Progent's Ransomware Forensics Investigation and Reporting Services in Addison
Progent's ransomware forensics consultants can preserve the evidence of a ransomware assault and carry out a comprehensive forensics analysis without slowing down activity required for business resumption and data recovery. Your Addison business can use Progent's post-attack forensics report to block future ransomware assaults, assist in the restoration of encrypted data, and comply with insurance carrier and regulatory requirements.
Ransomware forensics investigation is aimed at determining and describing the ransomware attack's progress throughout the network from beginning to end. This history of how a ransomware assault travelled through the network helps you to evaluate the damage and uncovers shortcomings in policies or processes that should be corrected to prevent later breaches. Forensics is commonly assigned a high priority by the cyber insurance provider and is typically mandated by state and industry regulations. Because forensics can take time, it is vital that other important recovery processes such as operational resumption are performed concurrently. Progent has a large team of information technology and cybersecurity experts with the knowledge and experience needed to perform the work of containment, operational continuity, and data restoration without disrupting forensics.
Ransomware forensics investigation is complicated and requires intimate cooperation with the groups responsible for file restoration and, if necessary, payment discussions with the ransomware attacker. forensics typically involve the review of all logs, registry, GPO, Active Directory, DNS servers, routers, firewalls, schedulers, and basic Windows systems to look for variations.
Services involved with forensics investigation include:
- Disconnect but avoid shutting down all potentially impacted devices from the system. This can require closing all Remote Desktop Protocol (RDP) ports and Internet facing network-attached storage, modifying admin credentials and user PWs, and configuring two-factor authentication to secure backups.
- Copy forensically sound images of all exposed devices so the data restoration team can proceed
- Save firewall, virtual private network, and other key logs as soon as possible
- Identify the variety of ransomware used in the attack
- Inspect every computer and data store on the network as well as cloud-hosted storage for indications of compromise
- Inventory all encrypted devices
- Determine the type of ransomware involved in the attack
- Review log activity and user sessions in order to determine the time frame of the attack and to identify any potential sideways movement from the originally infected machine
- Identify the attack vectors used to perpetrate the ransomware assault
- Look for the creation of executables surrounding the first encrypted files or system compromise
- Parse Outlook PST files
- Examine attachments
- Separate URLs from messages and determine whether they are malware
- Provide extensive attack reporting to meet your insurance and compliance regulations
- Document recommended improvements to close security gaps and enforce processes that reduce the exposure to a future ransomware breach
Progent's Background
Progent has provided remote and onsite network services across the U.S. for more than two decades and has been awarded Microsoft's Partner designation in the Datacenter and Cloud Productivity competencies. Progent's roster of subject matter experts (SMEs) includes professionals who have earned high-level certifications in core technologies such as Cisco networking, VMware virtualization, and popular Linux distros. Progent's cybersecurity experts have earned internationally recognized certifications including CISM, CISSP, and GIAC. (See certifications earned by Progent consultants). Progent also offers guidance in financial management and ERP software. This scope of skills gives Progent the ability to identify and integrate the surviving pieces of your IT environment following a ransomware attack and rebuild them quickly into an operational network. Progent has worked with leading cyber insurance providers like Chubb to assist organizations recover from ransomware attacks.
Contact Progent about Ransomware Forensics Analysis Expertise in Addison
To find out more about ways Progent can assist your Addison organization with ransomware forensics investigation, call 1-800-462-8800 or see Contact Progent.