Helping you build a defense around the people, data, and devices that matter most

  • Products

    Are you worried you need to improve your cyber security strategy but are not certain how to begin? Our products are designed to get you started on the right path. Cyber security requires a wide, adaptable approach as the attack vectors and tactics keep changing. Our products will help you stay informed and one step ahead.

  • Services

    Do you feel comfortable with your current level of security? Are you stressed and stretched thin with your time? Don’t worry, our services are neatly packaged to save you time while we handle your cyber security. Let us help protect your bottom line while adding value to your strategy for the future. Set up an appointment today!

  • Training

    We understand how important growth and performance are to your business. Are your employees aware of how to avoid cyber attacks? Are your leaders deploying the right tools? Workshops, speaking at events, and custom presentations can help educate and inspire your team to squash cyber threats.

IMG_20210820_153802.jpg

Patrick Falls

WHO-AM-I:

I am a life long learner focused on becoming the best cyber security expert to help businesses and individuals protect themselves from threats while using the internet.

Master’s of Science Cyber Security

Valparaiso University

Bachelor’s of Science Life Sciences Communication Technology Track

University of Wisconsin-Madison

I have had the opportunity to explore projects in many industries including research, construction, and healthcare while filling various roles. I love to stay active and be outdoors. Feel free to email me directly for any career questions, interviews, or questions about starting your path in IT at patrick@bastion.industries.

Why Should You Care About Cyber Security?

The global pandemic sent the world scrambling to access resources like office duties, food delivery, and even healthcare visits through remote options. While the online environment offers a great opportunity to connect all aspects of life, there are trade offs. Keeping our devices, accounts, and information secure while using the internet should be our number one priority. Security is often expensive, takes time, and adds distraction. Let us handle that while you focus on what turns the wheels of your organization.


  • Harm

    - While many are quick to blame the hooded hacker in the basement, our biggest threat is human error when using computers and the internet to accomplish tasks

    - Natural disasters, espionage, hacking, ransomware, and data breaches are all concerns that must be addressed to achieve a high level of security

  • Critical Infrastructure

    - Whether we consider it at a national level or at the level of your organization, we want things to be available when we need them most

    - Cyber security is rooted in protecting the numerous connections, data, and devices we use each day

  • Downtime

    - Organizational downtime averages can exceed 16 days, losing precious operating time

    - Businesses and individuals are not prepared to deal with a data breach and could be forced to shut down permanently

Imagine this blank house is a brand new business, device, or software. There are no entry or exit points, therefore we can consider anything within the house to be secure.

Imagine this blank house is a brand new business, device, or software. There are no entry or exit points, therefore we can consider anything within the house to be secure.

Imagine this upgraded house as a business, device, or software with many features, people, or internet connection. There are many entry points that can be used for attackers to gain access to data within. Aside from attackers, we must be concerned w…

Imagine this upgraded house as a business, device, or software with many features, people, or internet connection. There are many entry points that can be used for attackers to gain access to data within. Aside from attackers, we must be concerned with all the complex systems that keep the house operating.

Is your cyber defense strategy sufficient?

Cyber Security Cost & Pricing Guide

Cyber Security for Organizations

Are you curious about the truth related to cyber security costs and pricing for your business? It can be alarming when hackers, ransomware attacks, and risks to normal operation are covered in the media. The marketplace is saturated with next generation security solutions preying on businesses, creating a sense of urgency and taking advantage of the lack of education for cyber security.

Your security solutions may be great and include key features like intrusion detection systems or centralized log analysis. However, many poor security options have flashy banners creating a false sense of security alerting the user of the thousands of threats stopped today across their system. These solutions often track a wide range of traffic and group legitimate threats in with non-malicious items, making their value confusing. These failed security solutions may lead to owners questioning security experts when data breaches still occur. In reality, some security solutions give you a pile of metrics to track without ever increasing the level of security at your organization. Can your team recognize threats?

As if purchasing the proper solutions was not challenging enough, cost increases as information systems become more complicated. Predatory pricing models demand per month, per user payment to help harden accounts and devices. Any solution that promises a quick, plug and play option should be avoided. Technology moves at lightning speed and attackers find gaps in static type solutions that promise a quick fix to security at the enterprise level. Security teams must implement proper security controls like utilizing the rules of least privilege, conducting security assessments, and even evaluating through rigorous penetration testing.

When your enterprise subscribes to using many third party options to meet specific operating tasks, you open yourself up to cyber risk. Security teams must ensure that vendor solutions are consistently upgraded to the latest security patches.

So, what’s the secret to finding great security solutions at a decent price? Well, there is no exact answer. Each organization has different demands related to data compliance and information systems preference. There is no one size fit all solution and security is a slow process that evolves over time. It is hard to see the return on investment as an owner when you are on the defensive but be assured a good security team will deny many attacks while improving recovery speed with good remediation tools.

As an operator, conduct a deep analysis of your organization’s needs and the security solutions currently available. Invest in your security team’s expertise and continue to offer exposure to education resources. At Bastion Industries, we can help assess your current approach and provide the guidance necessary to improve the level of security in your organization. Please explore our approach and review the performance of your current security solutions.

Our System Based Approach

Our approach at Bastion Industries is focused on building trust with customers and providing the learning materials they need to be confident in their purchase. 

  •  We focus on the root causes for cyber risk (like misconfigurations and behavior)

  • We are constantly building our strategies to extend past current security solutions

  • We aim to mitigate creep and risk through the whole information system

Explore our tailored resources that will help you get started with your security approach today.

Cyber Security for Individuals

Great cyber security behavior starts with investing your time into learning about the latest security strategies. Practice multifactor authentication (MFA) with your devices and accounts. Be careful when considering new endpoint security solutions and the access that you grant these programs on your devices. Many applications and web services we use today have security measures as standard that can help protect your individual internet use. 

For students, ensure that you check your universities for resources related to learning opportunities. There may be discounted student versions of security solutions available that you can use in courses or when exploring modern technologies. If you are interested in learning the basics of cybersecurity or are ready for the advanced practitioner level, check out our training packages.