Progent's Ransomware Forensics Analysis and Reporting in Birmingham
Progent's ransomware forensics experts can save the evidence of a ransomware attack and perform a comprehensive forensics investigation without interfering with activity required for operational resumption and data recovery. Your Birmingham business can use Progent's forensics report to combat future ransomware attacks, validate the cleanup of encrypted data, and comply with insurance and regulatory reporting requirements.
Ransomware forensics investigation involves tracking and describing the ransomware assault's progress across the network from beginning to end. This history of how a ransomware attack travelled within the network helps your IT staff to assess the impact and uncovers gaps in rules or processes that should be corrected to avoid later breaches. Forensic analysis is commonly assigned a high priority by the cyber insurance carrier and is typically mandated by government and industry regulations. Because forensic analysis can take time, it is essential that other key activities like business resumption are pursued in parallel. Progent has a large team of information technology and cybersecurity experts with the skills needed to carry out the work of containment, business resumption, and data recovery without disrupting forensics.
Ransomware forensics analysis is complex and calls for close cooperation with the teams focused on file recovery and, if needed, payment discussions with the ransomware adversary. Ransomware forensics typically require the examination of logs, registry, GPO, Active Directory, DNS servers, routers, firewalls, scheduled tasks, and core Windows systems to detect changes.
Services associated with forensics analysis include:
- Disconnect without shutting off all possibly suspect devices from the system. This can involve closing all Remote Desktop Protocol (RDP) ports and Internet facing network-attached storage, modifying admin credentials and user passwords, and implementing two-factor authentication to protect backups.
- Preserve forensically complete duplicates of all suspect devices so your data recovery group can proceed
- Save firewall, VPN, and other key logs as soon as feasible
- Determine the variety of ransomware involved in the attack
- Examine every machine and data store on the system including cloud storage for indications of compromise
- Inventory all compromised devices
- Determine the type of ransomware used in the attack
- Review log activity and sessions to establish the timeline of the ransomware assault and to identify any potential sideways migration from the first compromised system
- Understand the attack vectors used to perpetrate the ransomware attack
- Look for the creation of executables surrounding the original encrypted files or network compromise
- Parse Outlook web archives
- Analyze attachments
- Extract any URLs from messages and check to see if they are malicious
- Provide extensive incident documentation to satisfy your insurance carrier and compliance mandates
- Document recommendations to close security vulnerabilities and enforce processes that lower the risk of a future ransomware breach
Progent's Background
Progent has provided remote and onsite IT services throughout the U.S. for over two decades and has been awarded Microsoft's Gold Partner designation in the Datacenter and Cloud Productivity competencies. Progent's team of SMEs includes consultants who have been awarded high-level certifications in core technology platforms such as Cisco networking, VMware virtualization, and major distributions of Linux. Progent's cybersecurity consultants have earned industry-recognized certifications including CISM, CISSP-ISSAP, and CRISC. (See Progent's certifications). Progent also has guidance in financial management and ERP application software. This broad array of expertise gives Progent the ability to salvage and consolidate the surviving pieces of your IT environment after a ransomware attack and reconstruct them rapidly into a viable network. Progent has collaborated with leading cyber insurance providers like Chubb to help businesses clean up after ransomware assaults.
Contact Progent about Ransomware Forensics Analysis Services in Birmingham
To find out more about ways Progent can help your Birmingham organization with ransomware forensics analysis, call 1-800-462-8800 or see Contact Progent.