Cyber Alarm logo

Ensure your business meets the cybersecurity standards set
by the UK government.

Protection against hackers without the hassle

No lengthy installations or certifications are required to start your free cybersecurity scan. Once you’re signed up we’ll run hundreds of tests on your domain, website and email address and we’re constantly adding more.


It starts with your domain

We won’t ask you lots of questions or have you fill in long boring forms. Once your domain is registered, we’ll do the rest.

We will work out what services you are using (such as who manages your email, Microsoft, Google, etc. or who hosts your website). 

You can consider this your online ID report and its what we then use to start our security scanning.

Scanning 24/7

We run hundreds of tests that assess the security of your business’ domain, email addresses and website. As well as looking at your business’ internal security, we search the internet (including the dark web) for hints of a cyberattack or a data leak.

We look for errors in your security configurations, outdated certificates, risks of data theft and more.

Cyber Alarm - last scan - how it works
Cyber Alarm alerts - how it works

Getting your priorities straight

We use a traffic light system so you can focus on what’s urgent. By directing you to the problems that are causing your business disruption right now and lining up warnings that need to be addressed in future, you’re able to take the responsibility for your cybersecurity into your own hands.

We work hard to make it easy

Our team works tirelessly to turn technical information into simple language, so you can get the issue resolved quickly and easily.

Cyber Alarm - popup - how it works

127 tests today and we’re always adding more

We’re adding new tests each week to stay one step ahead of the evolving landscape of cybercrime. Our tests run constantly so that any new threats can be dealt with quickly and easily.

Finding your leaked emails

In order to prevent criminals from gaining access to your private accounts, we check whether the email addresses and passwords you or your staff use for online services have been leaked onto the internet. We then alert you if there is evidence of a breach.

Data breach tokens

These allow you to track if your company’s data has been breached by generating a secret test entry for you to add to places where you store and manage your customer/supplier data. If this test entry ever receives an email, we’ll automatically alert you of a potential data breach.

Email antispam

We let you know if you’re at risk of email fraud, and continuously check that your email addresses are secure.

Listening to hacker chatter

We listen out for your domain name on hacker forums and alert you if you become a target for an attack.


We monitor anti-phishing services for your domain and notify you if hackers have run a phishing scam on your website.

Blacklist monitoring

We monitor more than 40 blacklists of email addresses, IPs and URLs and immediately notify you if you appear on one.

Security certificate scan

A TLS Certificate verifies you as the owner of your website; we warn you when yours is about to expire.

WordPress vulnerability check

We detect and report vulnerabilities in plugins, themes and outdated versions of WordPress.

Web content cloning

If there is another website which looks identical or very similar to yours it could be a sign of someone trying to steal your clicks, customers or worse.

Compromised web applications

If we spot that you are using a web site or service which is known to be insecure or recently experenced a cyber attack we will notify you.

Website configuration

We check what servers your domain is connected to and compile them in an easy-to-read list.

Lookalike Domains

We monitor all newly registered domain names to find any that could be mistaken for yours. (e.g rntv.com instead of mtv.com or rightmoves.co.uk insted of rightmove.co.uk)


About Cyber Alarm

Just visit our home page and enter your domain name to sign up.
Cyber Alarm has been designed to be cost effective and affordable for small and medium sized companies. We plan to launch with a subscription of £50 per month.
Just login to your account and click the Deactivate Account button. There is no committment, you account will be closed straght away and you’ll not have to pay any more after that month.
Click on the ‘forgotten password’ link on the login page, enter your address and we’ll email you a link to reset your password.
You can monitor as many domains as you want.
You can chat to us by clicking the chat button in the bottom of this screen or email us at hello@cyberalarm.org
We use the concept of Indicators for all the different things that we monitor for you. So an indicator could also be considered a service that scans your internet servcies.
Currently we have a few thousand indicators and we are adding more every week. The number of indicators that are run against your domain will depend on what services we find for you.
When we find something wrong on your domain that is serious we will generate an Alarm. Alarms are used to tell you when there is a serious vulnerability that could be used to steal your data or breach your systems.
We will notify you of a warning when we spot something that isn’t quite right but would not normally be a big risk.
Whenever our indicators assess a component of your domain that is configured correctly or does not represent a threat to your systems will class it as ‘Secure’. This means taht we feel you dont need to be concerned with the result.

