Progent's Ransomware Forensics Investigation and Reporting in The Woodlands
Progent's ransomware forensics consultants can preserve the evidence of a ransomware attack and perform a detailed forensics investigation without slowing down the processes related to operational resumption and data recovery. Your The Woodlands organization can use Progent's post-attack forensics documentation to counter subsequent ransomware assaults, validate the recovery of encrypted data, and comply with insurance carrier and governmental requirements.
Ransomware forensics is aimed at tracking and describing the ransomware attack's progress across the network from start to finish. This audit trail of the way a ransomware assault progressed through the network helps your IT staff to assess the impact and uncovers gaps in rules or work habits that should be rectified to avoid future breaches. Forensics is typically assigned a top priority by the insurance carrier and is typically required by government and industry regulations. Since forensic analysis can be time consuming, it is essential that other important activities such as business continuity are executed in parallel. Progent has a large team of IT and data security experts with the skills required to perform activities for containment, operational continuity, and data restoration without interfering with forensics.
Ransomware forensics analysis is arduous and calls for intimate interaction with the teams focused on file restoration and, if needed, payment negotiation with the ransomware attacker. Ransomware forensics can involve the review of all logs, registry, GPO, Active Directory (AD), DNS, routers, firewalls, schedulers, and basic Windows systems to detect changes.
Activities associated with forensics include:
- Isolate without shutting down all possibly suspect devices from the network. This may require closing all RDP ports and Internet connected NAS storage, changing admin credentials and user passwords, and setting up 2FA to guard your backups.
- Create forensically complete digital images of all suspect devices so your file recovery group can get started
- Save firewall, VPN, and other critical logs as soon as feasible
- Determine the type of ransomware involved in the attack
- Survey every computer and storage device on the system as well as cloud storage for signs of encryption
- Catalog all compromised devices
- Determine the type of ransomware involved in the assault
- Review log activity and sessions to establish the time frame of the assault and to spot any potential lateral migration from the originally infected machine
- Identify the security gaps used to perpetrate the ransomware assault
- Look for new executables associated with the first encrypted files or network breach
- Parse Outlook PST files
- Examine email attachments
- Extract URLs from email messages and check to see if they are malicious
- Provide detailed incident documentation to meet your insurance and compliance regulations
- Document recommendations to close cybersecurity gaps and enforce processes that lower the exposure to a future ransomware exploit
Progent's Background
Progent has delivered online and onsite IT services across the U.S. for more than 20 years and has earned Microsoft's Partner certification in the Datacenter and Cloud Productivity competencies. Progent's team of subject matter experts includes professionals who have been awarded advanced certifications in foundation technologies such as Cisco infrastructure, VMware virtualization, and major distributions of Linux. Progent's cybersecurity consultants have earned internationally recognized certifications such as CISM, CISSP, and CRISC. (See Progent's certifications). Progent also has guidance in financial management and Enterprise Resource Planning application software. This scope of skills gives Progent the ability to salvage and integrate the undamaged parts of your IT environment after a ransomware intrusion and rebuild them quickly into a viable system. Progent has collaborated with top insurance carriers including Chubb to assist organizations recover from ransomware assaults.
Contact Progent about Ransomware Forensics Analysis Expertise in The Woodlands
To learn more information about ways Progent can assist your The Woodlands business with ransomware forensics investigation, call 1-800-462-8800 or visit Contact Progent.