cybersmart.co.uk Open in urlscan Pro
2606:4700:20::681a:2f5  Public Scan

Submitted URL: https://cybersmart.uk/
Effective URL: https://cybersmart.co.uk/
Submission Tags: phishingrod
Submission: On April 24 via api from DE — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://cybersmart.co.uk/

<form autocomplete="off" action="https://cybersmart.co.uk/" class="c-form" method="get">
  <label class="c-form__label" for="c-form__input"> Search </label>
  <input type="search" placeholder="" name="s" value="" id="c-form__input" class="c-form__input js-search-input">
  <div class="c-form__loader"></div>
  <div class="c-form__button--clear js-search-clear">
    <img src="https://cybersmart.co.uk/wp-content/uploads/2024/04/search-close.svg" loading="lazy" decoding="async" width="24" height="24" alt="Clear search icon">
  </div>
</form>

POST https://cybersmart.formstack.com/forms/index.php

<form autocomplete="off" id="fsForm5733482" method="post" class="StyledForm-sc-1xaj75q-0 daIksl fsForm" action="https://cybersmart.formstack.com/forms/index.php" novalidate="" enctype="multipart/form-data"><input type="hidden" tabindex="-1"
    name="displayTime" value="2024-04-24T01:07:04-04:00"><input type="hidden" tabindex="-1" name="formstackFormSchemaVersion" value="4"><input type="hidden" tabindex="-1" name="formstackFormRendererVersion" value="2.30.1"><input type="hidden"
    tabindex="-1" name="form" value="5733482"><input type="hidden" tabindex="-1" name="viewkey" value="7HkpgbyTZ5"><input type="hidden" tabindex="-1" name="password" value=""><input type="hidden" tabindex="-1" name="hidden_fields" value=""><input
    type="hidden" tabindex="-1" name="_submit" value="1"><input type="hidden" tabindex="-1" name="incomplete" value=""><input type="hidden" tabindex="-1" name="incomplete_email" value=""><input type="hidden" tabindex="-1" name="incomplete_password"
    value=""><input type="hidden" tabindex="-1" name="latitude" value=""><input type="hidden" tabindex="-1" name="longitude" value=""><input id="fsUserAgent" type="hidden" tabindex="-1" name="fsUserAgent"
    value="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36">
  <div id="fsPage5733482-1" class="StyledPage-sc-15mrpfq-0 hCMMok fsPage">
    <div data-testid="section0-col1" id="fsSection0" class="StyledSection-sc-1jyjf4h-0 isdHqD fsSection"><label class="StyledLabel-sc-vn5hkq-0 dmgzOo fsLabelVertical fsFieldCell" id="label-field164069983" for="field164069983"
        data-testid="field-164069983"><a id="field-anchor-164069983" tabindex="-1" aria-hidden="true"></a>
        <div class="StyledLabelText-sc-1bsmirz-0 exUjoJ fsLabel fsRequiredLabel"><span></span><span class="StyledRequiredMarker-sc-d195mo-0 hcVama fsRequiredMarker">*</span></div>
        <div class="StyledSubFieldGroup-sc-ik27pq-0 gfzGQs fsSubFieldGroup">
          <div class="StyledSubField-sc-1wt4t9i-0 cfEVbD"><input id="field164069983" type="email" maxlength="" label="" required="" autocomplete="email" class="StyledInput-sc-1cxwxcf-0 hWQrfM fsFieldEmail" name="field164069983" size="50"
              placeholder="" data-fs-field-id="164069983" data-fs-field-name="email" data-fs-field-alias="value" value=""></div>
        </div>
      </label></div>
  </div>
  <div id="fsSubmit5733482" class="StyledFormFooter-sc-9cjpwp-0 gqkVov fsSubmit fsPagination">
    <div class="StyledFormNavigations-sc-t0vu6u-0 jnnwJH"><button id="fsSubmitButton5733482" class="StyledSubmitButton-sc-1ylq3c5-0 kCvBZp fsSubmitButton" type="submit">Subscribe</button></div>
  </div>
</form>

POST

<form id="fileUploadForm" enctype="multipart/form-data" method="post" target="fileUploadIframe"><input type="file" id="fileSelector" name="file" style="display: none;"><input name="filename" type="hidden"></form>

Text Content

Sign up to CyberSmart LIVE!

