At MySecurity Scores, we believe that strong cybersecurity starts with open communication. Whether you have a question about our educational content, need guidance on implementing security frameworks, or want to explore partnership opportunities, our team is committed to providing you with timely, thoughtful, and expert responses. We understand that cybersecurity concerns do not follow a nine-to-five schedule, which is why we have built a contact infrastructure designed to connect you with the right people as quickly as possible.

Our support team consists of experienced cybersecurity professionals who bring years of expertise in enterprise security assessments, regulatory compliance, threat intelligence analysis, and incident response planning. When you reach out to us, you are not getting a generic customer service agent reading from a script. You are connecting with professionals who understand the urgency and complexity of modern cybersecurity challenges, and who can provide actionable guidance tailored to your specific situation.

We typically respond to all inquiries within 24 to 48 hours during business days. Security-related concerns, including vulnerability reports, are triaged immediately and handled with the highest priority. For partnership and consulting inquiries, please allow 3 to 5 business days as these requests often require review from multiple team members to provide you with the most comprehensive response possible.

How to Reach Us

We have organized our contact channels to ensure that your inquiry reaches the right team as efficiently as possible. Below are the four primary ways to get in touch with MySecurity Scores, each tailored to a specific type of request. Choosing the correct channel helps us route your message to the most qualified team member and significantly reduces response time.

General Support

For questions about our educational content, website functionality, account issues, or general cybersecurity inquiries, reach out to our primary support channel at support@mysecurityscores.com. Our support team handles everything from content clarification requests and guide recommendations to technical issues with our assessment tools. This is the best channel for most users, and we aim to respond to all general support emails within 24 hours on business days. Please include as much detail as possible about your question so we can provide a thorough response on the first reply.

Security Consulting

If your organization needs personalized security assessment guidance, compliance consultation, or risk management strategy development, our consulting team is available at consulting@mysecurityscores.com. We offer tailored advisory services for businesses of all sizes, from startups building their first security program to enterprises refining their existing frameworks. When reaching out about consulting, please include a brief description of your organization, the specific challenges you are facing, and your preferred timeline for engagement. This helps us prepare a relevant proposal and match you with the right consultant.

Partnership Inquiries

We actively seek collaborations with cybersecurity vendors, educational institutions, industry organizations, and content creators who share our mission of making cybersecurity education accessible. For partnership proposals, co-marketing opportunities, content syndication requests, or integration discussions, contact us at partnerships@mysecurityscores.com. We evaluate every partnership opportunity carefully to ensure alignment with our values and audience. Please include your organization name, a description of the proposed partnership, and expected mutual benefits. Our partnerships team reviews all proposals within 3 to 5 business days.

Media & Press

Journalists, bloggers, podcasters, and media professionals can reach our communications team at media@mysecurityscores.com. We welcome interview requests, expert commentary for cybersecurity articles, data citation permissions, and speaking engagement opportunities. Our team members are available to provide expert analysis on emerging cyber threats, data breach trends, compliance developments, and security best practices. For time-sensitive media requests, please include your deadline in the subject line, and we will do our best to accommodate your timeline.

Send Us a Message

Use the form below to send your inquiry directly to the appropriate team. Select the subject category that best matches your request, and provide as much context as possible so we can deliver a thorough and helpful response. All form submissions are encrypted in transit and handled in accordance with our Privacy Policy. We do not share your contact information with third parties, and your data is used exclusively to respond to your inquiry.

When to Contact Us

We receive a wide range of inquiries from cybersecurity professionals, business owners, IT administrators, students, and curious individuals who want to learn more about protecting their digital assets. To help you understand whether reaching out is the right step, here is a detailed overview of the types of inquiries we handle and how we can assist with each one.

Security Assessment Questions

If you have used one of our assessment tools or read through our security scoring methodology and have questions about your results, our team can help you interpret findings, understand risk ratings, and prioritize remediation efforts. We frequently assist organizations that have completed an initial assessment and need guidance on which vulnerabilities to address first, how to allocate security budgets effectively, and what benchmarks to measure progress against. Whether your score surprised you or confirmed your suspicions, we can provide the context you need to move forward with confidence.

