Overview of Progent's Ransomware Forensics Investigation and Reporting in San Jose
Progent's ransomware forensics experts can capture the system state after a ransomware attack and carry out a comprehensive forensics investigation without slowing down the processes related to business continuity and data restoration. Your San Jose business can utilize Progent's ransomware forensics report to counter future ransomware assaults, assist in the recovery of encrypted data, and comply with insurance carrier and regulatory mandates.
Ransomware forensics analysis is aimed at discovering and documenting the ransomware attack's storyline across the targeted network from start to finish. This audit trail of how a ransomware assault travelled within the network helps your IT staff to evaluate the impact and highlights vulnerabilities in rules or work habits that should be rectified to prevent future break-ins. Forensics is commonly given a high priority by the cyber insurance carrier and is often required by state and industry regulations. Because forensics can take time, it is essential that other key recovery processes such as business continuity are executed in parallel. Progent maintains an extensive team of information technology and security experts with the skills needed to carry out activities for containment, operational continuity, and data restoration without disrupting forensic analysis.
Ransomware forensics is complex and requires close interaction with the groups responsible for file recovery and, if necessary, settlement negotiation with the ransomware adversary. Ransomware forensics can require the examination of all logs, registry, Group Policy Object, Active Directory (AD), DNS, routers, firewalls, scheduled tasks, and basic Windows systems to check for changes.
Activities involved with forensics include:
- Detach without shutting off all possibly affected devices from the system. This may require closing all RDP ports and Internet facing NAS storage, modifying admin credentials and user passwords, and setting up two-factor authentication to guard backups.
- Preserve forensically complete digital images of all exposed devices so the file restoration team can proceed
- Save firewall, VPN, and additional key logs as soon as possible
- Establish the strain of ransomware involved in the assault
- Examine every computer and data store on the system including cloud storage for signs of encryption
- Catalog all encrypted devices
- Determine the type of ransomware involved in the assault
- Study logs and user sessions to determine the timeline of the attack and to identify any possible sideways movement from the originally compromised system
- Understand the attack vectors exploited to perpetrate the ransomware attack
- Look for new executables surrounding the original encrypted files or network compromise
- Parse Outlook web archives
- Examine email attachments
- Separate URLs from messages and determine if they are malicious
- Produce detailed incident documentation to satisfy your insurance carrier and compliance regulations
- List recommended improvements to shore up security gaps and improve workflows that reduce the exposure to a future ransomware exploit
Progent's Qualifications
Progent has delivered online and onsite network services throughout the U.S. for more than 20 years and has been awarded Microsoft's Partner certification in the Datacenter and Cloud Productivity competencies. Progent's roster of subject matter experts (SMEs) includes consultants who have been awarded advanced certifications in foundation technologies such as Cisco networking, VMware, and major distributions of Linux. Progent's data security experts have earned internationally recognized certifications such as CISA, CISSP-ISSAP, and GIAC. (See Progent's certifications). Progent also offers top-tier support in financial and ERP software. This scope of skills gives Progent the ability to salvage and consolidate the undamaged pieces of your information system after a ransomware intrusion and reconstruct them quickly into a functioning system. Progent has collaborated with leading insurance providers like Chubb to assist businesses clean up after ransomware assaults.
Contact Progent about Ransomware Forensics Investigation Expertise in San Jose
To learn more information about ways Progent can help your San Jose organization with ransomware forensics, call 1-800-462-8800 or see Contact Progent.