Cyber Alarm logo

Ensure your business meets UK government cybersecurity standards.

Protect your business against hackers without the hassle

No lengthy installations or certifications are required to start your free cybersecurity scan. Once you sign up, we will run hundreds of tests on your domain, website and email addresses to identify and monitor potential threats - and we’re constantly adding more.


It all starts with your domain...

There is no need to answer lots of questions or fill in lengthy forms: once you have registered your domain with us, we’ll do the rest.

We will identify which services you are using (eg, who manages your email, Microsoft, Google, etc. and who hosts your website). 

We will then use this online ID report as the basis for our ongong security scanning.

24/7 monitoring

We continually run hundreds of tests to assess the security of your busines’s domain, email addresses and website. As well as testing internal security, we search the internet (including the Dark Web) for warning signs of potential cyberattacks or data breaches.

We also look for errors in your security configurations, outdated certificates, risks of data theft and more.

Cyber Alarm - last scan - how it works
Cyber Alarm alerts - how it works

Getting your priorities right

We use a traffic-light system so that you can focus on what’s most urgent for your business. By flagging the problems that are causing disruption right now and highlighting the issues that need to be addressed in future, we empower you to take full responsibility for your cybersecurity.

We work hard to make it easy

Our team works tirelessly to translate technical information into clear and simple language, so that you can get to the heart of issues and resolve them quickly and easily.

Cyber Alarm - popup - how it works

Hundreds of tests today and we’re always adding more

We’re adding new tests all the time to stay one step ahead of the evolving cybercrime landscape. Our tests run 24/7 so that any new threats can be identified and dealt with quickly and easily.

Finding leaked email details

In order to prevent criminals from gaining access to your private accounts, we check whether the email addresses and passwords that you or your staff use for online services have been leaked on the internet. We then alert you if there is evidence of a breach.

Data breach tokens

These allow you to track if your company’s data has been breached by generating a secret test entry for you to add to places where you store and manage your customer/supplier data. If this test entry ever receives an email, we’ll automatically alert you of a potential data breach.

Email fraud solutions

We let you know if you’re at risk of email fraud and continuously check that your email addresses are secure.

Listening to hacker chatter

We look out for your domain name on hacker forums and alert you if you become a target for an attack.


We monitor anti-phishing services for your domain and notify you if hackers have run a phishing scam on your website.

Blacklist monitoring

We monitor more than 40 blacklists of email addresses, IPs and URLs and notify you immediately if you appear on one.

Security certificate scan

A TLS certificate proves that you are the official owner of your website; we warn you when yours is about to expire.

WordPress vulnerability check

We detect and report vulnerabilities in plugins, themes and outdated versions of WordPress.

Web content cloning

We look for other websites which look identical or very similar to yours – it could be a sign of someone trying to steal your clicks, customers or worse.

Compromised web applications

If we spot that you are using a web site or service which is known to be insecure or which recently experenced a cyber attack, we will notify you immediately.

Website configuration

We will check what servers your domain is connected to and compile them in an easy-to-read list.

Lookalike domains

We monitor all newly registered domain names to identifyany that could be mistaken for yours (eg ‘rntv.com’ instead of ‘mtv.com’ or ‘rightmoves.co.uk’ instead of ‘rightmove.co.uk’).


About Cyber Alarm

Just visit our home page and enter your domain name to sign up.

Cyber Alarm is designed to be cost effective and affordable for small and medium sized companies.

Our Cyber Alarm Basic is £29 per month or there is a totally free version.

Just login to your account and click the Deactivate Account button. There is no committment, your account will be deactivated straight away and no further subscription feeds will be due.


Click on the ‘Forgotten password’ link on the login page, enter your email address and we’ll email you a link to reset your password.

We will monitor as many domains as you would like us to.

You can chat to us by clicking the ‘Chat’ button in the bottom right corner of this screen or email us at hello@cyberalarm.org

We use the concept of scans for all the different tests that we run and monitor for you. So a scan could also be considered a security risk that we monitor for your business.