Compliance Guidance

Navigating the complex landscape of regulatory compliance can be overwhelming, especially for organizations that must adhere to multiple frameworks simultaneously. Our team can provide guidance on understanding requirements for SOC 2, ISO 27001, GDPR, HIPAA, PCI DSS, and other major compliance standards. We help clarify which frameworks apply to your specific industry and geography, what controls you need to implement, and how to prepare for formal audits. While we do not perform certification audits ourselves, we can point you toward the right resources and help you build a roadmap for achieving and maintaining compliance.

Content Suggestions and Corrections

Our educational content is the backbone of MySecurity Scores, and we take accuracy and relevance extremely seriously. If you spot an error in one of our guides, notice outdated information that needs updating, or have a topic suggestion that you believe would benefit our community, we want to hear from you. Our editorial team reviews all content suggestions and corrections promptly. Many of our most popular guides were inspired by reader requests, so do not hesitate to share your ideas. We also welcome guest contributions from qualified cybersecurity professionals who want to share their expertise with our audience.

Vulnerability Reporting

If you have discovered a security vulnerability in our platform, website, or any of our tools, we strongly encourage you to report it through our responsible disclosure process outlined in detail below. Security researchers play a vital role in keeping the internet safe, and we treat every vulnerability report with the seriousness and urgency it deserves. Our security team reviews all reports within 24 hours and will work with you to understand, reproduce, and remediate the issue as quickly as possible.

General Cybersecurity Inquiries

Sometimes you just need a knowledgeable person to point you in the right direction. Whether you are a small business owner wondering where to start with cybersecurity, a student researching topics for a thesis, or an IT professional looking for a second opinion on a security architecture decision, we are happy to help. While we cannot provide exhaustive consulting services through our free support channel, we can offer general guidance, recommend relevant resources from our library, and connect you with specialized services when your needs go beyond what our educational platform covers.

Response Time Expectations

We understand that when you take the time to contact us, you expect a prompt and meaningful response. Transparency is one of our core values, so here is exactly what you can expect after submitting an inquiry through any of our channels.

General Inquiries (24 to 48 hours): Most support requests, content questions, and general cybersecurity inquiries receive a response within one to two business days. During periods of high volume, response times may extend slightly, but we always aim to acknowledge receipt of your message within 24 hours even if a complete answer requires additional time. If your question is complex and requires research or consultation with a specialist, we will let you know the expected timeline for a comprehensive response.

Security Concerns (Priority Handling): Any inquiry related to a security vulnerability, active threat, or urgent security matter is automatically escalated to our security team. These reports are triaged within hours, not days. If you are reporting a vulnerability in our platform, you can expect an initial acknowledgment within 12 hours and a substantive response regarding the status of your report within 48 hours. For reports involving active exploitation or critical severity issues, our team is available around the clock.

Partnership and Consulting (3 to 5 Business Days): Partnership proposals and consulting requests undergo a more thorough review process because they often involve multiple stakeholders on our end. After receiving your inquiry, our business development team will evaluate the opportunity, discuss it internally, and prepare a tailored response. We aim to provide an initial reply within three to five business days, though more complex proposals may require additional time. If we need more information from you to evaluate your request, we will reach out promptly to keep the process moving.

Media Requests (24 Hours): We understand that journalists and content creators often work on tight deadlines. Our media team prioritizes press inquiries and aims to respond within 24 hours. If you have a time-sensitive request, please mention your deadline in the subject line of your email, and we will make every effort to provide commentary or data within your required timeframe.

Important Note About Response Times

Response times listed above reflect business days (Monday through Friday, excluding major holidays). Messages received over weekends or holidays will be processed on the next business day. If your matter is genuinely urgent and involves an active security threat, please indicate this clearly in your subject line, and our on-call team will review it outside normal business hours.

Responsible Vulnerability Disclosure

At MySecurity Scores, we take the security of our own platform just as seriously as we take educating others about security. We recognize that independent security researchers are essential partners in identifying vulnerabilities that automated systems might miss, and we are committed to working collaboratively with the security community to keep our platform and our users safe.

If you have discovered a potential security vulnerability in any MySecurity Scores property, including our website, assessment tools, APIs, or infrastructure, we ask that you follow our responsible disclosure process. This ensures that issues are addressed before they can be exploited, protecting both our users and the broader community.

