Cybersecurity Health Check Application
Organization Name
(Required)
County
(Required)
County
Barnstable
Berkshire
Bristol
Dukes
Essex
Franklin
Hampden
Hampshire
Middlesex
Nantucket
Norfolk
Plymouth
Suffolk
Worcester
Contact name
(Required)
First
Last
Contact title
(Required)
Contact office phone
(Required)
Contact mobile phone
Contact email
(Required)
What prompted you to choose this service?
(Required)
How many users do you have?
(Required)
How many devices (end points) do you have?
(Required)
How many servers (physical/virtual) do you have?
(Required)
How many physical locations (buildings) do you have?
(Required)
How many domains do you have?
(Required)
How much data do you have on servers?
(Required)
Do you have managed or endpoint detection and response (MDR or EDR)?
(Required)
Are you using Multi-Factor Authentication (MFA)?
(Required)
Yes
No
What backup software do you currently use?
(Required)
Acronis
Azure
Barracuda
Cohesity
Comet
Datto
Ninjaone
Nutanix
Synology
Unitrends
Veeam
Wasabi
Other
To what extent, if any, do you use encryption?
(Required)
Do you use remote access?
(Required)
Yes
No
Do you have an internal IT department?
(Required)
Yes
No
What challenges would you face in implementing recommendations?
(Required)
Please select the category for which service you would like
(Required)
Category
Vulnerability Scans and Assessments
Process, Policy, and Procedural Assessment
General Services
Only one service may be selected per health check. Please refer to the service descriptions on our website (linked towards the top of this page) for more details.
Please select the service you would like
(Required)
Service
Database Vulnerability Assessment
External Vulnerability Scan
Internal Vulnerability Scan
Security Vulnerability Assessment
Wireless Network Vulnerability Scan
Please select the service you would like
(Required)
Service
Access Control Policies/Procedures
Backup and Recovery Strategy Assessment
Business Impact Analysis (BIA) System Security
Cybersecurity Policy Support
Disaster Recovery Plan Review
Foundation Assessment
IT Asset Management (ITAM)
Log Audit/Monitoring Processes/Procedures Consultation and Documentation
Recommendations and Remediation Plan
Please select the service you would like
(Required)
Service
Cloud Readiness Assessment
Data Breach and PII Liability Summary Report
Data Security Review
Email Encryption Assessment
Endpoint Security Assessment
G-Suite Security Assessment
LAN, WAN, VPN, and Remote Access Review
Network Assessment Report
Whole-Disk Encryption Assessment
Please explain the system you are looking to have investigated and what you're seeking to have done.
(Required)
Our organization agrees to communicate and devote the time necessary to work with EOTSS and the identified Vendor to complete the Cybersecurity Health Check Service according to established timeframes.
(Required)
Agree