Skip to main content

Is tomatom.cz a Scam? Security Check Results - Tom Atom s.r.o. Reviews

tomatom.cz favicon

Is tomatom.cz Safe? Security Analysis for Tom Atom s.r.o.

Check if tomatom.cz is a scam or legitimate. Free security scan and reviews.

TechnologyCzech Republicsmall
jQuery 2.2.4Bootstrap 3.3.7Google AnalyticsGoogle Tag ManagerGoogle reCAPTCHA v3+3 more
Analyzed 7/30/2025Completed 5:48:39 PM
58
Security Score
MEDIUM RISK

AI Summary

Tom Atom s.r.o. is a Czech-based technology service provider specializing in creating intuitive and effective websites, internet marketing, mobile applications, programming, and graphic design. The company targets businesses seeking professional digital solutions to enhance their online presence and sales. The website presents a professional and consistent brand image with clear service offerings and client references, positioning itself as a niche player in the Czech market. Technically, the website uses a moderately modern technology stack including jQuery, Bootstrap, Google Analytics, Google Tag Manager, and Hotjar, with good mobile optimization and SEO practices. Security posture is solid with HTTPS, reCAPTCHA integration, and cookie consent mechanisms, though it lacks some advanced security headers and explicit privacy or security policies. The absence of WHOIS data limits domain legitimacy verification, but the website content and structure suggest a legitimate and professional business. Overall, the site scores well in content quality, technical implementation, and security, with room for improvement in privacy compliance and business credibility transparency.

Detected Technologies

jQuery 2.2.4Bootstrap 3.3.7Google AnalyticsGoogle Tag ManagerGoogle reCAPTCHA v3HotjarCookieConsent v2.7.2Custom JavaScript

đź§ AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

Tom Atom operates as a small-sized technology service company focused on web development and digital marketing services for businesses in the Czech Republic. Its business model revolves around service delivery with key revenue streams likely from custom website projects, marketing campaigns, mobile app development, and programming solutions. The company leverages a portfolio of references to build trust and attract clients. The lack of direct contact emails or phone numbers on the site suggests a preference for controlled lead capture via contact forms. The company does not publicly display certifications or security policies, which could be an area for growth to enhance trust. The partnership ecosystem is not evident from the website, and no related or subsidiary domains were identified. Growth indicators are limited but the professional presentation and use of analytics tools indicate a data-driven approach to business operations.

Security Posture Analysis

Comprehensive Security Assessment

The website demonstrates a moderate to good security maturity level. HTTPS is enforced, and Google reCAPTCHA v3 is implemented on the contact form to mitigate spam and abuse. Cookie consent is managed with granular user control, supporting GDPR compliance. However, the absence of explicit privacy, security, or incident response policies reduces transparency and may present compliance gaps. No security.txt or vulnerability disclosure mechanisms are present. The site uses some older JavaScript libraries which may pose potential vulnerabilities if not regularly updated. Security headers such as Content-Security-Policy and X-Frame-Options are not detected, which are recommended to enhance protection against common web attacks. No exposed sensitive data or obvious vulnerabilities were found in the HTML content. Overall, the security posture is adequate for a small business but could be strengthened with additional policies and technical controls.

Strategic Recommendations

Priority Actions for Security Improvement

1

Implement and publish a comprehensive privacy policy and terms of service to improve transparency and compliance.

✨Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Business Insights

Company:

Tom Atom s.r.o.

Description:

Tom Atom creates intuitive and effective websites that help sell products and services, attract new customers, and build a good reputation for businesses.

Key Services:
Tvorba webových stránekInternetový marketingMobilní aplikaceProgramování chytrých řešeníGrafické práce
Content Quality:

good

Branding:

consistent

Technical Stack

Technologies:
jQuery 2.2.4Bootstrap 3.3.7Google AnalyticsGoogle Tag ManagerGoogle reCAPTCHA v3HotjarCookieConsent v2.7.2Custom JavaScript
Frameworks:
Bootstrap
Performance:

moderate

Mobile:

good

Accessibility:

basic

SEO:

good

Security Assessment

Security Score:
80/100
Best Practices:
  • HTTPS enforced
  • Google reCAPTCHA v3 on contact form
  • Cookie consent with granular control
  • No exposed sensitive data in HTML

Analytics & Tracking

Services:
Google AnalyticsHotjar
Tracking Level:moderate
Privacy Compliance:basic

Advertising & Marketing

Tracking Pixels:
Hotjar
Marketing Tools:
Google reCAPTCHA
Transparency Level:basic

Website Quality Assessment

Design Quality:good
User Experience:good
Content Relevance:good
Navigation Clarity:good
Professionalism:good
Trustworthiness:moderate

Key Observations

1

Website is fully accessible with no blocking or WAF challenges.

