Overview of Progent's Ransomware Forensics and Reporting in Durham
Progent's ransomware forensics consultants can preserve the system state after a ransomware assault and perform a detailed forensics investigation without disrupting activity related to business continuity and data restoration. Your Durham business can utilize Progent's ransomware forensics report to block future ransomware assaults, validate the cleanup of encrypted data, and meet insurance carrier and regulatory requirements.
Ransomware forensics investigation is aimed at determining and describing the ransomware attack's progress across the network from start to finish. This history of the way a ransomware assault progressed within the network helps you to assess the impact and uncovers shortcomings in security policies or work habits that should be corrected to prevent future breaches. Forensics is usually given a high priority by the insurance carrier and is typically mandated by government and industry regulations. Because forensic analysis can take time, it is vital that other important activities such as business continuity are executed concurrently. Progent has a large roster of IT and cybersecurity professionals with the skills required to carry out activities for containment, operational continuity, and data restoration without interfering with forensics.
Ransomware forensics investigation is complicated and calls for intimate cooperation with the groups responsible for file restoration and, if necessary, payment negotiation with the ransomware hacker. Ransomware forensics typically require the examination of all logs, registry, GPO, Active Directory, DNS, routers, firewalls, schedulers, and core Windows systems to look for variations.
Services involved with forensics analysis include:
- Detach without shutting off all potentially impacted devices from the network. This can require closing all Remote Desktop Protocol (RDP) ports and Internet connected NAS storage, modifying admin credentials and user PWs, and configuring two-factor authentication to protect your backups.
- Copy forensically valid duplicates of all exposed devices so your data restoration group can get started
- Preserve firewall, VPN, and other critical logs as quickly as feasible
- Identify the version of ransomware used in the assault
- Examine every machine and storage device on the system as well as cloud storage for indications of encryption
- Catalog all compromised devices
- Establish the type of ransomware used in the assault
- Review logs and user sessions in order to determine the timeline of the ransomware attack and to spot any potential sideways migration from the originally infected machine
- Understand the attack vectors exploited to carry out the ransomware attack
- Search for the creation of executables associated with the first encrypted files or network breach
- Parse Outlook PST files
- Analyze email attachments
- Extract URLs from email messages and determine if they are malware
- Produce comprehensive incident reporting to satisfy your insurance carrier and compliance requirements
- Document recommendations to close security vulnerabilities and improve workflows that reduce the risk of a future ransomware breach
Progent's Background
Progent has provided online and on-premises network services across the United States for more than 20 years and has earned Microsoft's Gold Partner designation in the Datacenter and Cloud Productivity practice areas. Progent's team of SMEs includes consultants who have earned advanced certifications in core technologies such as Cisco infrastructure, VMware virtualization, and popular distributions of Linux. Progent's cybersecurity experts have earned prestigious certifications including CISM, CISSP-ISSAP, and GIAC. (See certifications earned by Progent consultants). Progent also has guidance in financial management and Enterprise Resource Planning software. This broad array of expertise allows Progent to identify and consolidate the undamaged pieces of your information system following a ransomware assault and rebuild them quickly into an operational network. Progent has collaborated with leading insurance carriers including Chubb to assist businesses clean up after ransomware attacks.
Contact Progent about Ransomware Forensics Services in Durham
To find out more about how Progent can assist your Durham business with ransomware forensics analysis, call 1-800-462-8800 or see Contact Progent.