Ransomware: Your Worst IT Nightmare
Ransomware Recovery ConsultantsRansomware has become a modern cyberplague that poses an extinction-level threat for businesses unprepared for an attack. Versions of ransomware like the Dharma, WannaCry, Locky, NotPetya and MongoLock cryptoworms have been around for years and continue to do damage. Modern strains of ransomware like Ryuk, Sodinokibi, Netwalker and Maze, plus daily unnamed newcomers, not only encrypt online data but also infiltrate any accessible system restores and backups. Data synched to the cloud can also be corrupted. In a vulnerable environment, this can make automated recovery impossible and effectively knocks the datacenter back to square one.

Restoring services and data after a ransomware attack becomes a race against the clock as the victim struggles to contain and remove the virus and to restore business-critical operations. Because ransomware takes time to spread, assaults are often launched during weekends, when attacks may take longer to detect. This compounds the difficulty of promptly mobilizing and coordinating a qualified response team.

Progent offers a variety of services for protecting organizations from ransomware attacks. These include user training to recognize and avoid phishing exploits, ProSight Active Security Monitoring for remote monitoring and management, plus deployment of modern security gateways with AI technology to identify and suppress zero-day threats. Progent also offers the services of experienced ransomware recovery consultants with the skills and commitment to rebuild a compromised network as quickly as possible.

Progent's Ransomware Recovery Services
After a ransomware attack, paying the ransom in Bitcoin cryptocurrency does not guarantee that cyber criminals will provide the keys to decrypt all your data. Kaspersky estimated that 17% of ransomware victims never recovered their files after having paid the ransom. The gamble is also expensive. Ryuk ransoms commonly range from 15-40 BTC ($120,000 and $400,000). This is well above the average ransomware demand for small businesses, which ZDNET estimated to be around $13,000. The alternative is to piece back together the vital components of your IT environment. Without the availability of full backups, this requires a broad range of expertise, well-coordinated project management, and the willingness to work 24x7 until the job is done.

Progent has provided professional IT services throughout the United States for two decades and has earned Microsoft's Partnership certification in the Datacenter and Cloud Productivity competencies. Progent's team of subject matter experts (SMEs) includes consultants who have earned high-level certifications in foundation technologies including Cisco, VMware, and major distributions of Linux. Progent's cybersecurity experts have earned internationally-recognized certifications including CISA, CISM, CISSP-ISSAP, CRISC, and GIAC. (See Progent's certifications). Progent also has expertise in financial management and ERP application software. This breadth of expertise gives Progent the ability to identify and consolidate the surviving pieces of your IT environment after a ransomware attack and rebuild them into a functioning system.

Progent's recovery team uses state-of-the-art project management tools to coordinate the complex recovery process and understands the importance of working quickly and in unison with a client's management and IT staff to prioritize tasks and to get essential services back on line as fast as possible.

Case Study: A Successful Ransomware Recovery
A client engaged Progent after their organization was attacked by Ryuk ransomware. Ryuk is believed to have been launched by North Korean state hackers, possibly using technology leaked from the U.S. National Security Agency. Ryuk targets specific companies with little tolerance for disruption and is one of the most profitable versions of ransomware. Headline victims include Data Resolution, a California-based data warehousing and cloud computing firm, and the Chicago Tribune. Progent's client is a manufacturer based in Chicago and has about 500 employees. The Ryuk attack had shut down all business operations and manufacturing processes. The majority of the client's backups had been online at the time of the attack and were encrypted. The client considered paying the ransom (in excess of $200,000) and hoping for the best, but in the end called Progent.


"I cannot say enough about the support Progent gave us during the most critical time of (our) business life. We may have had to pay the Hacker if not for the confidence the Progent Team gave us. That you could get our e-mail and Servers back in less than 1 week was something incredible. Every single person I spoke to or e-mailed at Progent was hell bent on getting us operational and was working 24/7 on our behalf."

Progent worked with the client to identify and prioritize the key areas that needed to be addressed in order to restart business operations:

  • Active Directory
  • Email
  • Accounting/ERP
To start, Progent followed AV/Malware Processes best practices by isolating and cleaning up infected systems. Progent then began the task of recovering Active Directory, the heart of enterprise networks built on Microsoft technology. Exchange email will not operate without Active Directory, and the client's accounting and ERP software used Microsoft SQL, which depends on Active Directory for access to the database.