How to Report a Vulnerability

  1. Document the Issue: Before contacting us, please gather as much information as possible about the vulnerability. Include the affected URL or endpoint, a step-by-step description of how to reproduce the issue, the potential impact of the vulnerability, and any proof-of-concept code or screenshots that demonstrate the problem. The more detail you provide, the faster our security team can triage and address the issue.
  2. Send Your Report: Email your findings to security@mysecurityscores.com with the subject line formatted as "Vulnerability Report: [Brief Description]". If you wish to encrypt your communication, our PGP public key is available on our security page. We accept reports in any reasonable format, but structured reports using a template like the one suggested by OWASP are especially helpful.
  3. Allow Time for Remediation: After we acknowledge your report, please give our team a reasonable window to investigate and remediate the vulnerability before disclosing it publicly. We typically request a minimum of 90 days for critical issues and 30 days for lower-severity findings. We will keep you informed of our progress throughout this period.
  4. Coordinate Disclosure: Once the vulnerability has been patched and deployed, we will coordinate with you on any public disclosure. We believe in transparency and are happy to credit researchers who help us improve our security, unless you prefer to remain anonymous.

What We Ask of Researchers

Our Commitment to Researchers

We pledge to acknowledge your report within 12 hours, provide regular status updates as we work on remediation, not pursue legal action against researchers who act in good faith and comply with this policy, credit you publicly in our security acknowledgments page (if desired), and treat your report with the confidentiality and seriousness it deserves. We value the contributions of the security research community and view vulnerability reports as an essential component of our overall security posture.

Frequently Asked Questions

Before reaching out, you may find the answer to your question below. We have compiled responses to the most common inquiries we receive. If your specific question is not addressed here, please do not hesitate to use the contact form above or email us directly.

Yes, all of our educational content, guides, tutorials, and assessment tools are completely free to access. We believe that cybersecurity knowledge should be available to everyone, regardless of budget. Our platform is supported through advertising and optional consulting services. You will never encounter a paywall when trying to access our security guides, compliance documentation, or threat intelligence resources. Our mission is to democratize cybersecurity education, and that starts with removing financial barriers to access.

We collect only the minimum data necessary to operate our platform effectively and improve your experience. This includes standard web analytics data such as page views, session duration, and general geographic region (through Google Analytics), as well as any information you voluntarily provide through our contact forms. We do not sell your personal data to third parties, and we do not use tracking technologies to build advertising profiles. For a complete breakdown of our data collection and handling practices, please review our Privacy Policy, which is written in plain language for easy understanding.

Our editorial team reviews and updates content on a continuous basis. Major guides and frameworks are comprehensively updated at least quarterly to reflect changes in the threat landscape, new compliance requirements, and evolving best practices. When significant cybersecurity events occur, such as the disclosure of a major vulnerability or a change in regulatory requirements, we publish updates within days. Each article displays a "last updated" date so you can assess the currency of the information. We also have an active content review pipeline that systematically rotates through our entire library to ensure nothing becomes stale.

Absolutely. We welcome contributions from qualified cybersecurity professionals, researchers, and educators. If you have expertise in a topic that aligns with our content areas and would like to contribute a guest article, case study, or tutorial, please send a brief proposal to content@mysecurityscores.com that includes your topic idea, a rough outline, your relevant credentials or experience, and a writing sample if available. Our editorial team reviews all submissions for accuracy, relevance, and quality before publication. Accepted contributors receive full credit and a link to their professional profile or website.

Yes, in addition to our free educational resources, we offer professional consulting services for organizations that need hands-on guidance. Our consulting engagements cover security program development, compliance readiness assessments, risk management strategy, security architecture review, and incident response planning. Each engagement is tailored to the client's specific needs, industry, and maturity level. Consulting services are provided on a project basis or through ongoing advisory retainers. Contact our consulting team at consulting@mysecurityscores.com for availability and pricing information.

Our security assessments are designed to provide a reliable, high-level overview of an organization's security posture based on publicly observable data and industry-standard evaluation criteria. While no automated assessment can replace a comprehensive manual penetration test or a full security audit, our tools are built on methodologies aligned with frameworks like NIST, OWASP, and CIS Controls. We continuously refine our scoring algorithms based on the latest threat intelligence and feedback from security professionals. For the most accurate results, we recommend using our assessments as a starting point and complementing them with professional security reviews for critical systems.

No, absolutely not. We have a strict policy against selling, renting, or trading user data with third parties for marketing or any other purpose. Your personal information, including any data submitted through our contact forms, assessment tools, or newsletter subscriptions, is used exclusively to provide you with the services you requested and to improve our platform. We use industry-standard encryption for data in transit and at rest, and we follow data minimization principles to ensure we only retain what is necessary. Our complete data handling practices are documented in our Privacy Policy.

