cybersmart.co.uk
Open in
urlscan Pro
2606:4700:20::681a:2f5
Public Scan
Submitted URL: https://cybersmart.uk/
Effective URL: https://cybersmart.co.uk/
Submission Tags: phishingrod
Submission: On April 24 via api from DE — Scanned from DE
Effective URL: https://cybersmart.co.uk/
Submission Tags: phishingrod
Submission: On April 24 via api from DE — Scanned from DE
Form analysis
3 forms found in the DOMGET https://cybersmart.co.uk/
<form autocomplete="off" action="https://cybersmart.co.uk/" class="c-form" method="get">
<label class="c-form__label" for="c-form__input"> Search </label>
<input type="search" placeholder="" name="s" value="" id="c-form__input" class="c-form__input js-search-input">
<div class="c-form__loader"></div>
<div class="c-form__button--clear js-search-clear">
<img src="https://cybersmart.co.uk/wp-content/uploads/2024/04/search-close.svg" loading="lazy" decoding="async" width="24" height="24" alt="Clear search icon">
</div>
</form>
POST https://cybersmart.formstack.com/forms/index.php
<form autocomplete="off" id="fsForm5733482" method="post" class="StyledForm-sc-1xaj75q-0 daIksl fsForm" action="https://cybersmart.formstack.com/forms/index.php" novalidate="" enctype="multipart/form-data"><input type="hidden" tabindex="-1"
name="displayTime" value="2024-04-24T01:07:04-04:00"><input type="hidden" tabindex="-1" name="formstackFormSchemaVersion" value="4"><input type="hidden" tabindex="-1" name="formstackFormRendererVersion" value="2.30.1"><input type="hidden"
tabindex="-1" name="form" value="5733482"><input type="hidden" tabindex="-1" name="viewkey" value="7HkpgbyTZ5"><input type="hidden" tabindex="-1" name="password" value=""><input type="hidden" tabindex="-1" name="hidden_fields" value=""><input
type="hidden" tabindex="-1" name="_submit" value="1"><input type="hidden" tabindex="-1" name="incomplete" value=""><input type="hidden" tabindex="-1" name="incomplete_email" value=""><input type="hidden" tabindex="-1" name="incomplete_password"
value=""><input type="hidden" tabindex="-1" name="latitude" value=""><input type="hidden" tabindex="-1" name="longitude" value=""><input id="fsUserAgent" type="hidden" tabindex="-1" name="fsUserAgent"
value="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36">
<div id="fsPage5733482-1" class="StyledPage-sc-15mrpfq-0 hCMMok fsPage">
<div data-testid="section0-col1" id="fsSection0" class="StyledSection-sc-1jyjf4h-0 isdHqD fsSection"><label class="StyledLabel-sc-vn5hkq-0 dmgzOo fsLabelVertical fsFieldCell" id="label-field164069983" for="field164069983"
data-testid="field-164069983"><a id="field-anchor-164069983" tabindex="-1" aria-hidden="true"></a>
<div class="StyledLabelText-sc-1bsmirz-0 exUjoJ fsLabel fsRequiredLabel"><span></span><span class="StyledRequiredMarker-sc-d195mo-0 hcVama fsRequiredMarker">*</span></div>
<div class="StyledSubFieldGroup-sc-ik27pq-0 gfzGQs fsSubFieldGroup">
<div class="StyledSubField-sc-1wt4t9i-0 cfEVbD"><input id="field164069983" type="email" maxlength="" label="" required="" autocomplete="email" class="StyledInput-sc-1cxwxcf-0 hWQrfM fsFieldEmail" name="field164069983" size="50"
placeholder="" data-fs-field-id="164069983" data-fs-field-name="email" data-fs-field-alias="value" value=""></div>
</div>
</label></div>
</div>
<div id="fsSubmit5733482" class="StyledFormFooter-sc-9cjpwp-0 gqkVov fsSubmit fsPagination">
<div class="StyledFormNavigations-sc-t0vu6u-0 jnnwJH"><button id="fsSubmitButton5733482" class="StyledSubmitButton-sc-1ylq3c5-0 kCvBZp fsSubmitButton" type="submit">Subscribe</button></div>
</div>
</form>
POST
<form id="fileUploadForm" enctype="multipart/form-data" method="post" target="fileUploadIframe"><input type="file" id="fileSelector" name="file" style="display: none;"><input name="filename" type="hidden"></form>
Text Content
Sign up to CyberSmart LIVE! Join our partner event on the 18th June and 20th June Register today * Products * Overview * Complete Cyber Confidence * CyberSmart Platform * Products * Cyber Essentials * Cyber Essentials Plus * Active ProtectNew * Privacy Toolbox * Ransomware and Recovery Toolbox * CertOS™ * Featured * 5 benefits of Cyber Essentials certification * Cyber Essentials: How to meet IT infrastructure requirements and get certified * What is Cyber Essentials Plus? * Solutions * Use case * Training and Certification * Insurance * Cybersecurity Risk Management * Cybersecurity Support Services * Business type * Managed IT providers * Cybersecurity for SMEs * Featured * What is a banking trojan and how do you stop one? * IoT: The good, the bad, and the unsecured * 4 reasons why hackers attack the supply chain * Partners * Partners * Become a partner * Alliance partners * CyberSmart LIVE! * Featured * What do the proposed NIS regulations mean for managed service providers? * How does Cyber Essentials benefit MSPs and their customers? * Resources * Content * Blog * For