Overview of Progent's Ransomware Forensics and Reporting in Garland
Progent's ransomware forensics consultants can save the evidence of a ransomware attack and perform a comprehensive forensics analysis without impeding activity related to business resumption and data restoration. Your Garland organization can use Progent's post-attack forensics documentation to combat subsequent ransomware attacks, assist in the restoration of lost data, and meet insurance and regulatory reporting requirements.
Ransomware forensics involves tracking and describing the ransomware assault's progress throughout the network from beginning to end. This history of how a ransomware assault travelled through the network helps you to evaluate the damage and highlights vulnerabilities in security policies or processes that need to be rectified to avoid future break-ins. Forensic analysis is commonly assigned a top priority by the insurance carrier and is often required by state and industry regulations. Because forensic analysis can take time, it is critical that other important recovery processes such as operational resumption are executed in parallel. Progent maintains an extensive team of IT and cybersecurity experts with the knowledge and experience needed to carry out the work of containment, business continuity, and data recovery without interfering with forensics.
Ransomware forensics investigation is arduous and requires close interaction with the groups responsible for data recovery and, if necessary, payment talks with the ransomware threat actor. Ransomware forensics can require the examination of logs, registry, GPO, AD, DNS, routers, firewalls, scheduled tasks, and core Windows systems to look for variations.
Activities involved with forensics investigation include:
- Disconnect but avoid shutting off all potentially affected devices from the system. This may require closing all RDP ports and Internet connected NAS storage, changing admin credentials and user PWs, and configuring 2FA to protect backups.
- Preserve forensically complete duplicates of all exposed devices so your data recovery group can get started
- Save firewall, VPN, and additional key logs as soon as possible
- Determine the variety of ransomware used in the attack
- Examine every machine and storage device on the network including cloud storage for indications of encryption
- Inventory all encrypted devices
- Establish the type of ransomware used in the attack
- Review logs and user sessions to determine the time frame of the attack and to spot any potential lateral movement from the originally infected machine
- Understand the attack vectors used to perpetrate the ransomware attack
- Look for the creation of executables associated with the original encrypted files or system breach
- Parse Outlook PST files
- Examine attachments
- Separate any URLs embedded in email messages and check to see whether they are malware
- Produce detailed incident documentation to satisfy your insurance and compliance regulations
- List recommended improvements to shore up security vulnerabilities and enforce workflows that lower the risk of a future ransomware exploit
Progent's Background
Progent has delivered online and onsite network services throughout the U.S. for over two decades and has earned Microsoft's Gold Partner certification in the Datacenter and Cloud Productivity competencies. Progent's roster of SMEs includes consultants who have earned high-level certifications in foundation technologies such as Cisco networking, VMware virtualization, and major distributions of Linux. Progent's cybersecurity consultants have earned industry-recognized certifications such as CISM, CISSP, and GIAC. (See Progent's certifications). Progent also has top-tier support in financial management and Enterprise Resource Planning application software. This broad array of expertise gives Progent the ability to identify and consolidate the surviving parts of your network after a ransomware attack and rebuild them quickly into a viable network. Progent has collaborated with leading insurance carriers including Chubb to help organizations clean up after ransomware assaults.
Contact Progent about Ransomware Forensics Analysis Expertise in Garland
To find out more information about ways Progent can help your Garland business with ransomware forensics analysis, call 1-800-462-8800 or see Contact Progent.