Overview of Progent's Ransomware Forensics and Reporting Services in Indianapolis
Progent's ransomware forensics consultants can capture the evidence of a ransomware attack and perform a comprehensive forensics analysis without impeding activity required for operational continuity and data recovery. Your Indianapolis organization can utilize Progent's post-attack ransomware forensics documentation to block future ransomware attacks, validate the cleanup of lost data, and meet insurance carrier and regulatory mandates.
Ransomware forensics investigation involves tracking and documenting the ransomware assault's progress across the network from start to finish. This history of the way a ransomware assault travelled within the network helps your IT staff to assess the impact and uncovers weaknesses in rules or processes that need to be corrected to avoid future breaches. Forensics is usually assigned a top priority by the insurance provider and is often mandated by state and industry regulations. Because forensics can be time consuming, it is vital that other important recovery processes such as business continuity are performed concurrently. Progent has an extensive team of IT and cybersecurity professionals with the knowledge and experience needed to carry out the work of containment, business resumption, and data restoration without interfering with forensic analysis.
Ransomware forensics is complex and requires intimate cooperation with the groups assigned to file recovery and, if needed, settlement discussions with the ransomware threat actor. Ransomware forensics can require the review of all logs, registry, Group Policy Object, AD, DNS servers, routers, firewalls, schedulers, and basic Windows systems to look for variations.
Services associated with forensics include:
- Disconnect without shutting down all potentially impacted devices from the system. This can require closing all Remote Desktop Protocol (RDP) ports and Internet facing network-attached storage, changing admin credentials and user passwords, and implementing two-factor authentication to guard your backups.
- Preserve forensically sound images of all exposed devices so the file restoration team can proceed
- Preserve firewall, VPN, and additional critical logs as soon as feasible
- Identify the version of ransomware used in the attack
- Inspect each machine and storage device on the system as well as cloud-hosted storage for signs of compromise
- Catalog all compromised devices
- Establish the type of ransomware involved in the assault
- Review logs and sessions in order to establish the timeline of the attack and to spot any potential lateral movement from the first infected system
- Identify the security gaps exploited to perpetrate the ransomware attack
- Look for the creation of executables associated with the first encrypted files or network compromise
- Parse Outlook web archives
- Analyze email attachments
- Separate any URLs embedded in messages and determine whether they are malware
- Produce comprehensive incident reporting to satisfy your insurance carrier and compliance regulations
- Document recommendations to close security vulnerabilities and enforce processes that lower the exposure to a future ransomware exploit
Progent's Background
Progent has delivered online and onsite IT services across the U.S. for more than 20 years and has earned Microsoft's Partner designation in the Datacenter and Cloud Productivity competencies. Progent's team of subject matter experts (SMEs) includes consultants who have been awarded high-level certifications in core technology platforms including Cisco infrastructure, VMware virtualization, and major Linux distros. Progent's cybersecurity consultants have earned prestigious certifications such as CISA, CISSP-ISSAP, and GIAC. (Refer to certifications earned by Progent consultants). Progent also has guidance in financial and Enterprise Resource Planning application software. This scope of expertise allows Progent to salvage and consolidate the undamaged pieces of your IT environment after a ransomware attack and reconstruct them rapidly into a functioning network. Progent has collaborated with top cyber insurance carriers including Chubb to assist organizations clean up after ransomware attacks.
Contact Progent about Ransomware Forensics Investigation Expertise in Indianapolis
To learn more about how Progent can help your Indianapolis organization with ransomware forensics analysis, call 1-800-462-8800 or visit Contact Progent.