manufacturing * For professional services * SME cost of living crisis report * Supply chain attacks * Security on a budget * Certifications in the UK * The Small Business Guide to Cyber Insurance * Help * Knowledge Base * About us * Pricing Login Book a call Search Search * All * Solutions * Products * Blog * Products * Overview * Complete Cyber Confidence * CyberSmart Platform * Products * Cyber Essentials * Cyber Essentials Plus * Active ProtectNew * Privacy Toolbox * Ransomware and Recovery Toolbox * CertOS™ * Featured * 5 benefits of Cyber Essentials certification * Cyber Essentials: How to meet IT infrastructure requirements and get certified * What is Cyber Essentials Plus? * Solutions * Use case * Training and Certification * Insurance * Cybersecurity Risk Management * Cybersecurity Support Services * Business type * Managed IT providers * Cybersecurity for SMEs * Featured * What is a banking trojan and how do you stop one? * IoT: The good, the bad, and the unsecured * 4 reasons why hackers attack the supply chain * Partners * Partners * Become a partner * Alliance partners * CyberSmart LIVE! * Featured * What do the proposed NIS regulations mean for managed service providers? * How does Cyber Essentials benefit MSPs and their customers? * Resources * Content * Blog * For manufacturing * For professional services * SME cost of living crisis report * Supply chain attacks * Security on a budget * Certifications in the UK * The Small Business Guide to Cyber Insurance * Help * Knowledge Base * About us * Pricing * Privacy Policy * Security * Status * EULA COMPLETE CYBER CONFIDENCE Stop cyber attacks dead in their tracks with CyberSmart: an all-in-one cybersecurity monitoring, optimisation, training and insurance platform proven to defend against the unexpected. Get peace of mind with continuous compliance and round-the-clock protection. Instant demo Book a call 5,000+ BUSINESSES AROUND THE UK TRUST CYBERSMART TO DELIVER COMPLETE CYBER CONFIDENCE WHAT IS CYBERSMART? CyberSmart is the UK’s leading cybersecurity platform for SMEs who mean business when it comes to cyber defence. CyberSmart’s complete security solution for SMEs enables you to grow your business whilst protecting your most valuable assets from harm. Book a call Instant Demo HOW IT WORKS BUILDS THE HUMAN FIREWALL Equip your people with the knowledge to combat cyber attacks. Enforce good cybersecurity practices and meet regulatory obligations with policy management templates and workflows. Create a strong cyber baseline and resolve gaps through government-endorsed cybersecurity certifications. Find out how EVERYDAY CYBERSECURITY Get visibility into your cyber setup and discover strengths and weaknesses across endpoints, users and overall security. Ensure your systems and devices are regularly scanned for vulnerabilities and misconfigurations through always-on monitoring. Make improvements with in-platform guidance on how to fix issues. Find out how FINANCIAL SECURITY AND RECOVERY Protect your business from the unexpected, with up to £100k insurance coverage and our best practice frameworks for preventing ransomware attacks. Simplify compliance with GDPR and other regulations, through Subject Access Request management, privacy policy builder and a suite of dedicated policies to maintain strong data and privacy processes. Find out how UNPARALLELED SCALE AND CONTROL Get visibility into your cyber setup and discover strengths and weaknesses across endpoints, users and overall security. Ensure your systems and devices are regularly scanned for vulnerabilities and misconfigurations with always-on monitoring. Make improvements through in-platform guidance on how to fix issues. Find out how SUPPORT THAT MEETS YOUR BUSINESS NEEDS All of this is underpinned by our world-class, UK-based support team and extensive partner network, handpicked to find you the perfect cyber solutions to fit your business needs. Book a call Instant demo CYBERSECURITY PRODUCTS Protect yourself from 99.80% of common cyber threats * CYBER ESSENTIALS Get protection from 99.8% of common attacks, plus unlimited support and attempts at completing your certification. Discover Cyber Essentials > * CYBER ESSENTIALS PLUS Enjoy the added assurance of external validation for your security by an accredited auditor. Discover Cyber Essentials Plus > * ACTIVE PROTECT Get 24/7 protection with extensive vulnerability and device configuration scanning, policy management, risk assessment reports and cyber security awareness training. Discover Active Protect > * RANSOMWARE & RECOVERY TOOLBOX Defend your business against the unexpected through risk and business continuity plans, combined with our free £100k cyber insurance. Discover R&R Toolbox > * PRIVACY TOOLBOX Meet your business’ regulatory requirements with dedicated workflows, support, assessments and privacy policies. Give your