Progent has delivered online and onsite network services across the United States for over two decades and has been awarded Microsoft's Gold Partner certification in the Datacenter and Cloud Productivity practice areas. Progent's roster of subject matter experts includes professionals who have been awarded high-level certifications in core technology platforms including Cisco networking, VMware, and popular distributions of Linux. Progent's cybersecurity experts have earned industry-recognized certifications including CISA, CISSP, and GIAC. (Refer to Progent's certifications). Progent also offers top-tier support in financial and ERP application software. This breadth of expertise gives Progent the ability to identify and consolidate the surviving pieces of your network following a ransomware assault and reconstruct them quickly into a functioning system. Progent has worked with top cyber insurance carriers like Chubb to assist organizations recover from ransomware attacks.
Contact Progent about Ransomware Forensics Investigation Expertise in Addison
To learn more information about ways Progent can help your Addison business with ransomware forensics, call 1-800-462-8800 or visit Contact Progent.