top of page
GREEN TOPOLOGY.png

Practical IT consulting and cybersecurity for nonprofits, small

businesses and individuals who need real protection — not

enterprise bloat they'll never use.

IT Consulting & Cybersecurity · atw.one 

Security that fits

how you actually

work.

ATG · gra·DAR·ee·us · Step by step. Layer by layer · Built to fit
TRUSTED BY

Investigative journalism organizations

Individuals & families

Mission-driven nonprofits

Freelancers & consultants

Small Businesses

Distributed remote teams

Gradarius is Latin for "one who proceeds step by

step." That's not just my company's name; it's the way I work. Every engagement starts with

understanding your reality before we touch

anything.

Right-sized protection means your team actually

uses the systems we build. That's the only

measure of success I care about.

MY APPROACH

No rushed

No skipped steps.

deployments.

01 • Assess

Understand your actual risk 

Not a checklist. A real conversation about what you protect and where you're exposed.

02 • Design

Build a plan that fits

Right-sized for your team, budget, and technical comfort level.

Methodical deployment with your team trained at every step.

Layer by layer, no shortcuts 

03 • Implement

Methodical deployment with detailed documentation and understanding.

Systems your team actually uses

04 • Sustain
WHAT I DO

IT & Security across

every layer

of your 

operation

From a one-person shop to a globally distributed team, we cover the full stack — security, IT infrastructure, training, and the project management to make it stick.

Every engagement is different. Some clients need a one-time assessment to understand where they stand. Others need an ongoing partner who picks up the phone when something breaks, helps onboard new staff, or thinks through a technology decision before it becomes an expensive mistake.

I work both ways  and everything in between. There's no minimum project size and no situation too small. If something feels off about your technology setup, that instinct is usually right. Let's figure out what's actually going on before it becomes a bigger problem.

What stays the same regardless: you work directly with me every time. No hand-offs, no surprises.

Cybersecurity & Risk Assessment

Security audits that prioritize real

risks. MFA, password systems,

encryption, and training that

changes behavior.

IT Consulting & Project Management

Strategic IT planning, technology migrations, managed services for distributed teams. PMP & Scrum-certified.

Business Communications Setup

Google Workspace, email security hardening (SPF, DKIM, DMARC), collaboration infrastructure.

Software  Security & Stack Review

Identify shadow IT, evaluate SaaS risk, and build policies aligned with NIST CSF 2.0.

Device Management & Protection

MDM for distributed workforces, centralized endpoint security, secure device lifecycle management.

Workshops & Security Training

Custom cybersecurity workshops for non-technical teams. Remote worker and home office security. AI policy and framework implementation that meets you where you are.

EDUCATION

Master's in Cybersecurity

Risk management, threat modeling, security architecture.

SERVICES AVAILABLE IN ENGLISH & SPANISH

I'm Ash — I run ATG. I've spent my career protecting organizations where getting security wrong has real consequences: investigative journalists protecting sources, nonprofits holding sensitive community data.

ABOUT ASH

Nearly a decade

protecting

mission-driven

organizations.

Most consultants sell you their overpriced products. 

"Step by step. Layer by layer. Built to fit."

CERTIFICATION

PMP · Project Management Professional

Mission-critical deployments on time, on budget.

CERTIFICATION

Scrum Master Certified

Agile execution for fast-moving teams.

AKYLADE Cyber Resilience Specialist

CERTIFICATION

Incident response readiness, business continuity, and organizational resilience — aligned with NIST CSF 2.0 and RMF frameworks.

I assess your 
situation and tell you what you actually 
need.
WHAT CLIENTS SAY

Built on

measured by results.

trust,

We look at our organization in two ways: the organization before Ash and the organization after Ash. We finally have systems that speak to one another and structure and security where we needed it most. We no longer use our personal Gmail accounts to conduct our work!

Nonprofit organization

EXECUTIVE DIRECTOR

Technology and I don't get along — but Ash changed that. He walked me through cleaning and updating my device, set up a password manager, and made security feel approachable instead of overwhelming. Couldn't be happier with the service.

Client

Individual 

Ash combines deep expertise in cross-border digital security, infrastructure, and technical training with a rare ability to make it all accessible and engaging. An invaluable thought partner on complex journalism projects and a project manager who won’t let anything fall through the cracks.

MANAGING EDITOR

Nonprofit organization

Start with a real email. No sales pitch — just an honest conversation about where you stand.

Ready to get

the fundamentals right?

ATG · Atlas Gradarius · Step by step. Layer by layer. Built to fit.
bottom of page