Overview of Progent's Ransomware Forensics Investigation and Reporting Services in San Antonio
Progent's ransomware forensics consultants can preserve the evidence of a ransomware assault and carry out a detailed forensics analysis without interfering with activity required for operational continuity and data restoration. Your San Antonio business can use Progent's forensics documentation to counter subsequent ransomware assaults, assist in the recovery of encrypted data, and meet insurance and governmental mandates.
Ransomware forensics is aimed at tracking and describing the ransomware attack's storyline across the network from beginning to end. This history of how a ransomware attack travelled within the network assists your IT staff to evaluate the damage and uncovers weaknesses in policies or processes that need to be corrected to prevent future breaches. Forensics is typically assigned a high priority by the cyber insurance provider and is typically mandated by state and industry regulations. Because forensics can be time consuming, it is critical that other important recovery processes such as operational resumption are executed in parallel. Progent has an extensive team of IT and data security experts with the skills required to carry out activities for containment, business continuity, and data recovery without interfering with forensics.
Ransomware forensics is time consuming and requires intimate interaction with the groups assigned to data cleanup and, if necessary, settlement talks with the ransomware threat actor. Ransomware forensics can require the review of logs, registry, Group Policy Object, Active Directory, DNS, routers, firewalls, schedulers, and core Windows systems to detect variations.
Services involved with forensics investigation include:
- Isolate but avoid shutting off all potentially impacted devices from the system. This may involve closing all RDP ports and Internet facing network-attached storage, changing admin credentials and user PWs, and implementing 2FA to protect your backups.
- Create forensically sound duplicates of all suspect devices so the file recovery group can get started
- Save firewall, virtual private network, and additional key logs as soon as feasible
- Determine the kind of ransomware used in the attack
- Inspect every computer and data store on the system as well as cloud storage for indications of compromise
- Inventory all compromised devices
- Determine the type of ransomware used in the assault
- Study logs and user sessions to establish the time frame of the ransomware assault and to spot any potential lateral movement from the first compromised system
- Understand the security gaps exploited to carry out the ransomware assault
- Look for the creation of executables associated with the first encrypted files or network compromise
- Parse Outlook PST files
- Examine attachments
- Extract URLs embedded in messages and check to see whether they are malicious
- Produce comprehensive incident documentation to satisfy your insurance and compliance regulations
- List recommended improvements to shore up security gaps and improve processes that lower the risk of a future ransomware exploit
Progent's Qualifications
Progent has provided online and on-premises network services across the United States for over 20 years and has earned Microsoft's Partner certification in the Datacenter and Cloud Productivity competencies. Progent's team of subject matter experts (SMEs) includes professionals who have earned high-level certifications in foundation technology platforms including Cisco infrastructure, VMware, and major distributions of Linux. Progent's data security consultants have earned internationally recognized certifications including CISA, CISSP, and GIAC. (See certifications earned by Progent consultants). Progent also has guidance in financial and Enterprise Resource Planning application software. This broad array of skills allows Progent to salvage and consolidate the undamaged pieces of your network after a ransomware intrusion and rebuild them quickly into a viable network. Progent has collaborated with leading cyber insurance providers including Chubb to help businesses recover from ransomware attacks.
Contact Progent about Ransomware Forensics Investigation Services in San Antonio
To find out more about how Progent can assist your San Antonio business with ransomware forensics, call 1-800-462-8800 or visit Contact Progent.