Join our partner event on the 18th June and 20th June

Register today
 * Products
   * Overview
     * Complete Cyber Confidence
     * CyberSmart Platform
   * Products
     * Cyber Essentials
     * Cyber Essentials Plus
     * Active ProtectNew
     * Privacy Toolbox
     * Ransomware and Recovery Toolbox
     * CertOS™
   * Featured
     * 5 benefits of Cyber Essentials certification
       
       
     
     * Cyber Essentials: How to meet IT infrastructure requirements and get
       certified
       
       
     
     * What is Cyber Essentials Plus?
       
       
 * Solutions
   * Use case
     * Training and Certification
     * Insurance
     * Cybersecurity Risk Management
     * Cybersecurity Support Services
   * Business type
     * Managed IT providers
     * Cybersecurity for SMEs
   * Featured
     * What is a banking trojan and how do you stop one?
       
       
     
     * IoT: The good, the bad, and the unsecured
       
       
     
     * 4 reasons why hackers attack the supply chain
       
       
 * Partners
   * Partners
     * Become a partner
     * Alliance partners
     * CyberSmart LIVE!
   * Featured
     * What do the proposed NIS regulations mean for managed service providers?
       
       
     
     * How does Cyber Essentials benefit MSPs and their customers?
       
       
 * Resources
   * Content
     * Blog
     * For manufacturing
     * For professional services
     * SME cost of living crisis report
     * Supply chain attacks
     * Security on a budget
     * Certifications in the UK
     * The Small Business Guide to Cyber Insurance
   * Help
     * Knowledge Base
     * About us
 * Pricing

Login Book a call
Search
Search


 * All
 * Solutions
 * Products
 * Blog



 * Products
   * Overview
     * Complete Cyber Confidence
     * CyberSmart Platform
   * Products
     * Cyber Essentials
     * Cyber Essentials Plus
     * Active ProtectNew
     * Privacy Toolbox
     * Ransomware and Recovery Toolbox
     * CertOS™
   * Featured
     * 5 benefits of Cyber Essentials certification
       
       
     
     * Cyber Essentials: How to meet IT infrastructure requirements and get
       certified
       
       
     
     * What is Cyber Essentials Plus?
       
       
 * Solutions
   * Use case
     * Training and Certification
     * Insurance
     * Cybersecurity Risk Management
     * Cybersecurity Support Services
   * Business type
     * Managed IT providers
     * Cybersecurity for SMEs
   * Featured
     * What is a banking trojan and how do you stop one?
       
       
     
     * IoT: The good, the bad, and the unsecured
       
       
     
     * 4 reasons why hackers attack the supply chain
       
       
 * Partners
   * Partners
     * Become a partner
     * Alliance partners
     * CyberSmart LIVE!
   * Featured
     * What do the proposed NIS regulations mean for managed service providers?
       
       
     
     * How does Cyber Essentials benefit MSPs and their customers?
       
       
 * Resources
   * Content
     * Blog
     * For manufacturing
     * For professional services
     * SME cost of living crisis report
     * Supply chain attacks
     * Security on a budget
     * Certifications in the UK
     * The Small Business Guide to Cyber Insurance
   * Help
     * Knowledge Base
     * About us
 * Pricing

 * Privacy Policy
 * Security
 * Status
 * EULA




COMPLETE CYBER CONFIDENCE

Stop cyber attacks dead in their tracks with CyberSmart: an all-in-one
cybersecurity monitoring, optimisation, training and insurance platform proven
to defend against the unexpected.

Get peace of mind with continuous compliance and round-the-clock protection.



Instant demo
Book a call



5,000+ BUSINESSES AROUND THE UK TRUST CYBERSMART TO DELIVER


COMPLETE CYBER CONFIDENCE




WHAT IS CYBERSMART?

CyberSmart is the UK’s leading cybersecurity platform for SMEs who mean business
when it comes to cyber defence. CyberSmart’s complete security solution for SMEs
enables you to grow your business whilst protecting your most valuable assets
from harm.

