Overview of Progent's Ransomware Forensics Analysis and Reporting Services in Cambridge
Progent's ransomware forensics experts can preserve the system state after a ransomware attack and perform a detailed forensics analysis without impeding activity related to business resumption and data restoration. Your Cambridge organization can utilize Progent's post-attack forensics documentation to block future ransomware attacks, assist in the cleanup of lost data, and comply with insurance and regulatory requirements.
Ransomware forensics analysis is aimed at discovering and describing the ransomware attack's storyline across the network from start to finish. This history of the way a ransomware assault progressed within the network assists you to assess the damage and highlights shortcomings in security policies or processes that should be rectified to prevent future break-ins. Forensics is usually assigned a top priority by the insurance carrier and is often required by state and industry regulations. Because forensic analysis can be time consuming, it is critical that other key recovery processes like business continuity are performed concurrently. Progent has a large team of information technology and security professionals with the skills required to carry out activities for containment, operational continuity, and data recovery without disrupting forensics.
Ransomware forensics is time consuming and requires close cooperation with the teams assigned to data restoration and, if needed, settlement talks with the ransomware attacker. forensics typically require the examination of logs, registry, GPO, Active Directory (AD), DNS servers, routers, firewalls, scheduled tasks, and core Windows systems to check for variations.
Services associated with forensics investigation include:
- Isolate without shutting down all possibly impacted devices from the network. This may require closing all Remote Desktop Protocol (RDP) ports and Internet facing NAS storage, changing admin credentials and user PWs, and configuring two-factor authentication to guard backups.
- Preserve forensically complete images of all suspect devices so your file recovery group can proceed
- Save firewall, virtual private network, and other critical logs as quickly as feasible
- Identify the strain of ransomware involved in the assault
- Examine each machine and storage device on the system including cloud storage for signs of encryption
- Inventory all encrypted devices
- Determine the kind of ransomware involved in the assault
- Review log activity and sessions in order to establish the timeline of the attack and to spot any potential sideways movement from the originally infected machine
- Identify the attack vectors used to carry out the ransomware attack
- Search for new executables associated with the first encrypted files or system breach
- Parse Outlook PST files
- Analyze attachments
- Separate URLs embedded in messages and determine if they are malware
- Produce extensive attack reporting to meet your insurance carrier and compliance requirements
- Suggest recommended improvements to close cybersecurity gaps and enforce processes that lower the exposure to a future ransomware breach
Progent's Background
Progent has provided remote and on-premises IT services throughout the U.S. for over two decades and has been awarded Microsoft's Partner certification in the Datacenter and Cloud Productivity competencies. Progent's team of SMEs includes professionals who have been awarded advanced certifications in core technology platforms such as Cisco infrastructure, VMware, and popular distributions of Linux. Progent's cybersecurity consultants have earned industry-recognized certifications including CISA, CISSP, and GIAC. (See certifications earned by Progent consultants). Progent also has guidance in financial management and Enterprise Resource Planning application software. This breadth of skills allows Progent to salvage and integrate the surviving pieces of your information system after a ransomware intrusion and rebuild them rapidly into an operational network. Progent has worked with leading cyber insurance providers like Chubb to assist businesses recover from ransomware attacks.
Contact Progent about Ransomware Forensics Expertise in Cambridge
To learn more about ways Progent can assist your Cambridge organization with ransomware forensics investigation, call 1-800-462-8800 or visit Contact Progent.