Within two days, Progent was able to restore Active Directory to its pre-attack state. Progent then helped perform reinstallations and hard drive recovery on critical systems. All Exchange ties and attributes were intact, which facilitated the rebuild of Exchange. Progent was also able to locate intact OST files (Outlook Offline Folder Files) on various workstations to recover email data. A recent offline backup of the client's accounting/ERP software made it possible to return these vital applications back online. Although significant work remained to recover fully from the Ryuk attack, core services were restored quickly:


"For the most part, the manufacturing operation never missed a beat and we did not miss any customer shipments."

Over the next few weeks important milestones in the recovery process were achieved through close cooperation between Progent and the client:

  • Internal web sites were brought back up with no loss of data.
  • The MailStore Server with over 4 million archived emails was spun up and working.
  • Orders/Invoices/AP/AR/BOM and inventory were 100% restored.
  • A new Palo Alto 850 Firewall was installed.
  • 90% of user workstations were operational.

"A lot of what happened that first week is mostly a blur for me, but we will not forget the countless hours each and everyone of you put in to give us our business back. I have been working with Progent for at least 10 years maybe more and every time, Progent has come through and delivered. This time was no exception but maybe more Herculean."

Conclusion
A potential business disaster was averted by hard work, a broad range of technical expertise, and close teamwork. Although in hindsight the ransomware attack described here could have been prevented with modern security technology, user training, and appropriate procedures for backup and applying software patches, the fact remains that government-sponsored cyber criminals from China, Russia, North Korea and elsewhere are relentless and are not going away. If you do fall victim to ransomware, remember that Progent's team has proven experience in ransomware virus removal and file recovery.


"So, to Darrin, Matt, Aaron, Dan, Claude, Jesse, Arnaud, Allen, Tony and Chris (and any others that were involved), thank you for allowing me to get some sleep after we got past the first week. All of you did an incredible job and if anyone is visiting the Chicago area, dinner is on me!"

To read or download a PDF version of this case study, click:
Progent's Ransomware Recovery Case Study Datasheet. (PDF - 282 KB)

Additional Ransomware Protection Services Offered by Progent
Progent offers a range of remote monitoring and security assessment services to help you minimize the threat from ransomware. These services include next-generation machine learning technology to detect new variants of ransomware that can escape detection by traditional signature-based anti-virus solutions.

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates SentinelOne's cutting-edge machine learning tools to defend endpoints as well as servers and VMs against modern malware attacks such as ransomware and email phishing, which easily evade legacy signature-matching anti-virus tools. ProSight ASM protects local and cloud-based resources and offers a unified platform to address the entire threat progression including protection, identification, mitigation, remediation, and forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against new attacks. Progent is a SentinelOne Partner, reseller, and integrator. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense based on SentinelOne's behavioral analysis technology.

  • ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
    Progent's ProSight Enhanced Security Protection managed services offer economical multi-layer security for physical servers and virtual machines, workstations, mobile devices, and Exchange Server. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and reacting to security threats from all attack vectors. ProSight ESP delivers two-way firewall protection, penetration alerts, endpoint management, and web filtering via cutting-edge tools incorporated within a single agent accessible from a single control. Progent's data protection and virtualization experts can assist your business to design and configure a ProSight ESP environment that meets your company's unique requirements and that allows you achieve and demonstrate compliance with legal and industry data security regulations. Progent will assist you define and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that require immediate action. Progent's consultants can also assist your company to install and test a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange filtering.

  • ProSight Data Protection Services: Managed Backup and Recovery
    ProSight Data Protection Services offer small and mid-sized organizations an affordable end-to-end solution for reliable backup/disaster recovery. Available at a low monthly rate, ProSight DPS automates and monitors your backup activities and allows rapid recovery of vital files, applications and VMs that have become lost or corrupted as a result of hardware breakdowns, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup specialists can provide world-class support to configure ProSight Data Protection Services to comply with government and industry regulatory standards like HIPAA, FINRA, PCI and Safe Harbor and, whenever necessary, can assist you to recover your critical data. Read more about ProSight DPS Managed Backup.

  • The ProSight Ransomware Preparedness Report Service
    The ProSight Ransomware Preparedness Report is a low-cost service centered on a phone discussion with a Progent information assurance expert. The interview is intended to assess your organization's preparedness either to stop or recover rapidly from a ransomware attack. Progent will work with you directly to collect information concerning your existing AV defense and backup/recovery platform, and Progent will then produce a written Basic Security and Best Practices Report document describing how you can follow best practices to create a cost-effective security and backup system that meets your business needs. For more information, see Progent's ProSight Ransomware Preparedness Report Service.
Download Datasheet: Progent's Ransomware Endpoint Detection and Response Services
To read or download a PDF datasheet describing Progent's ransomware endpoint protection and response (EDR) services, click:
Progent's Ransomware Endpoint Detection and Response Services Datasheet. (PDF - 748 KB)

Contact Progent for Ransomware Recovery Consulting and Remote Security Monitoring
For ransomware recovery or prevention expertise, call Progent at 800-993-9400 or go to Contact Progent.

Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to guide you to take the urgent first phase in responding to a ransomware attack by putting out the fire. Progent's remote ransomware expert can assist businesses to locate and isolate infected devices and guard undamaged assets from being compromised. If your network has been breached by any version of ransomware, act fast. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For details, see Progent's Ransomware 24x7 Hot Line.



An index of content::

  • Addison-Richardson, Texas MS Dynamics GP Vender - Addison - Recovery Consultant Dynamics GP-Software Addison Dealer - Setup Consultants Addison-Richardson, TX
  • Appleton Appleton Conti Ransomware Operational Recovery Appleton Ryuk Crypto-Ransomware Recovery Appleton-Fond du Lac
  • CISSP Consulting Services New Jersey Firewall Security Group New Jersey
  • Cheyenne Locky Crypto-Ransomware Negotiation Experts Cheyenne-Van Nuys Cheyenne Locky Ransomware Settlement Support Cheyenne-Cheyenne, Wyoming
  • Cisco Outsourced IT Support New York City- Manhattan, The Bronx, Brooklyn, Queens, Staten Island Tech Consultants Cisco New York City, Buffalo, Rochester, NY

  • Emergency Ubiquiti UniFi Controller software Consultant Services
    Consulting Services Ubiquiti's U6 Enterprise WiFi 6E AP

    Progent offers quick access to the expertise of seasoned wireless consultants who can help organizations to assess the value of Ubiquiti UniFi wireless access points for your business and assist you to design, install, maintain, and debug your UniFi wireless network. Progent can also conduct a Wi-Fi site survey to help you to select, configure, and place UniFi wireless APs for your required coverage and performance.

  • Computer Support Telecommute Job Castro Valley, CA Microsoft MCP Consulting Careers San Leandro, CA
  • Consultancy CISM Certified Cybersecurity Management CISM Certified Security Management Specialists
  • Consultant Services ISA 2006 Firewall ISA 2006 Firewall Specialist
  • Consulting Support for IT Support Providers - Cleveland - Short-Term Staff Assistance Cuyahoga County Ohio, USA Cleveland Public Square Consulting Services for IT Support Organizations near me in Cleveland - Short-Term Staff Assistance
  • Contact Progent Progent Contact
  • Dynamics GP Upgrade Planning Specialist Akron Canton, United States Microsoft Dynamics GP System Update Planning Consultant Akron, Summit County

  • ProSight Email Guard Spam Filtering Consultants
    ProSight Spam Filtering Consultancy

    Progent's ProSight Email Guard uses the services and infrastructure of leading data security companies to provide web-based management and world-class protection for your email traffic. The powerful architecture of ProSight Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a first line of defense and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to external threats and saves network bandwidth and storage. Email Guard's onsite security gateway appliance adds a further layer of inspection for incoming email. For outgoing email, the local security gateway offers AV and anti-spam protection, DLP, and email encryption. The on-premises security gateway can also assist Exchange Server to monitor and protect internal email that stays inside your security perimeter.

  • Emergency Raleigh Crypto Remediation Raleigh, NC Ransomware Removal Consulting Raleigh North Carolina
  • Firewall Consulting Services Modesto California Security Cybersecurity Tech Services Turlock, CA
  • Lawrence-Nashua Remote Remote Workers Lawrence Consulting - Endpoint Security Solutions Consulting and Support Services Work at Home Employees Consulting and Support Services - Lawrence - Network Security Systems Consulting Lawrence Massachusetts




  • Les Kent has a 35-year history of effective technology integration, business management, sales, and operations. He has demonstrated a knack for creating elegant IT solutions during his time as as a network architect, software developer, project manager, deployment consultant, and problem solver for small companies, start-ups, and global corporations.

  • Microsoft Outlook for Mac Remote Troubleshooting Engineer Remote Desktop Connection for Mac
  • Microsoft SQL 2008 Network Architect Minneapolis, MN, United States IT Solution Providers SQL Server 2019 Minneapolis, MN
  • Migration Consultant Exchange 2019 Dallas County Texas Immediate Exchange Server 2010 Network Support Companies Irving Texas
  • Modesto Professional Top Modesto, California Computer Support Consultants
  • Monterey County Computer Consultancy Group Professional Salinas

  • Home Based Computer Consulting Contractor
    24x7x365 Home Based Microsoft Consultant Contract Jobs

    Progent believes that a well architected and executed network is a crucial piece for enabling any firm's growth, and we follow this philosophy in our own network infrastructure. Progent has created a zero-downtime virtual office infrastructure that allows Progent's in-house consultants and authorized contractors to deliver fast and effective support, cooperate easily on challenging projects, and gain from professional and private maturity by acting as part of a dynamic company culture of personal drive and freedom.

