Practical IT consulting and cybersecurity for nonprofits, small
businesses and individuals who need real protection — not
enterprise bloat they'll never use.
IT Consulting & Cybersecurity · atw.one
Security that fits
how you actually
work.
ATG · gra·DAR·ee·us · Step by step. Layer by layer · Built to fit
TRUSTED BY
Investigative journalism organizations
Individuals & families
Mission-driven nonprofits
Freelancers & consultants
Small Businesses
Distributed remote teams
Gradarius is Latin for "one who proceeds step by
step." That's not just my company's name; it's the way I work. Every engagement starts with
understanding your reality before we touch
anything.
Right-sized protection means your team actually
uses the systems we build. That's the only
measure of success I care about.
MY APPROACH
No rushed
No skipped steps.
deployments.
01 • Assess
Understand your actual risk
Not a checklist. A real conversation about what you protect and where you're exposed.
02 • Design
Build a plan that fits
Right-sized for your team, budget, and technical comfort level.
Methodical deployment with your team trained at every step.
Layer by layer, no shortcuts
03 • Implement
Methodical deployment with detailed documentation and understanding.
Systems your team actually uses
04 • Sustain
WHAT I DO
IT & Security across
every layer
of your
operation
From a one-person shop to a globally distributed team, we cover the full stack — security, IT infrastructure, training, and the project management to make it stick.
Every engagement is different. Some clients need a one-time assessment to understand where they stand. Others need an ongoing partner who picks up the phone when something breaks, helps onboard new staff, or thinks through a technology decision before it becomes an expensive mistake.
I work both ways and everything in between. There's no minimum project size and no situation too small. If something feels off about your technology setup, that instinct is usually right. Let's figure out what's actually going on before it becomes a bigger problem.
What stays the same regardless: you work directly with me every time. No hand-offs, no surprises.
Cybersecurity & Risk Assessment
Security audits that prioritize real
risks. MFA, password systems,
encryption, and training that
changes behavior.
IT Consulting & Project Management
Strategic IT planning, technology migrations, managed services for distributed teams. PMP & Scrum-certified.
Business Communications Setup
Google Workspace, email security hardening (SPF, DKIM, DMARC), collaboration infrastructure.
Software Security & Stack Review
Identify shadow IT, evaluate SaaS risk, and build policies aligned with NIST CSF 2.0.
Device Management & Protection
MDM for distributed workforces, centralized endpoint security, secure device lifecycle management.
Workshops & Security Training
Custom cybersecurity workshops for non-technical teams. Remote worker and home office security. AI policy and framework implementation that meets you where you are.
EDUCATION
Master's in Cybersecurity
Risk management, threat modeling, security architecture.
•
SERVICES AVAILABLE IN ENGLISH & SPANISH
I'm Ash — I run ATG. I've spent my career protecting organizations where getting security wrong has real consequences: investigative journalists protecting sources, nonprofits holding sensitive community data.
ABOUT ASH
Nearly a decade
protecting
mission-driven
organizations.
Most consultants sell you their overpriced products.
"Step by step. Layer by layer. Built to fit."
CERTIFICATION
PMP · Project Management Professional
Mission-critical deployments on time, on budget.
CERTIFICATION
Scrum Master Certified
Agile execution for fast-moving teams.
AKYLADE Cyber Resilience Specialist
CERTIFICATION
Incident response readiness, business continuity, and organizational resilience — aligned with NIST CSF 2.0 and RMF frameworks.
I assess your
situation and tell you what you actually
need.
WHAT CLIENTS SAY
Built on
measured by results.
trust,
We look at our organization in two ways: the organization before Ash and the organization after Ash. We finally have systems that speak to one another and structure and security where we needed it most. We no longer use our personal Gmail accounts to conduct our work!
Nonprofit organization
EXECUTIVE DIRECTOR
Technology and I don't get along — but Ash changed that. He walked me through cleaning and updating my device, set up a password manager, and made security feel approachable instead of overwhelming. Couldn't be happier with the service.
Client
Individual
Ash combines deep expertise in cross-border digital security, infrastructure, and technical training with a rare ability to make it all accessible and engaging. An invaluable thought partner on complex journalism projects and a project manager who won’t let anything fall through the cracks.
MANAGING EDITOR
Nonprofit organization