top of page
If you don't see your question here, reach out — I'd rather answer it directly.
FREQUENTLY ASKED QUESTIONS
Straight answers.
No runaround.
Absolutely. Every family has their unofficial "IT person" — and there's already so much on your plate. I genuinely enjoy working with people of all ages and technical backgrounds. Whether it's a parent struggling with passwords or a sibling whose laptop is a disaster — bring them in.
Send an email to contact@atw.one (mailto:contact@atw.one)with a few sentences about what's going on—that's genuinely all you need. I'll do my best to respond within one business day, and we'll find a short time to connect, usually 15–30 minutes by phone or video. From there, if we're a good fit, I'll put together a clear scope with deliverables, timeline, and pricing. No surprises.
Yes — the majority of my work is done remotely. I've supported distributed teams across 37+ countries and most security and IT consulting translates well to video calls, screen shares, and async communication. In-person work is available for clients in my area (travel fees may apply beyond a reasonable radius). If you're international, we'll work across time zones.
Every situation is different — a solo nonprofit founder needs something very different from a 20-person distributed team. I don't post rates because I don't want you to self-select out before we've had a real conversation. What I can tell you: I offer a free 30-minute consultation to understand your situation before any pricing discussion. Nonprofit organizations and early-stage small businesses can ask about reduced rates — I build those in when I can.
I accept the following:
• Credit Card (processing fee applies)
• ACH Wire Transfer
• Stripe
• PayPal
All transactions are processed through secure bookkeeping software.
I'm based in the Washington, D.C. area. For local clients, in-person work is available with no travel fee within a reasonable radius. Beyond that, travel fees apply and we'll discuss that upfront. For most engagements, remote support works just as well — sometimes better, since your team is already distributed anyway.
I hold a Master's degree in Cybersecurity alongside PMP (Project Management Professional), Scrum Master, and AKYLADE Cyber Resilience Specialist certifications. Before running ATG, I spent years in operational security for investigative journalism — protecting sources, sensitive data, and globally distributed teams on high-stakes investigations. I work within NIST RMF and CSF 2.0 frameworks and bring that structure to organizations of all sizes.
My honest answer: most breaches don't happen to enterprises. They happen to small organizations and individuals who assumed they weren't a target. A stolen password, an unencrypted laptop, a phishing email—these are the actual threat vectors for nonprofits, small businesses, and families. You don't need a 100-page security policy. You need the right 5 things done well. That's what I help you figure out.
P.s
It's not literally only 5 right things. 😅
An email costs nothing and gets you a clear picture of where you stand.
Don't see your
question?
ATG · Atlas Gradarius · Step by step. Layer by layer. Built to fit.
bottom of page