Overview of Progent's Ransomware Forensics Investigation and Reporting Services in London
Progent's ransomware forensics experts can save the system state after a ransomware attack and carry out a comprehensive forensics analysis without interfering with activity related to business resumption and data recovery. Your London organization can use Progent's post-attack forensics documentation to block future ransomware assaults, assist in the cleanup of encrypted data, and comply with insurance carrier and governmental mandates.
Ransomware forensics analysis is aimed at determining and describing the ransomware assault's progress throughout the targeted network from beginning to end. This history of how a ransomware assault travelled within the network assists you to assess the damage and highlights weaknesses in policies or processes that need to be rectified to prevent future break-ins. Forensic analysis is usually assigned a high priority by the cyber insurance carrier and is often required by government and industry regulations. Since forensics can be time consuming, it is vital that other important recovery processes such as operational resumption are executed concurrently. Progent maintains a large team of IT and data security professionals with the knowledge and experience needed to perform the work of containment, operational continuity, and data restoration without disrupting forensics.
Ransomware forensics investigation is complicated and calls for close interaction with the teams assigned to data recovery and, if needed, settlement discussions with the ransomware attacker. Ransomware forensics can involve the review of logs, registry, GPO, AD, DNS servers, routers, firewalls, scheduled tasks, and basic Windows systems to detect anomalies.
Activities associated with forensics analysis include:
- Detach but avoid shutting down all potentially suspect devices from the system. This can require closing all RDP ports and Internet facing network-attached storage, changing admin credentials and user PWs, and setting up two-factor authentication to protect your backups.
- Capture forensically sound duplicates of all exposed devices so your data restoration group can proceed
- Preserve firewall, VPN, and additional critical logs as quickly as possible
- Identify the type of ransomware involved in the attack
- Examine each computer and storage device on the network as well as cloud storage for signs of encryption
- Catalog all encrypted devices
- Determine the kind of ransomware involved in the attack
- Study log activity and user sessions to determine the time frame of the attack and to spot any potential sideways migration from the originally compromised system
- Identify the security gaps exploited to carry out the ransomware assault
- Search for new executables associated with the first encrypted files or system compromise
- Parse Outlook web archives
- Analyze attachments
- Extract URLs embedded in messages and determine whether they are malware
- Produce comprehensive attack reporting to meet your insurance and compliance mandates
- Document recommendations to shore up security vulnerabilities and enforce workflows that lower the risk of a future ransomware exploit
Progent's Qualifications
Progent has delivered online and onsite network services across the U.S. for over 20 years and has earned Microsoft's Partner designation in the Datacenter and Cloud Productivity practice areas. Progent's team of subject matter experts (SMEs) includes consultants who have been awarded advanced certifications in foundation technology platforms such as Cisco infrastructure, VMware virtualization, and popular Linux distros. Progent's data security experts have earned internationally recognized certifications including CISA, CISSP, and CRISC. (See Progent's certifications). Progent also has guidance in financial and ERP software. This breadth of expertise gives Progent the ability to identify and consolidate the undamaged parts of your IT environment after a ransomware intrusion and reconstruct them rapidly into a viable system. Progent has worked with leading insurance providers like Chubb to assist organizations recover from ransomware assaults.
Contact Progent about Ransomware Forensics Analysis Services in London
To find out more information about how Progent can help your London organization with ransomware forensics investigation, call 1-800-462-8800 or visit Contact Progent.