We love hearing from our community about what topics matter most to them. You can suggest a new topic or guide through several channels: use the contact form on this page with "Feedback" selected as the subject, email us directly at support@mysecurityscores.com with "Topic Suggestion" in the subject line, or leave a comment on any of our existing guides with your idea. We track all suggestions and prioritize new content based on community demand, relevance to current threats, and our team's expertise. If your suggestion is selected for development, we will credit you in the published article and notify you when it goes live.

If you encounter information on our site that appears outdated, inaccurate, or misleading, we genuinely appreciate you bringing it to our attention. The cybersecurity landscape evolves rapidly, and despite our best efforts to keep everything current, occasional gaps can occur. Please use the contact form above or email support@mysecurityscores.com with the subject line "Content Correction" and include the URL of the page in question, a description of what appears incorrect, and if possible, a reference to the correct or updated information. Our editorial team treats content corrections as high-priority items and typically publishes updates within two to three business days of verification.

Yes, for organizations that want to use MySecurity Scores content in corporate training programs, internal knowledge bases, or educational curricula, we offer enterprise licensing arrangements. This includes permission to reproduce, adapt, and distribute our content within your organization, with optional customization to reflect your company's specific policies and infrastructure. Enterprise licenses also include priority support and early access to new content. Contact our partnerships team at partnerships@mysecurityscores.com with details about your intended use case, estimated number of users, and any specific content areas you are interested in.

Our Office and Support Hours

MySecurity Scores operates as a distributed team with members across multiple time zones, which allows us to provide broader coverage than a single-location operation. Our primary support and operational hours are as follows.

Standard Support Hours: Monday through Friday, 9:00 AM to 6:00 PM Eastern Time (ET / UTC-5). During these hours, all support channels are fully staffed, and response times are at their fastest. Most inquiries submitted during standard hours receive a response the same business day.

Extended Coverage: Our team members in other time zones often handle inquiries outside of standard Eastern Time hours. While we do not guarantee same-day responses for messages received outside standard hours, many inquiries are addressed during our extended coverage window of 7:00 AM to 10:00 PM ET on weekdays.

Weekend and Holiday Coverage: Our support channels are monitored on a limited basis during weekends and major holidays. Non-urgent inquiries received during these periods will be addressed on the next business day. Security vulnerability reports and urgent security matters are monitored continuously, including weekends and holidays, through our on-call rotation.

Scheduled Maintenance: Occasionally, we perform scheduled maintenance on our platform, typically during low-traffic hours (Saturday or Sunday, 2:00 AM to 6:00 AM ET). During maintenance windows, our assessment tools and some interactive features may be temporarily unavailable, but all educational content remains accessible. We announce planned maintenance at least 48 hours in advance through our status page and social media channels.

Holiday Schedule

Our office observes major United States holidays, including New Year's Day, Memorial Day, Independence Day, Labor Day, Thanksgiving, and Christmas. Support tickets submitted on holidays will be processed on the next business day. For a current list of upcoming holiday closures, check our status page.

Community and Social

Staying connected with MySecurity Scores goes beyond our contact form and email channels. We maintain an active presence across several platforms where we share cybersecurity insights, platform updates, new guide announcements, and real-time commentary on emerging threats. Following us on social media is the fastest way to stay informed about new content, security advisories, and community events.

You can find us on major social media platforms where we share daily cybersecurity tips, breaking security news analysis, new guide announcements, community polls, and discussions about current threats and best practices. Our social channels are also a great way to ask quick questions, share feedback, and connect with other security-minded professionals in our growing community.

We also publish a monthly newsletter that curates the best of our new content, highlights industry developments, and provides exclusive insights from our consulting team. The newsletter is free, contains no spam, and includes an easy unsubscribe option in every issue. You can sign up through the subscription form on our homepage.

For organizations and individuals who want to engage more deeply with our platform, we host periodic webinars and virtual events on topics ranging from compliance deep-dives to threat landscape briefings. These events are free to attend and often include Q&A sessions with our cybersecurity experts. Announcements for upcoming events are posted on our social media channels and included in our newsletter.

Ready to Strengthen Your Security Posture?

Whether you need answers, guidance, or expert consultation, our team is here to support your cybersecurity journey. Do not hesitate to reach out.

Explore Our Security Guides