Contextual Security

Solid Security begins with knowing. excels by doing.


request a free consultation

"Would a data breach be less costly than compliance?"

Complacency puts your company at risk and makes you personally vulnerable.

If 69% of data breaches are discovered by a third party,

then your leadership may be alerted before you. The Contextual Security methodology has been distilled into a “periodic chart” of services.

Comprehensive.

Comprehensive.

Carefully crafted elements interact to form tighter security bonds.
We understand the need to see the big picture and have a concise methodology so we created our own chart of periodic elements to outline our services.

More Information
Assess >

Assess >

Solid security begins with knowing. Contextual Security technicians explore existing infrastructure to assess your situation. This includes Penetration Testing, Data Discovery Scan, Firewall & Router Configuration Reviews and so much more.

More Information
Comply >>

Comply >>

Solid security excels by doing. Contextual Security was built by technology experts who specialize in compliance. Not compliance guys who attempt to harness technology. We walk you through a variety of compliance steps including PCI, E13PA, and HIPAA Risk Assessment and Compliance Audits.

More Information
Maintain >>>

Maintain >>>

Maintain. Contextual Security Solutions services programs can assist organizations in completing those periodic tasks that contribute to improving their security...

More Information
Contact Us

Contact Us

Get your hands on these gridded notepads today by simply filling out a Contact form and including your address in the message. We will be happy to send you a 3-pack upon receiving your request!

More Information
Make your Case.

Make your Case.

You understand the importance of security and compliance but your leadership may need to be convinced. Print or forward these documents to help illustrate.

More Information

Testimonials

These companies know first-hand the excellence of our work and the discretion of our technicians. Here’s what they had to say:

“As a government agency our resources to monitor data security are very limited. Rick had cost-effective solutions that scale well to our different divisions.”

“Credit card reader security was our primary concern. Contextual Security nailed it.”

“If one of the nation’s largest retailers can be susceptible to a data breach, I knew I had better harness our technology to make sure we were prepared.”

“Credit card reader security was our primary concern. Contextual Security nailed it.”

“If one of the nation’s largest retailers can be susceptible to a data breach, I knew I had better harness our technology to make sure we were prepared.”

“Our retail locations hire a variety of personalities so data security is very much on our radar.  Kevin was able to install tools that help me monitor what is going on at every location.”

“Credit card reader security was our primary concern. Contextual Security nailed it.”

  • Youth Villages
  • St. Jude
  • Sensus
  • Neovox
  • GE
  • CE Analytics
  • Amcon

Our Approach

Data security is a very private industry with high-stakes. Beyond ordinary skills assessments, our hiring standards require unparallelled moral and ethical foundations. Read more about our company culture and the chemistry among our people that makes Contextual Security unique.

Rick Merwin

Rick Merwin

Kevin Thomas

Kevin Thomas

Our Team

Our Team