Currently we have a few thousand scans and we are adding more every week. The number of scans that are run against your domain will depend on what services we find for you.


If we find a serious problem on your domain, we will generate an ‘alarm’. This is used to notify you when there is a serious vulnerability that may expose you to a data theft or systems breach.


A warning is used to notify you of anything we spot that could potentially be problematic, but is not considered a major or immediate risk.

Components of your domain that are configured correctly or that do not represent a threat to your systems will be classed as ‘secure’. This means that you don’t need to be concerned about the result.

About cyber security

Cybersecurity is the protection of online services and data, such as email, websites, social media and online banking; and of technology infrastructure such as fibre-optic cables and services such as the Domain Name System. As in the physical world, cybersecurity involves many different aspects, from preventative measures (eg, locking your door) to tools and services (eg, burglar alarms and motion sensor lights), threat monitoring and deterrence (eg, security guards and CCTV), and responses and solutions (eg, police and insurers).
Many of the tools out there overlap with each other, while others are very niche, covering a specific threat or type of technology. Cybersecurity products are continually evolving and emerging to address new threats. Most products currently focus on protecting your personal devices or networks of connected devices. You are probably familiar with most of these products already – antivirus software, backup services, firewalls, passwords etc.
A ‘domain’ is a user-friendly name which allows people to find resources online. For example, all of Google’s services can be accessed from the domain name ‘Google.com’. Computers don’t use domain names to locate specific websites, but rather use numerical IP addresses. Normally, a company will buy a domain which matches its company name (eg, CyberAlarm.org) and then put their website and email ‘onto’ that domain.
There are so many different names for a hacker, depending on the context. To us, it refers ro someone who is trying to attack your cloud services to break them, to steal data, to take control of them or for some other malicious purpose. They can include cybercriminals, online gangs, fraudsters – the list goes on and on.
This is usually another name for a hacker. However, in some cases, a threat actor may not be actively trying to compromise your services; it may simply be scanning the internet for vulnerabilities to sell on to other parties, which can then exploit this information. The term is often used by large organisations or governments to describe other groups such as unfriendly governments or sophisticated online gangs.

There are plenty of cybersecurity resources available online – for example:

  • UK National Cyber Security Centre
  • US National Institute for Standards and Technology
  • Open Web Application Security Project
  • Offensive Security

Alternatively, please feel free to get in touch with us – we are always happy to give you any advice we can.

Sooner or later, your business will be the target of cybercrime. It’s much better to take steps to protect yourself now, rather than waiting until after you’ve been hacked.
While many companies monitor certain cloud components to some extent, no one is monitoring everything for you. And even if other companies do share what they monitor, this information is seldom provided in clear, easily understood language.
Attackers may steal your login credentials and then use them to access customer databases, social media or online banking services. We give you an early warning if your systems are targeted or your customer databases are compromised (something that a hosting provider may not notice).
It’s not just your website that we monitor for you. We also monitor whether your emails have been blacklisted or are being marked as spam. What would your customers think if they emailed you and never received a reply; or if they accidentally downloaded a virus from one of your emails?
Hackers are rarely looking for sensitive data. They would rather intercept your emails to customers and, for example, change the bank details on your invoices. Did you know a hacker can access almost any of your online services by simply pressing ‘forgot password’ and having a new password sent to your account? Can you imagine if they were able to intercept those emails?
If you have the necessary skills and time, you could probably do some of what we do for yourself. However, our value comes from knowing exactly what to monitor and from the expert advice we provide on the results. This is all we do, day in, day out. As a result, we can spot problems long before you would notice them yourself.
Most cybersecurity companies require you to install complex systems or to have IT support who understand your technology and can make lots of complex configuration changes. Their systems are designed for big companies with big budgets. Cyber Alarm brings these same systems to small and medium-sized businesses in a really simple way allowing you to understand and manage them yourself.
We can’t promise you won’t be hacked; no one can. However, we can help identify how and why you might be hacked, and give you clear and straightforward advice on how to address the problem. In the worst case, we will notify you immediately if your data is compromised , enabling you to take action to avoid the worst effects of a GDPR breach.