Book a call
Instant Demo





HOW IT WORKS


BUILDS THE HUMAN FIREWALL

Equip your people with the knowledge to combat cyber attacks. Enforce good
cybersecurity practices and meet regulatory obligations with policy management
templates and workflows. Create a strong cyber baseline and resolve gaps through
government-endorsed cybersecurity certifications.

Find out how


EVERYDAY CYBERSECURITY

Get visibility into your cyber setup and discover strengths and weaknesses
across endpoints, users and overall security. Ensure your systems and devices
are regularly scanned for vulnerabilities and misconfigurations through
always-on monitoring. Make improvements with in-platform guidance on how to fix
issues.

Find out how


FINANCIAL SECURITY AND RECOVERY

Protect your business from the unexpected, with up to £100k insurance coverage
and our best practice frameworks for preventing ransomware attacks. Simplify
compliance with GDPR and other regulations, through Subject Access Request
management, privacy policy builder and a suite of dedicated policies to maintain
strong data and privacy processes.

Find out how


UNPARALLELED SCALE AND CONTROL

Get visibility into your cyber setup and discover strengths and weaknesses
across endpoints, users and overall security. Ensure your systems and devices
are regularly scanned for vulnerabilities and misconfigurations with always-on
monitoring. Make improvements through in-platform guidance on how to fix issues.

Find out how


SUPPORT THAT MEETS YOUR BUSINESS NEEDS

All of this is underpinned by our world-class, UK-based support team and
extensive partner network, handpicked to find you the perfect cyber solutions to
fit your business needs.

Book a call
Instant demo




CYBERSECURITY PRODUCTS

Protect yourself from 99.80% of common cyber threats


 * CYBER ESSENTIALS
   
   Get protection from 99.8% of common attacks, plus
   
   unlimited support and attempts at completing your certification.
   
   
   
   Discover Cyber Essentials >
   


 * CYBER ESSENTIALS PLUS
   
   Enjoy the added assurance of external validation for
   
   your security by an accredited auditor.
   
   
   
   Discover Cyber Essentials Plus >
   


 * ACTIVE PROTECT
   
   Get 24/7 protection with extensive vulnerability and
   
   device configuration scanning, policy management,
   
   risk assessment reports and cyber security awareness training.
   
   
   
   Discover Active Protect >
   


 * RANSOMWARE & RECOVERY TOOLBOX
   
   Defend your business against the unexpected through
   
   risk and business continuity plans, combined with our
   
   free £100k cyber insurance.
   
   
   
   Discover R&R Toolbox >
   


 * PRIVACY TOOLBOX
   
   Meet your business’ regulatory requirements with
   
   dedicated workflows, support, assessments
   
   and privacy policies. Give your customers peace of
   
   mind, by proving your GDPR credentials and
   
   providing customers with a process to ask questions
   
   about their data.
   
   
   
   Discover Privacy Toolbox >
   




INTERACTIVE DEMO






WHAT OUR CUSTOMERS SAYS




“FANTASTIC SERVICE FROM EVERYONE IN THE TEAM”

Have completed several certifications with CyberSmart now including Cyber
Essentials +.

Mark has been a fantastic help and really helped me understand the more complex
aspects of the + certification. Tonia was also fantastic and managed to get one
of our client’s Cyber Essentials + booked in and completed with only a day or
two to go! Thank you so much – more coming your way!”

Paul

Senior IT Consultant, UK


“I COULD SEE HOW GOOD OUR CYBERSECURITY WAS ACROSS THE WHOLE COMPANY”

I went through the Cyber Essentials questionnaire adapting the preconfigured
answers for our company, this took me around 30 minutes. After a few hours, I
could see how good our cybersecurity was across the whole company, and that we
were now ready to apply for our Cyber Essentials certificate and get our free
insurance policy.

