Overview of Progent's Ransomware Forensics Investigation and Reporting in Akron
Progent's ransomware forensics consultants can capture the evidence of a ransomware assault and perform a detailed forensics investigation without slowing down the processes required for business resumption and data recovery. Your Akron organization can use Progent's ransomware forensics documentation to combat subsequent ransomware attacks, assist in the recovery of lost data, and comply with insurance and regulatory reporting requirements.
Ransomware forensics investigation is aimed at determining and describing the ransomware assault's progress across the network from start to finish. This audit trail of the way a ransomware assault progressed through the network assists you to evaluate the damage and uncovers shortcomings in rules or processes that need to be rectified to avoid future break-ins. Forensics is usually assigned a high priority by the cyber insurance provider and is often mandated by state and industry regulations. Because forensic analysis can take time, it is essential that other key recovery processes such as operational continuity are performed in parallel. Progent has a large team of information technology and data security experts with the knowledge and experience needed to carry out activities for containment, operational resumption, and data recovery without disrupting forensics.
Ransomware forensics is complicated and calls for intimate interaction with the groups focused on data recovery and, if needed, payment negotiation with the ransomware adversary. Ransomware forensics can involve the examination of all logs, registry, GPO, Active Directory, DNS servers, routers, firewalls, scheduled tasks, and basic Windows systems to look for anomalies.
Services involved with forensics investigation include:
- Detach but avoid shutting off all possibly affected devices from the network. This can involve closing all RDP ports and Internet facing network-attached storage, modifying admin credentials and user PWs, and implementing 2FA to protect backups.
- Copy forensically sound digital images of all exposed devices so the file recovery team can proceed
- Preserve firewall, VPN, and other critical logs as quickly as feasible
- Determine the version of ransomware involved in the assault
- Examine every machine and data store on the system as well as cloud storage for signs of encryption
- Catalog all compromised devices
- Determine the type of ransomware involved in the attack
- Study log activity and user sessions in order to establish the timeline of the ransomware assault and to identify any possible sideways movement from the first compromised system
- Understand the security gaps used to carry out the ransomware assault
- Search for new executables associated with the original encrypted files or system breach
- Parse Outlook web archives
- Examine email attachments
- Separate any URLs embedded in email messages and determine if they are malicious
- Produce extensive attack documentation to meet your insurance carrier and compliance mandates
- List recommended improvements to shore up cybersecurity vulnerabilities and enforce processes that reduce the exposure to a future ransomware breach
Progent's Qualifications
Progent has provided online and onsite IT services across the U.S. for over two decades and has earned Microsoft's Partner designation in the Datacenter and Cloud Productivity practice areas. Progent's team of SMEs includes professionals who have been awarded high-level certifications in core technologies including Cisco networking, VMware, and major distributions of Linux. Progent's cybersecurity experts have earned prestigious certifications including CISA, CISSP-ISSAP, and GIAC. (Refer to certifications earned by Progent consultants). Progent also has guidance in financial and ERP application software. This broad array of expertise allows Progent to identify and consolidate the surviving pieces of your IT environment after a ransomware assault and reconstruct them quickly into an operational system. Progent has worked with leading cyber insurance providers including Chubb to assist businesses recover from ransomware assaults.
Contact Progent about Ransomware Forensics Expertise in Akron
To find out more about how Progent can help your Akron business with ransomware forensics analysis, call 1-800-462-8800 or see Contact Progent.