About Cyber Security

Cyber Security is the protection of online services and data such as email, websites, social media and online banking aswell as hardening and defence of technology infrastructure which allows the internet to work such as fiber optic cables and services like DNS. Similar to physical or other security domains, Cyber Security has many elements or angles from preventative measures (locking your door), to tools and services (burglar alarms, and motion sensing lights), to monitoring and discouraging  threats (security guards and CCTV), and on to responsive and resolutions (police and insurance).
This is a tough one, many of the tools out there overlap each other and others are very niche, covering only a specific threat or type of technology. Along with the pace of change in modern life Cyber Security products are always popping up to address new threats. Most products currently focus on protection your personal devices or protecting a network of connected devices. You are probably familiar with most of these products already – Anti Virus, Backups, Firewalls, Passwords etc.
A domain is the human friendly name which allows people to find resouces online. For example Google.com is the domain name for all of googles servers and services. Computers dont actuall use domains at all, they require IP addresses and lots of 1s and 0s. Normally a company will buy a domain which matches their company name ‘CyberAlarm.org’ is ours and then put their website and email ‘onto’ that domain.
There are so many different names for a hacker depending on the context. To us it simply means someone who is trying to attack your cloud services either to break them, to steal data, to take control of your systems or for some other reason that you wouldn’t want. Sometime they will be refered to as cyber criminals, online gangs, fraudsters, the list can go on and on.
This is really just another name for a Hacker. However in this case they may not actually be trying to compromise you and your services. They could simply be scanning the internet for vulnerabilities to sell on to other people who know how to exploit the informtation. Threat actors is usually a term used by large organisations or people at governement level to describe other groups such as unfriendly governments or sophisticated online gangs.
There are plenty of online resources for someone who wants to learn more about cyber security. Check out some of the government and not for profit organisations such as:
  • UK National Cyber Security Centre
  • USA have a group called National Institute for Standards and Technology who are taking quite a lead in Cyber Security.
  • Open Web Application Security Project
  • Offensive Security
Or you could just get in touch with us. We area always happy to give you any advise we can.
Sooner or later you will be the target of a cyber crime. It’s much better to add some protection now before you need it rather than wait until after you’ve been hacked.
While lots of companies do some level of monitoring of some cloud components, no one is monitoring everything for you. If they do share what they monitor then usually it isn’t in plain English for you to understand.
Attackers will often steal your login credentials and then use them to access your online banking, your social media or your customer databases. We give you an early warning when they are targeting your  systems or stolen your customer database (something that the hosting provider may not notice).
It’s not just your website that we monitor for you. We monitor if your emails are being blacklisted or marked as spam. What would your customers think if they email you and you never reply or if they receive a virus from your email?
Maybe not, but that is rarely what hackers are after. They’d rather intercept your emails and for example change things like your invoice bank details. Did you know a hacker can get into almost any of your online services by simply pressing ‘forgot password’ and having a new password emailed to your account. Can you imagine if they were able to intercept those emails?
If you have the skills and the time you could probably do some of what we do for yourself. Our value comes from knowing what to monitor and how to read and offer expert advice on the results. It’s all we do. So we can do it all the time, literally every hour, and spot problems long before you would notice yourself.
Most Cyber Security companies require complex systems to be installed or for you to have IT support who understand the technology to make lots of complex configurations changes. Their systems are designed for big companies with big budgets. Cyber Alarm brings this same technology to small and mid sized companies and doing it in a really simple way that you can understand and manage yourself.
We can’t promise you wont be hacked. No one can. However we can help identify where or how you may be hacked and give you advice in clear language on what to do to fix the problem before you get hacked. In the worst case we’ll be able to tell you when your data has been leaked and allow you to take action to prevent getting fined for a breach of GDPR.