Progent's Ransomware Forensics and Reporting in Colorado Springs
Progent's ransomware forensics consultants can save the evidence of a ransomware attack and perform a comprehensive forensics investigation without interfering with activity required for operational continuity and data restoration. Your Colorado Springs organization can use Progent's forensics report to combat future ransomware attacks, assist in the cleanup of encrypted data, and comply with insurance and regulatory reporting requirements.
Ransomware forensics investigation is aimed at tracking and documenting the ransomware assault's storyline across the network from beginning to end. This audit trail of how a ransomware attack travelled within the network assists your IT staff to assess the damage and uncovers vulnerabilities in security policies or processes that should be corrected to prevent future breaches. Forensics is typically assigned a high priority by the insurance carrier and is often required by state and industry regulations. Because forensic analysis can take time, it is essential that other important recovery processes such as business continuity are pursued in parallel. Progent has an extensive team of IT and security experts with the skills required to carry out activities for containment, business resumption, and data restoration without interfering with forensics.
Ransomware forensics is time consuming and requires intimate cooperation with the groups assigned to file cleanup and, if necessary, payment discussions with the ransomware hacker. forensics can involve the review of logs, registry, Group Policy Object, AD, DNS, routers, firewalls, schedulers, and core Windows systems to look for anomalies.
Services involved with forensics analysis include:
- Detach without shutting off all potentially suspect devices from the network. This can involve closing all Remote Desktop Protocol (RDP) ports and Internet connected NAS storage, changing admin credentials and user PWs, and implementing 2FA to guard backups.
- Preserve forensically valid duplicates of all exposed devices so your data restoration team can get started
- Save firewall, virtual private network, and additional critical logs as soon as possible
- Identify the strain of ransomware involved in the attack
- Inspect each computer and data store on the system including cloud-hosted storage for signs of encryption
- Catalog all encrypted devices
- Determine the type of ransomware used in the attack
- Study log activity and user sessions to establish the time frame of the ransomware assault and to identify any possible lateral movement from the first infected system
- Identify the attack vectors exploited to carry out the ransomware assault
- Look for the creation of executables associated with the original encrypted files or system compromise
- Parse Outlook PST files
- Examine attachments
- Separate URLs embedded in email messages and determine if they are malicious
- Produce extensive attack reporting to satisfy your insurance carrier and compliance regulations
- Document recommendations to close security vulnerabilities and improve workflows that reduce the exposure to a future ransomware breach
Progent's Background
Progent has provided remote and onsite IT services across the U.S. for more than two decades and has been awarded Microsoft's Partner certification in the Datacenter and Cloud Productivity competencies. Progent's roster of SMEs includes professionals who have been awarded advanced certifications in foundation technology platforms such as Cisco networking, VMware, and major Linux distros. Progent's data security consultants have earned internationally recognized certifications including CISM, CISSP-ISSAP, and CRISC. (See Progent's certifications). Progent also has guidance in financial and ERP software. This breadth of expertise gives Progent the ability to identify and consolidate the surviving pieces of your IT environment after a ransomware attack and rebuild them rapidly into an operational network. Progent has worked with top insurance carriers like Chubb to assist organizations clean up after ransomware attacks.
Contact Progent about Ransomware Forensics Expertise in Colorado Springs
To learn more information about ways Progent can help your Colorado Springs organization with ransomware forensics, call 1-800-462-8800 or see Contact Progent.