Overview of Progent's Ransomware Forensics Analysis and Reporting in Lexington-Fayette
Progent's ransomware forensics experts can save the system state after a ransomware assault and carry out a detailed forensics investigation without impeding activity related to business continuity and data restoration. Your Lexington-Fayette business can use Progent's forensics documentation to block future ransomware attacks, validate the restoration of encrypted data, and comply with insurance and governmental mandates.
Ransomware forensics involves tracking and describing the ransomware attack's progress across the targeted network from beginning to end. This history of how a ransomware attack travelled through the network helps you to evaluate the damage and brings to light shortcomings in policies or processes that need to be rectified to avoid future breaches. Forensic analysis is commonly given a high priority by the cyber insurance provider and is typically required by government and industry regulations. Because forensic analysis can be time consuming, it is vital that other important recovery processes like business continuity are executed concurrently. Progent has a large team of information technology and data security professionals with the knowledge and experience needed to carry out the work of containment, operational continuity, and data restoration without disrupting forensics.
Ransomware forensics analysis is time consuming and requires intimate interaction with the teams focused on file recovery and, if necessary, payment discussions with the ransomware adversary. Ransomware forensics can require the examination of all logs, registry, Group Policy Object, AD, DNS servers, routers, firewalls, schedulers, and core Windows systems to detect anomalies.
Activities associated with forensics analysis include:
- Disconnect but avoid shutting down all potentially impacted devices from the system. This can involve closing all RDP ports and Internet connected NAS storage, changing admin credentials and user passwords, and setting up 2FA to protect your backups.
- Preserve forensically sound digital images of all suspect devices so your data restoration group can proceed
- Save firewall, VPN, and additional critical logs as soon as feasible
- Determine the type of ransomware used in the attack
- Survey every machine and storage device on the system including cloud-hosted storage for indications of encryption
- Catalog all encrypted devices
- Determine the type of ransomware involved in the assault
- Review logs and sessions to establish the timeline of the ransomware assault and to spot any possible sideways movement from the first infected system
- Identify the security gaps used to perpetrate the ransomware attack
- Look for new executables associated with the original encrypted files or system compromise
- Parse Outlook web archives
- Examine email attachments
- Extract URLs from email messages and determine if they are malicious
- Produce detailed incident documentation to satisfy your insurance carrier and compliance regulations
- List recommended improvements to shore up security gaps and improve workflows that reduce the risk of a future ransomware breach
Progent's Qualifications
Progent has provided remote and onsite IT services across the United States for more than two decades and has been awarded Microsoft's Partner certification in the Datacenter and Cloud Productivity competencies. Progent's team of subject matter experts (SMEs) includes consultants who have been awarded high-level certifications in foundation technologies including Cisco infrastructure, VMware, and popular distributions of Linux. Progent's cybersecurity experts have earned industry-recognized certifications including CISA, CISSP-ISSAP, and GIAC. (See Progent's certifications). Progent also offers top-tier support in financial and ERP application software. This scope of expertise gives Progent the ability to salvage and consolidate the surviving pieces of your IT environment after a ransomware intrusion and reconstruct them rapidly into a functioning system. Progent has worked with top cyber insurance carriers including Chubb to assist organizations clean up after ransomware attacks.
Contact Progent about Ransomware Forensics Services in Lexington-Fayette
To find out more information about how Progent can assist your Lexington-Fayette organization with ransomware forensics investigation, call 1-800-462-8800 or visit Contact Progent.