customers peace of mind, by proving your GDPR credentials and providing customers with a process to ask questions about their data. Discover Privacy Toolbox > INTERACTIVE DEMO WHAT OUR CUSTOMERS SAYS “FANTASTIC SERVICE FROM EVERYONE IN THE TEAM” Have completed several certifications with CyberSmart now including Cyber Essentials +. Mark has been a fantastic help and really helped me understand the more complex aspects of the + certification. Tonia was also fantastic and managed to get one of our client’s Cyber Essentials + booked in and completed with only a day or two to go! Thank you so much – more coming your way!” Paul Senior IT Consultant, UK “I COULD SEE HOW GOOD OUR CYBERSECURITY WAS ACROSS THE WHOLE COMPANY” I went through the Cyber Essentials questionnaire adapting the preconfigured answers for our company, this took me around 30 minutes. After a few hours, I could see how good our cybersecurity was across the whole company, and that we were now ready to apply for our Cyber Essentials certificate and get our free insurance policy. Neil S Chief Technology Officer, UK “THE PLATFORM IS SO EASY TO USE THAT FROM SIGN UP TO CERTIFICATION IT MERELY TOOK US 3 HOURS” CyberSmart is a simple and easy to understand software that makes obtaining the CE and CE+ certificate very smooth. The platform is so easy to use that from sign up to certification it merely took us 3 hours. The team behind the software is impeccable. They were always available when I had any questions and made the process enjoyable. I will definitely be using them again. Zein Operations Director, UK “IT WAS CHECKED FOR US AND THEN SUBMITTED ON OUR BEHALF SAFE IN THE KNOWLEDGE IT WAS COMPLETE” Using the Cybersmart agents on all servers and workstations quickly highlighted where our attention should be directed and when all systems were green, filling in the online questionnaire was straightforward. Once submitted to Cybersmart, it was checked for us and then submitted on our behalf safe in the knowledge it was complete. Jeff Founder, UK HOT OFF THE PRESS, OUR LATEST CYBERSECURITY REPORTS AND INSIGHTS MALWARE-AS-A-SERVICE AND THE RISE OF DIY CYBERCRIME Blog Malware WHAT IS A BANKING TROJAN AND HOW DO YOU STOP ONE? Blog Finance HOW NATION-STATE CYBER WARFARE AFFECTS YOU Blog Cyber Warfare DEMYSTIFYING MALWARE: THE 5 STAGES OF A MALWARE ATTACK Blog Malware WHAT IS A REMOTE ACCESS TAKEOVER? Blog Remote access WHAT IS FILELESS MALWARE AND HOW CAN YOU SAFEGUARD YOUR SYSTEMS? Blog Malware AWARDS SECURITY VENDOR OF THE YEAR – SME Computing Security Excellence Awards CYBER SECURITY VENDOR OF THE YEAR Technology Reseller Awards TECH GROWTH BUSINESS OF THE YEAR National Technology Award CYBERTECH 100 2023 Global List PARTNER WITH THE UK’S LEADING CYBERSECURITY SOLUTION FOR SMES Provide scalable cybersecurity monitoring, training and insurance with an all-in-one solution. Boost your service offerings, build strong client relationships and add market-leading SME cybersecurity to your product bundles. Access exclusive discounts, marketing development funds, free certification and vulnerability scanning. Partner with CyberSmart Book a call Enro Ltd t/a Superscript is authorised and regulated by the Financial Conduct Authority. Individual cover purchased online is offered on a standardised, non-advised basis and is not bespoke. Terms, conditions and coverage limits are predetermined by the Underwriter. If you require bespoke coverage offered on an advised basis, please contact our in-house broking team. STAY UP TO DATE WITH OUR NEWSLETTER By subscribing to our newsletter, you confirm you are happy to receive marketing communications from CyberSmart in line with our Privacy Policy. * Subscribe Online Form - Newsletter Subscription * Overview * CyberSmart Platform * Complete Cyber Confidence * Products * Cyber Essentials * Cyber Essentials Plus * Active Protect * Privacy Toolbox * Ransomware and Recovery Toolbox * CertOS™ * Solutions * For SMEs * For Managed IT providers * Support Services * Risk Management * Training and Certification * Insurance * Partners * Become a partner * Alliance partners * CyberSmart LIVE! * Resources * Blog * For manufacturing * For professional services * SME cost of living crisis report * Supply chain attacks * Security on a budget * Certifications in the UK * The Small Business Guide to Cyber Insurance * Knowledge Base * About us * Pricing * Search -------------------------------------------------------------------------------- Copyright © 2024 CyberSmart. All rights reserved. * Privacy Policy * Security * Status * EULA × NOTICE We and selected third parties use cookies or similar technologies for technical purposes and, with your consent, for other purposes as specified in the cookie policy. Use the “Accept” button to consent. Press again to continue 0/1 Learn more and customise Accept Live chat:Chat with an Expert