Overview of Progent's Ransomware Forensics Investigation and Reporting Services in Buffalo
Progent's ransomware forensics experts can capture the system state after a ransomware attack and perform a comprehensive forensics investigation without interfering with activity related to business resumption and data restoration. Your Buffalo business can use Progent's post-attack ransomware forensics report to combat subsequent ransomware attacks, assist in the recovery of encrypted data, and meet insurance carrier and regulatory mandates.
Ransomware forensics analysis involves tracking and documenting the ransomware assault's progress across the targeted network from start to finish. This audit trail of how a ransomware assault progressed through the network assists your IT staff to evaluate the impact and uncovers weaknesses in security policies or work habits that should be corrected to avoid future break-ins. Forensics is typically assigned a top priority by the insurance provider and is typically mandated by state and industry regulations. Since forensic analysis can take time, it is vital that other important recovery processes such as operational resumption are executed in parallel. Progent has a large team of information technology and data security experts with the knowledge and experience required to carry out the work of containment, business resumption, and data restoration without disrupting forensic analysis.
Ransomware forensics analysis is arduous and requires close cooperation with the teams focused on file cleanup and, if needed, settlement discussions with the ransomware adversary. Ransomware forensics can require the examination of all logs, registry, GPO, AD, DNS servers, routers, firewalls, schedulers, and core Windows systems to detect anomalies.
Activities involved with forensics investigation include:
- Isolate without shutting off all possibly suspect devices from the system. This may involve closing all Remote Desktop Protocol (RDP) ports and Internet connected NAS storage, changing admin credentials and user PWs, and configuring two-factor authentication to guard your backups.
- Preserve forensically complete digital images of all exposed devices so the data recovery group can proceed
- Preserve firewall, VPN, and additional critical logs as quickly as possible
- Establish the type of ransomware involved in the attack
- Survey every machine and storage device on the system including cloud storage for indications of compromise
- Catalog all encrypted devices
- Determine the type of ransomware used in the attack
- Study logs and sessions to determine the time frame of the ransomware attack and to identify any potential lateral migration from the originally compromised machine
- Identify the attack vectors used to perpetrate the ransomware attack
- Search for the creation of executables associated with the original encrypted files or network compromise
- Parse Outlook web archives
- Examine email attachments
- Extract URLs embedded in messages and determine whether they are malicious
- Provide comprehensive incident documentation to meet your insurance and compliance requirements
- List recommendations to shore up security gaps and enforce processes that reduce the exposure to a future ransomware breach
Progent's Background
Progent has delivered online and onsite IT services throughout the United States for more than two decades and has been awarded Microsoft's Partner designation in the Datacenter and Cloud Productivity practice areas. Progent's team of subject matter experts (SMEs) includes consultants who have earned advanced certifications in foundation technologies including Cisco networking, VMware, and major Linux distros. Progent's data security consultants have earned industry-recognized certifications including CISA, CISSP-ISSAP, and GIAC. (See certifications earned by Progent consultants). Progent also offers guidance in financial and Enterprise Resource Planning applications. This scope of skills allows Progent to salvage and consolidate the undamaged parts of your network following a ransomware attack and reconstruct them quickly into an operational network. Progent has worked with leading cyber insurance carriers including Chubb to help organizations clean up after ransomware attacks.
Contact Progent about Ransomware Forensics Analysis Expertise in Buffalo
To find out more about how Progent can assist your Buffalo business with ransomware forensics analysis, call 1-800-462-8800 or visit Contact Progent.