Overview of Progent's Ransomware Forensics and Reporting in Salt Lake City
Progent's ransomware forensics experts can capture the system state after a ransomware assault and perform a detailed forensics investigation without impeding the processes required for operational resumption and data restoration. Your Salt Lake City organization can use Progent's post-attack forensics report to counter future ransomware assaults, assist in the restoration of encrypted data, and meet insurance carrier and regulatory reporting requirements.
Ransomware forensics investigation involves tracking and documenting the ransomware assault's storyline across the network from beginning to end. This audit trail of how a ransomware assault progressed through the network helps your IT staff to assess the impact and uncovers weaknesses in security policies or work habits that should be rectified to prevent later break-ins. Forensics is usually assigned a high priority by the insurance provider and is typically required by state and industry regulations. Since forensics can take time, it is vital that other important recovery processes such as business continuity are pursued in parallel. Progent has a large team of information technology and cybersecurity professionals with the skills needed to perform activities for containment, operational continuity, and data restoration without interfering with forensic analysis.
Ransomware forensics is complicated and calls for intimate interaction with the teams focused on file recovery and, if needed, settlement negotiation with the ransomware attacker. forensics typically involve the review of all logs, registry, Group Policy Object (GPO), AD, DNS, routers, firewalls, schedulers, and basic Windows systems to detect anomalies.
Activities associated with forensics include:
- Isolate but avoid shutting off all potentially affected devices from the system. This can require closing all Remote Desktop Protocol (RDP) ports and Internet connected NAS storage, modifying admin credentials and user passwords, and configuring 2FA to secure backups.
- Preserve forensically valid duplicates of all exposed devices so your data restoration group can get started
- Preserve firewall, virtual private network, and other critical logs as quickly as possible
- Identify the strain of ransomware involved in the attack
- Inspect every machine and storage device on the network as well as cloud-hosted storage for indications of compromise
- Catalog all compromised devices
- Establish the kind of ransomware involved in the assault
- Review log activity and user sessions to establish the timeline of the ransomware attack and to identify any possible sideways migration from the first infected machine
- Identify the attack vectors exploited to perpetrate the ransomware attack
- Look for the creation of executables associated with the original encrypted files or system breach
- Parse Outlook web archives
- Examine attachments
- Extract any URLs embedded in email messages and determine if they are malicious
- Produce extensive attack documentation to meet your insurance carrier and compliance mandates
- Suggest recommendations to close security gaps and enforce workflows that reduce the risk of a future ransomware breach
Progent's Qualifications
Progent has delivered remote and onsite network services across the United States for more than two decades and has been awarded Microsoft's Partner designation in the Datacenter and Cloud Productivity practice areas. Progent's team of subject matter experts (SMEs) includes consultants who have earned high-level certifications in foundation technologies such as Cisco infrastructure, VMware virtualization, and popular distributions of Linux. Progent's data security experts have earned prestigious certifications such as CISM, CISSP, and GIAC. (See Progent's certifications). Progent also offers top-tier support in financial management and ERP software. This scope of skills allows Progent to identify and consolidate the surviving parts of your information system following a ransomware assault and rebuild them quickly into a viable system. Progent has collaborated with top insurance carriers including Chubb to help businesses clean up after ransomware assaults.
Contact Progent about Ransomware Forensics Investigation Services in Salt Lake City
To find out more information about how Progent can help your Salt Lake City organization with ransomware forensics analysis, call 1-800-462-8800 or visit Contact Progent.