Castellan Information Security Services Inc

Blog

Contracting IT Security Resources from Suppliers who are Experts in Security

During an organization's journey to build and maintain a modern IT Security Program, they may require the services of outside professional resources to augment their IT and IT Security Teams.

GRC-P Security Services - Governance, Risk, Compliance and Preparedness

Our mission at Castellan Information Security Services is to be a trusted partner for our clients to protect one of their most valuable assets - their information.

Vulnerability Scanning Service - An Effective Tool for an Organization's Cyber Security Program

Castellan Information Security Services (Castellan) clients have learned that using our monthly vulnerability scanning service can be a critical key part of a comprehensive cyber security program. Are you interested in learning how?

Cyber Security Performance Management - "Managing your Program Like it's a Priority"

While Cyber Security Programs have become a critical part of most organization's risk management framework, work is still required for executive teams to manage these programs similarly as other organizational priorities.

Cyber Security Requirements for Suppliers - Are You Ready for What's Coming?

At Castellan Information Security Services, we see a considerable increase in cyber attacks on supply chains and inevitably an increased number of inquiries for information security services from companies that are part of this highly integrated landscape

Business Continuity - What is it and Why is it Critical

Everyday, businesses, communities, organizations, and governments are at risk of hazards threatening their operations.

Information Security - An Important Priority for Non-Profits

This article will discuss how information security impacts non-profit organizations and what can they do to ensure they are appropriately protected from the threats and potential damaging impacts of a data breach.

How Physical Security Impacts Information Security

One area that is linked to your information security maturity that is often be overlooked is how your physical security plans align with your data protection needs.

Management's Role to Promote Information Security

You can't only assign this responsibility to your IT staff or assume that because your data is stored in the cloud there is nothing left to do.

Information Security - Understanding the Basics: "Ransomware"

One of the most common, most publicized, and most dangerous types of attacks that both public and private organizations face today...Ransomware.

Information Security - Understanding the Basics: "Phishing"

Phishing is a type of social engineering attack that attempts to steal your information by getting you or staff members to reveal confidential corporate information.

Mobile Storage Devices: 5 Considerations to Help Manage an Often-Missed Security Risk

While these devices can help your operations and administration, organizations should review their usage to ensure they are not presenting unnecessary risks to confidential and sensitive data.

Information Security Requires an Integrated Approach

Cyber attacks such as ransomware, phishing, and man-in-the-middle active eavesdropping are occurring with increasing frequency, breaching confidential information and resulting in significant loss for both private and public organizations.

10 Questions to Help Assess if you are Ready For a Data Breach

Are you ready to effectively manage a cyber-attack or other incident that breaches your organization's sensitive or confidential information?

Storing your Data in the Cloud - Just the Start of an Information Security Program

As a leading information security firm, one of the most common statements we hear from existing or potential clients is... "we store our data in the cloud, therefore, we don't need to do anything else to secure our information."

Policies and Procedures

The Backbone of your Information Security Program

   
Castellan Information Security Services Inc
  • Home
  • |
  • About
    • Corporate Values and Ethics
    • Integrated Approach
    • Our Team
  • |
  • GRCP Services
    • Governance
      • Information Security Policy and Process Development
    • Risk
      • Risk Assessments
      • Adversary Simulation
      • Penetration Testing
      • Source Code Review
      • Vulnerability Assessments
      • PCI - DSS Assessment
    • Compliance
      • Audits
      • CP-CSC
    • Preparedness
      • Security Program and Roadmap Development
      • Business Continuity
      • Disaster Recovery
  • |
  • Staff Augmentation Services
  • |
  • Careers
  • |
  • News
    • Blog
  • |
  • Contact
Castellan Information Security Services Inc

Contact Us

Suite 325, 210-1600 Kenaston Blvd.
Winnipeg, Manitoba, Canada, R3P 0Y4
x 204-202-5050     A info@castellaninformationsecurity.com

Cybersecure Canada Certified

* ) (

Copyright © 2025 Castellan Information Security Services Inc. All Rights Reserved.