Overview of Progent's Ransomware Forensics Investigation and Reporting in Southfield
Progent's ransomware forensics consultants can save the system state after a ransomware assault and perform a comprehensive forensics analysis without interfering with activity required for operational resumption and data restoration. Your Southfield business can utilize Progent's post-attack ransomware forensics report to counter subsequent ransomware assaults, assist in the restoration of encrypted data, and meet insurance carrier and regulatory requirements.
Ransomware forensics analysis is aimed at discovering and describing the ransomware assault's storyline throughout the network from beginning to end. This audit trail of how a ransomware attack progressed through the network helps you to assess the damage and brings to light gaps in security policies or processes that should be corrected to avoid future breaches. Forensics is usually given a high priority by the insurance provider and is often required by state and industry regulations. Since forensic analysis can be time consuming, it is essential that other key activities such as operational resumption are pursued concurrently. Progent has an extensive team of information technology and cybersecurity professionals with the skills needed to carry out activities for containment, operational resumption, and data recovery without interfering with forensics.
Ransomware forensics analysis is complicated and calls for intimate cooperation with the teams assigned to file recovery and, if necessary, settlement discussions with the ransomware adversary. Ransomware forensics can require the examination of logs, registry, Group Policy Object (GPO), Active Directory, DNS, routers, firewalls, schedulers, and core Windows systems to look for variations.
Activities associated with forensics include:
- Disconnect but avoid shutting off all potentially suspect devices from the network. This can require closing all RDP ports and Internet facing network-attached storage, modifying admin credentials and user PWs, and implementing two-factor authentication to guard your backups.
- Copy forensically sound images of all exposed devices so your data recovery group can get started
- Save firewall, VPN, and other critical logs as quickly as feasible
- Identify the variety of ransomware involved in the assault
- Inspect every computer and data store on the network including cloud storage for indications of compromise
- Catalog all compromised devices
- Determine the kind of ransomware used in the attack
- Review logs and sessions in order to establish the timeline of the attack and to identify any possible lateral movement from the originally infected machine
- Identify the security gaps used to perpetrate the ransomware attack
- Look for new executables surrounding the original encrypted files or system compromise
- Parse Outlook web archives
- Analyze attachments
- Extract any URLs embedded in email messages and determine if they are malicious
- Produce comprehensive incident reporting to satisfy your insurance carrier and compliance requirements
- List recommendations to close cybersecurity gaps and improve processes that reduce the exposure to a future ransomware breach
Progent's Background
Progent has provided online and on-premises IT services across the U.S. for over 20 years and has been awarded Microsoft's Partner certification in the Datacenter and Cloud Productivity practice areas. Progent's roster of SMEs includes consultants who have been awarded advanced certifications in core technologies including Cisco infrastructure, VMware virtualization, and popular Linux distros. Progent's data security experts have earned industry-recognized certifications such as CISA, CISSP-ISSAP, and CRISC. (See certifications earned by Progent consultants). Progent also has guidance in financial and Enterprise Resource Planning application software. This breadth of expertise gives Progent the ability to identify and consolidate the undamaged pieces of your information system after a ransomware attack and rebuild them rapidly into an operational network. Progent has worked with leading cyber insurance providers including Chubb to help organizations recover from ransomware attacks.
Contact Progent about Ransomware Forensics Expertise in Southfield
To learn more about ways Progent can assist your Southfield business with ransomware forensics analysis, call 1-800-462-8800 or see Contact Progent.