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

80/100
Score

Weak Referrer-Policy configuration

LOW

Current value: "no-referrer, strict-origin-when-cross-origin"

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

40/100
Score

No Privacy Policy found

HIGH

GDPR requires a clear and accessible privacy policy

EU business without adequate privacy measures

CRITICAL

EU businesses are subject to strict GDPR requirements

Third-party services without privacy policy

HIGH

Detected services: Google Analytics, Cloudflare, Google APIs

GDPR Compliance Analysis

Privacy Policy0% confidence
Cookie Policy85% confidence
Contact Information Found90% confidence
phone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

2/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No business continuity planning found

MEDIUM

NIS2 emphasizes operational resilience and business continuity

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

Critical sector without clear security compliance

HIGH

Detected sectors: transport, digital

đź“§Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

100/100
Score
No issues found
SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security
SPF Details
Record:
v=spf1 a include:spf.seznam.cz include:mailgun.org include:sparkpostmail.com ?all
DNS Lookups:4/10
Policy:?all
DKIM Selectors Found
Selector:google(1416-bit rsa)
Selector:k1(1296-bit rsa)
DMARC Details
Policy:quarantine
Subdomain Policy:quarantine
Aggregate Reports:dmarc@6j8x88m2.uriports.com
Forensic Reports:dmarc@6j8x88m2.uriports.com
MTA-STS Details

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

72/100
Score

Weak Protocols Supported

HIGH

Server supports weak protocols: TLSv1.1

OCSP Stapling Not Enabled

LOW

OCSP stapling improves performance and privacy

Certificate Transparency Not Implemented

LOW

Certificate is not logged in Certificate Transparency logs

SSL Certificate Expires Within 90 Days

MEDIUM

SSL certificate expires in 80 days

Partial SSL/TLS Assessment

LOW

Completed 3 of 4 security checks due to time constraints

Protocol Support

TLSv1.3TLSv1.2TLSv1.1

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

75/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

Weak SPF Policy

HIGH

SPF record has permissive policy allowing any server to send email

Domain Registration Details

Domain Age
12 years(mature)

DNS Records

A Records:217.16.188.56
Name Servers:
ns.wedos.com
ns.wedos.czDNS only
ns.wedos.eu
ns.wedos.net
MX Records:
20: 81c45630f85de902.mx1.emailprofi.seznam.cz
10: 81c45630f85de902.mx2.emailprofi.seznam.cz
SOA:Serial: 2025072702, TTL: 3600s

DNSSEC Status

DNSSEC Not Enabled

DNS Performance

Resolution Time:55ms

SPF Analysis

SPF Record:
v=spf1 a include:spf.seznam.cz include:mailgun.org include:sparkpostmail.com ?all

⚡Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

20/100
Score

High-Risk Service Exposed: FTP

HIGH

Port 21 (FTP) is publicly accessible - FTP - Often unencrypted file transfer

Service Exposed: SSH

MEDIUM

Port 22 (SSH) is publicly accessible - SSH - Secure but can be brute-forced

đź”§Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

The website is built using a combination of Bootstrap 3.3.7 and jQuery 2.2.4, which are stable but somewhat dated technologies. It integrates Google Analytics, Google Tag Manager, Hotjar, and Google reCAPTCHA v3 for analytics, marketing, and security purposes. The site is mobile responsive with good SEO meta tags and Open Graph data for social sharing. Performance is moderate, with external resources loaded from reputable CDNs. Accessibility features are basic but could be improved. No CMS is explicitly detected, suggesting a custom or static site architecture. Hosting provider details are not discernible from the HTML content. The site uses a cookie consent banner with detailed user controls, indicating attention to privacy regulations. Overall, the technical infrastructure is solid for a small business website but could benefit from modernization and enhanced accessibility.
Analyze Another Website