Neil S

Chief Technology Officer, UK


“THE PLATFORM IS SO EASY TO USE THAT FROM SIGN UP TO CERTIFICATION IT MERELY
TOOK US 3 HOURS”

CyberSmart is a simple and easy to understand software that makes obtaining the
CE and CE+ certificate very smooth. The platform is so easy to use that from
sign up to certification it merely took us 3 hours. The team behind the software
is impeccable. They were always available when I had any questions and made the
process enjoyable. I will definitely be using them again.

Zein

Operations Director, UK


“IT WAS CHECKED FOR US AND THEN SUBMITTED ON OUR BEHALF SAFE IN THE KNOWLEDGE IT
WAS COMPLETE”

Using the Cybersmart agents on all servers and workstations quickly highlighted
where our attention should be directed and when all systems were green, filling
in the online questionnaire was straightforward. Once submitted to Cybersmart,
it was checked for us and then submitted on our behalf safe in the knowledge it
was complete.

Jeff

Founder, UK


HOT OFF THE PRESS, OUR LATEST CYBERSECURITY REPORTS AND INSIGHTS




MALWARE-AS-A-SERVICE AND THE RISE OF DIY CYBERCRIME

Blog

Malware


WHAT IS A BANKING TROJAN AND HOW DO YOU STOP ONE?

Blog

Finance


HOW NATION-STATE CYBER WARFARE AFFECTS YOU

Blog

Cyber Warfare


DEMYSTIFYING MALWARE: THE 5 STAGES OF A MALWARE ATTACK

Blog

Malware


WHAT IS A REMOTE ACCESS TAKEOVER?

Blog

Remote access


WHAT IS FILELESS MALWARE AND HOW CAN YOU SAFEGUARD YOUR SYSTEMS?

Blog

Malware




AWARDS


SECURITY VENDOR OF THE YEAR – SME

Computing Security Excellence Awards


CYBER SECURITY VENDOR OF THE YEAR

Technology Reseller Awards


TECH GROWTH BUSINESS OF THE YEAR

National Technology Award


CYBERTECH 100

2023

Global List


PARTNER WITH THE UK’S LEADING CYBERSECURITY SOLUTION FOR SMES

Provide scalable cybersecurity monitoring, training and insurance with an
all-in-one solution. Boost your service offerings, build strong client
relationships and add market-leading SME cybersecurity to your product bundles.
Access exclusive discounts, marketing development funds, free certification and
vulnerability scanning.

Partner with CyberSmart
Book a call


Enro Ltd t/a Superscript is authorised and regulated by the Financial Conduct
Authority. Individual cover purchased online is offered on a standardised,
non-advised basis and is not bespoke. Terms, conditions and coverage limits are
predetermined by the Underwriter. If you require bespoke coverage offered on an
advised basis, please contact our in-house broking team.



STAY UP TO DATE WITH OUR NEWSLETTER

By subscribing to our newsletter, you confirm you are happy to receive marketing
communications from CyberSmart in line with our Privacy Policy.
*

Subscribe
Online Form - Newsletter Subscription
 * Overview
   * CyberSmart Platform
   * Complete Cyber Confidence
 * Products
   * Cyber Essentials
   * Cyber Essentials Plus
   * Active Protect
   * Privacy Toolbox
   * Ransomware and Recovery Toolbox
   * CertOS™
 * Solutions
   * For SMEs
   * For Managed IT providers
   * Support Services
   * Risk Management
   * Training and Certification
   * Insurance
 * Partners
   * Become a partner
   * Alliance partners
   * CyberSmart LIVE!
 * Resources
   * Blog
   * For manufacturing
   * For professional services
   * SME cost of living crisis report
   * Supply chain attacks
   * Security on a budget
   * Certifications in the UK
   * The Small Business Guide to Cyber Insurance
   * Knowledge Base
   * About us
 * Pricing
 * Search

--------------------------------------------------------------------------------

Copyright © 2024 CyberSmart. All rights reserved.
 * Privacy Policy
 * Security
 * Status
 * EULA







×


NOTICE

We and selected third parties use cookies or similar technologies for technical
purposes and, with your consent, for other purposes as specified in the cookie
policy.

Use the “Accept” button to consent.
Press again to continue 0/1
Learn more and customise
Accept
Live chat:Chat with an Expert