FAQs
Cyber Alarm
Just visit our home page and enter your domain name to sign up.
Cyber Alarm has been designed to be cost effective and affordable for small and medium sized companies.
We have free plans and paid plans from £30 per month
Just login to your account and click the Deactivate Account button.
There is no commitment, you account will be closed straight away and you’ll not have to pay any more after that month.
Click on the ‘forgotten password’ link on the login page, enter your address and we’ll email you a link to reset your password.
You can monitor as many domains as you want.
Email us at help@becyberalarmed.com
We use the concept of Scans for all the different things that we monitor for you. So an indicator could also be considered a service that scans your internet servcies.
Currently, we have a few thousand indicators and we are adding more every week.
The number of indicators that are run against your domain will depend on what services we find for you.
When we find something wrong on your domain that is serious we will generate an Alarm.
Alarms are used to tell you when there is a serious vulnerability that could be used to steal your data or breach your systems.
We will notify you of a warning when we spot something that isn’t quite right but would not normally be a big risk.
Whenever our indicators assess a component of your domain that is configured correctly or does not represent a threat to your systems will class it as ‘Secure’. This means taht we feel you dont need to be concerned with the result.
Cyber Security
Cyber Security is the protection of online services and data such as email, websites, social media and online banking aswell as hardening and defence of technology infrastructure which allows the internet to work such as fiber optic cables and services like DNS.
Similar to physical or other security domains, Cyber Security has many elements or angles from preventative measures (locking your door), to tools and services (burglar alarms, and motion sensing lights), to monitoring and discouraging threats (security guards and CCTV), and on to responsive and resolutions (police and insurance).
This is a tough one, many of the tools out there overlap each other and others are very niche, covering only a specific threat or type of technology. Along with the pace of change in modern life Cyber Security products are always popping up to address new threats.
Most products currently focus on protection your personal devices or protecting a network of connected devices. You are probably familiar with most of these products already – Anti Virus, Backups, Firewalls, Passwords etc.
A domain is the human friendly name which allows people to find resouces online. For example Google.com is the domain name for all of googles servers and services.
Computers dont actuall use domains at all, they require IP addresses and lots of 1s and 0s.
Normally a company will buy a domain which matches their company name ‘CyberAlarm.org’ is ours and then put their website and email ‘onto’ that domain.
There are so many different names for a hacker depending on the context. To us it simply means someone who is trying to attack your cloud services either to break them, to steal data, to take control of your systems or for some other reason that you wouldn’t want.
Sometime they will be refered to as cyber criminals, online gangs, fraudsters, the list can go on and on.
This is really just another name for a Hacker. However in this case they may not actually be trying to compromise you and your services. They could simply be scanning the internet for vulnerabilities to sell on to other people who know how to exploit the informtation.
Threat actors is usually a term used by large organisations or people at governement level to describe other groups such as unfriendly governments or sophisticated online gangs.
There are plenty of online resources for someone who wants to learn more about cyber security.
Check out some of the government and not for profit organisations such as:
- UK National Cyber Security Centre
- USA have a group called National Institute for Standards and Technology who are taking quite a lead in Cyber Security.
- Open Web Application Security Project
- Offensive Security
Sooner or later you will be the target of a cyber crime. It’s much better to add some protection now before you need it rather than wait until after you’ve been hacked.
While lots of companies do some level of monitoring of some cloud components, no one is monitoring everything for you. If they do share what they monitor then usually it isn’t in plain English for you to understand.
Attackers will often steal your login credentials and then use them to access your online banking, your social media or your customer databases. We give you an early warning when they are targeting your systems or stolen your customer database (something that the hosting provider may not notice).
Maybe not, but that is rarely what hackers are after. They’d rather intercept your emails and for example change things like your invoice bank details. Did you know a hacker can get into almost any of your online services by simply pressing ‘forgot password’ and having a new password emailed to your account. Can you imagine if they were able to intercept those emails?
If you have the skills and the time you could probably do some of what we do for yourself. Our value comes from knowing what to monitor and how to read and offer expert advice on the results. It’s all we do. So we can do it all the time, literally every hour, and spot problems long before you would notice yourself.
Most Cyber Security companies require complex systems to be installed or for you to have IT support who understand the technology to make lots of complex configurations changes. Their systems are designed for big companies with big budgets.
Cyber Alarm brings this same technology to small and mid sized companies and doing it in a really simple way that you can understand and manage yourself.
We can’t promise you wont be hacked. No one can. However we can help identify where or how you may be hacked and give you advice in clear language on what to do to fix the problem before you get hacked.
In the worst case we’ll be able to tell you when your data has been leaked and allow you to take action to prevent getting fined for a breach of GDPR.