Click here to schedule a quick customer discovery video with me.
Note: You must be an existing client of the email that was used when setting up your client portal. To set up a client portal, please click here
A military veteran-owned and operated business is dedicated to securing our nation in the field of Information Technology (IT). The business is led by a female from Generation X, who is a U.S. Navy disabled veteran and holds an Associates of Applied Science Extended degree in Information Technologies for Homeland Security. Her only daughter serves as her executive assistant. Their primary focus is on IT security.
Since May 2002, the business owner has been running a small business consulting firm. She consistently evaluates her business plans to adapt to the current market trends and address cyberthreats and attacks within the community.
Mrs. Stewart has gained extensive technical skills and experience, including expertise in core hardware requirements, installation, configuration, upgrading, diagnosing, troubleshooting, preventive maintenance, motherboard/processors/memory, basic and advanced networking, and security. Additionally, she possesses skills in Aesthetic Awareness, Effective Written and Oral Communication, Critical Thinking, Global Understanding and Responsibility, Information Literacy, Personal Development, Quantitative Literacy, Scientific Literacy, and Social Responsibility.
Her abilities include:
Hands-on experience with real CPUs, RAM, motherboards, power supplies, and other PC components
Installation, partitioning, and formatting of real hard drives
Installation, upgrading, and troubleshooting of various operating systems such as Windows (2000, XP, Vista, 7, 8.1, 10, and 11), Android, iOS, Blackberry, and different Linux distributions
PC troubleshooting and implementation of security measures
Physical installation of video and multimedia cards
Proficiency with portable PCs, PDAs, smartphones, and wireless technologies
Printer management and network/Internet connectivity
Knowledge of safety and environmental issues, excellent communication skills, and adherence to privacy policies
Ability to perform Penetration testing, ethical hacking, and Command Line Interface (CLI) coding
Creation and maintenance of secured websites (both back-end and front-end)