  • NodeZero Penetration Testing Cybersecurity Organization Award Winning NodeZero Certified PEN Testing Network Security Auditing

  • NoderZero Threat Assessment Cybersecurity Group
    NodeZero Penetration Testing Auditor

    Progent's certified security consultants can run NodeZero-powered penetration tests to verify your security defense systems and policies are properly set up and effective.

  • Outsourcing Services Bristol Network Architect Bristol, Great Britain
  • PIX Firewall Upgrade IT Consultant Cisco PIX Firewall Support and Setup
  • Palo Alto Computer Consulting Company Menlo Park Information Technology Consulting Firms
  • Raleigh Wake Forest Garner Cary, US 24/7/365 Microsoft Exchange Server 2013 Network Support Service Research Triangle North Carolina Exchange 2016 Computer Expert

  • 24 Hour IT Consultants Hornetsecurity Altaro VM Backup and vSphere
    Professionals Hornetsecurity Altaro VM Backup and VMware ESXi

    Altaro VM Backup from Hornetsecurity offers small organizations a dependable and budget-friendly solution for backing up and recovering Microsoft Hyper-V and VMware-based virtual machines. Altaro VM Backup can be used for local, offsite, multi-site, and cloud-hosted environments and also supports cost-effective cloud backup to Microsoft Azure Block Blob storage. Altaro VM Backup protects against ransomware attacks by leveraging Immutable Cloud Storage. This creates tamper-proof backup data that cannot be modified by any user including root users. Progent is a certified Hornetsecurity/Altaro partner and offers a wide array of remote or onsite services to assist you to design, deploy, optimize and debug a comprehensive backup/restore solution based on Altaro VM Backup. With ProSight Data Protection Services Altaro VM Backup, Progent delivers a managed backup/recovery service based on Altaro VM Backup.

  • Rancho Cordova Snatch Crypto-Ransomware Settlement Negotiation Experts Rancho Cordova Hermes Crypto-Ransomware Settlement Negotiation Consultants Rancho Cordova

  • ProSight Reporting Infrastructure Management Technical Support
    ProSight Reporting ConnectWise Manage Ticketing Computer Engineer

    File summary_ProSight-Reporting-for-Ticketing-and-Network-Monitoring-Apps.htm.asp does not exist



  • Ransomware Cryptoworm Recovery Mobile Bay, Alabama Ryuk Ransomware Hot Line Mobile Alabama
  • Remote Cambridge Computer Network Specialist Cambridge Small Business Computer Consulting Firm
  • Remote Support Jobs CISA Engineer Naperville, Illinois Network Security Consultant Part Time Job Joliet, Illinois
  • Reston-Fairfax, VA Reston At Home Workers Collaboration Systems Consulting Telecommuters Consulting - Reston - Collaboration Technology Consulting Reston
  • Professionals ransomware removal and recovery
  • San Francisco, CA Offsite Workforce Consulting Services near me in San Francisco - Management Solutions Assistance San Francisco Teleworkers Management Systems Consulting Services SF
  • Seattle Netwalker Crypto-Ransomware Data-Recovery Seattle Ransomware Business Recovery Consultants Seattle Redmond Bellevue
  • Service Providers Networking Huntsville, Limestone County Small Business Outsourcing IT Emergency Phone Support Huntsville Alabama
  • Services Server patch management Router patch management Consultants
  • Technology Professional ransomware cleanup and recovery
  • Spartanburg Teleworkers Network Security Solutions Consulting Services Spartanburg, South Carolina Remote Workforce Spartanburg Assistance - Network Security Systems Assistance Spartanburg, US
  • Technical Support Companies Email Email and Telephony Integration Consulting Services Firm
  • ransomware removal and restore Consulting Services
  • Troubleshooters Denver, Colorado Denver, Colorado Migration Company
  • Windows Data Recovery South Carolina Windows Network Support South Carolina
  • ransomware cleanup and file recovery Engineers
  • Work from Home Employees Consulting Experts near me in Carlsbad - Endpoint Security Systems Consulting Carlsbad-Del Mar, California Remote Workforce Carlsbad Guidance - Endpoint Security Solutions Guidance
  • ransomware removal and restore Technology Professional Snatch ransomware recovery Consulting

  • © 2002-2024 Progent Corporation. All rights reserved.