Overview of Progent's Ransomware Forensics Investigation and Reporting Services in Louisville
Progent's ransomware forensics consultants can preserve the evidence of a ransomware assault and carry out a comprehensive forensics analysis without slowing down activity related to business resumption and data recovery. Your Louisville organization can utilize Progent's post-attack ransomware forensics documentation to counter future ransomware attacks, validate the restoration of encrypted data, and comply with insurance and regulatory reporting requirements.
Ransomware forensics investigation is aimed at determining and documenting the ransomware attack's progress throughout the targeted network from start to finish. This audit trail of how a ransomware attack travelled within the network helps you to evaluate the damage and uncovers vulnerabilities in policies or work habits that should be corrected to avoid future breaches. Forensic analysis is usually assigned a high priority by the insurance provider and is often required by state and industry regulations. Since forensics can be time consuming, it is vital that other important activities such as business continuity are pursued in parallel. Progent has a large roster of information technology and cybersecurity professionals with the knowledge and experience needed to perform the work of containment, operational resumption, and data restoration without interfering with forensic analysis.
Ransomware forensics is time consuming and calls for intimate interaction with the teams focused on data restoration and, if needed, settlement negotiation with the ransomware adversary. Ransomware forensics typically involve the review of all logs, registry, GPO, Active Directory, DNS, routers, firewalls, scheduled tasks, and basic Windows systems to check for changes.
Activities involved with forensics investigation include:
- Disconnect without shutting off all potentially affected devices from the system. This may involve closing all RDP ports and Internet connected network-attached storage, changing admin credentials and user PWs, and setting up 2FA to secure your backups.
- Copy forensically sound digital images of all suspect devices so the file recovery team can proceed
- Save firewall, virtual private network, and other critical logs as quickly as feasible
- Identify the strain of ransomware involved in the attack
- Examine each machine and storage device on the network including cloud-hosted storage for indications of compromise
- Inventory all encrypted devices
- Establish the kind of ransomware involved in the assault
- Review logs and user sessions to establish the time frame of the ransomware attack and to identify any potential sideways movement from the first infected machine
- Understand the attack vectors exploited to carry out the ransomware attack
- Search for new executables surrounding the first encrypted files or system breach
- Parse Outlook PST files
- Analyze attachments
- Extract URLs embedded in messages and check to see if they are malicious
- Provide comprehensive incident documentation to satisfy your insurance and compliance requirements
- Document recommended improvements to shore up security gaps and improve workflows that lower the exposure to a future ransomware breach
Progent's Qualifications
Progent has provided remote and on-premises network services across the U.S. for more than 20 years and has earned Microsoft's Partner designation in the Datacenter and Cloud Productivity practice areas. Progent's team of subject matter experts includes professionals who have been awarded advanced certifications in foundation technology platforms including Cisco networking, VMware, and major Linux distros. Progent's cybersecurity consultants have earned prestigious certifications such as CISA, CISSP-ISSAP, and GIAC. (See Progent's certifications). Progent also has guidance in financial and Enterprise Resource Planning application software. This scope of expertise gives Progent the ability to salvage and consolidate the surviving pieces of your IT environment following a ransomware assault and rebuild them rapidly into an operational system. Progent has worked with top cyber insurance carriers including Chubb to assist businesses recover from ransomware assaults.
Contact Progent about Ransomware Forensics Analysis Expertise in Louisville
To learn more information about ways Progent can assist your Louisville business with ransomware forensics analysis, call 1-800-462-8800 or visit Contact Progent.