Bridging Technology & People
I design secure, pragmatic IT architectures and make complex topics understandable. Degree in IT Management & Education with hands-on experience in schools and enterprises.
Owner of SuDo IT-Solutions (since March 2023). One year as IT Architect in Switzerland, ~5 years as IT Consultant in a grammar school, and 4 years of commercial experience.
Services
Value-driven. Transparent. Actionable.IT Strategy & Architecture
Target picture, reference architectures, and roadmaps that balance COST, SECURITY, and ADAPTABILITY. ISO 9001COBIT 2019DIN 69901
Cloud & Modern Workplace
Migrations, governance, and enablement — AZURE M365 ENDPOINT. ISO/IEC 27017
Security & Compliance
Risk reduction, standard alignment, and awareness — MFA HARDENING BASELINES. ISO/IEC 27001NIST CSFBSI GRUNDSCHUTZGDPR/DSGVO
Process & Automation
Lean processes & scripting — POWERSHELL BASH. ITIL 4ISO/IEC 20000-1
IT Administration & Consulting
Servers, networks, virtualization, endpoints — OPS SLA. ISO/IEC 27001ISO/IEC 27002
Network Administration
LAN, WLAN, VPN, firewalls — DESIGN OPERATIONS.
Scripting & Automation
Custom tooling to reduce toil — CI ROUTINES.
Hosting & Migration
Application & data hosting — TENANTS SERVERS.
Microsoft 365 & Google Workspace
Administration, governance, enablement — POLICIES TRAINING.
Monitoring & Proactive Care
RMM, patching, health checks — STABLE OPS ISO/IEC 20000
Backup & Disaster Recovery
Protect data & recover fast — DR POLICIES. ISO 22301
Unified Communications
VoIP & collaboration — POLY UNIFY.
Hardware & Device Lifecycle (BTO)
Procurement, imaging, deployment — BTO LIFECYCLE.
Vendor Partnerships
AVM PREMIUM LENOVO IDG/ISG HP POLY SANDISK UNIFY
Education & Training
Bridging technology and learning with proven pedagogy.Education & Training
Workshops, tutoring, and programs — MEDIA PEDAGOGY INCLUSIVE.
STEM Coaching
Analytical thinking & real-world exercises — STEM PRACTICE.
Subject Areas
Math, CS, Physics, History — EXAMS CURRICULA.
Digital Literacy & Awareness
Security awareness & collaboration — SECURITY WORKFLOWS.
Custom Curricula & Workshops
Tailored learning paths with hands-on labs — OUTcomes.
Timeline & Qualifications
Milestones and certificationsSecurity Assessment Services
Comprehensive security evaluations for businesses and individualsFor Businesses
Comprehensive security evaluations for organizations of all sizes:
- Infrastructure vulnerability assessment
- Policy and compliance gap analysis
- Employee security awareness evaluation
- Incident response readiness assessment
- Detailed report with actionable recommendations
For Individuals
Personalized security guidance for home users:
- Home network security evaluation
- Device security configuration review
- Privacy and data protection assessment
- Online account security check
- Personal cybersecurity best practices
Sample Projects
Problem → Solution → ResultSMB Cloud Migration
Legacy analysis, security baseline, migration plan. Result: fewer outages, more transparency.
School Security Hardening
Patch mgmt, rights model, MFA rollout. Result: reduced risk & clear roles.
Process Automation
Scripted recurring tasks. Result: hours saved weekly, fewer errors.
Customer Reviews
Trusted by professionals and private clients alike"Outstanding service, fast support and very knowledgeable in IT & Security."
See all reviews"Reliable partner for businesses – pragmatic solutions that actually work."
See all reviewsBooking & Pricing
Transparent. Flexible. Client-focused.Business Security Assessment
- Comprehensive infrastructure analysis
- Policy and compliance review
- Detailed report with recommendations
- 1-hour consultation to discuss findings
Home Security Check
- Home network security evaluation
- Device security configuration review
- Personal cybersecurity guidance
- 30-min follow-up consultation
Ongoing Security Monitoring
- Continuous vulnerability monitoring
- Monthly security reports
- Quarterly policy reviews
- Priority incident response
Architecture Review
2-hour deep dive into your current setup with a concise roadmap.
- Reference architecture fit
- Risk & cost trade-offs
- Priority backlog
IT Management Coaching
One-on-one mentoring for new IT leads and aspiring managers.
- Metrics & service design
- Governance & processes
- Stakeholder communication
Cloud Readiness Workshop
Assess workloads & plan a pragmatic path to the cloud.
- Inventory & dependencies
- Governance & controls
- Migrate or modernize?
Executive Briefing – AI & Security
60-minute briefing for leadership: risks, controls, and business value.
- Threats & safeguards
- Policy & enablement
- Use-case shortlist
Incident Response – Intro Call
Discuss preparedness and options for a light retainer.
- Contact paths & SLAs
- Playbooks & roles
- Readiness checklist
Teaching Packages
Competitive, flexible, learner-first.Teaching – Individual (1:1)
- Personalized one-on-one learning
- Flexible scheduling
- Focus on your goals and pace
Teaching – Mini Group
- Small group (2–4 participants)
- Interactive and collaborative learning
- Shared exercises & peer exchange
Teaching – Max Group
- Group sessions with up to 10 people
- Affordable and engaging
- Team-oriented learning environment
Publications
Author & Instructor profilesArticles & Whitepapers
Short essays on education, security, and cloud governance — publishing soon.
Contact
Fast & secure ways to reach meOkan Acikel
IT Consultant & Educator
Owner — SuDo IT-Solutions
For sensitive topics, please encrypt with my PGP key below.
Secure Communication (PGP)
Use my public key to encrypt messagesPublic Key
Fingerprint: B102 E1DF E10C 4442 D7B3 F8AB 1A67 4BEB 0199 E1AE
-----BEGIN PGP PUBLIC KEY BLOCK----- mQINBF68VDEBEADhXAIihsj7JRXh2hSw4dlDZztD6Wk69HJSkbZ1hsAeabUT6isL 3aUXXhzgspdye+/iXiZhM2TNPiRsSJnubPsIdPpICaGxZzpCP3ZJq9UciPHWELsz G0tmaRr/Ps/73bz+Xr35bvRI7GGf2Wu3QLteTbEYe8G1Z+qHQwmqZfuiRpTFp7Jy a0loRSGffkvyxF4YU9lWpKVZYf9mLLGbXX3Nxxhgxl1IU+zHyASnfpfs9Hm+osXX 86g2BqjXFRC0vbgAx8g/TseiWzd6n/OQmK24BgFTUvHaGWeYlGWKB3vj61PIoMPn A6A/Ru1TPZuWrJ0t6N29oxgQZV5Z6TmHyrL9WvovwgvmmxByn9QYOB8j3WjtjdWP nPM6u6bDGEIuLf/dt3akkv/Vxt7FriFI1/7HQ5eRmkdqJVPHsIymY7VYSm1SDPg0 D1tXL7S2D+biARb5p+kVB7RuTG89v86KbjSbtUo1Yq/pZ5L2ZNeh5v4laIZnm9Lc /XAk2LvANmGma6KtcbJpwhXLAF2XXSXpoUGlQbg1ReUAidY5EUrjIqWjEwwyRGd+ 52F+Se6PQTaZpBhDj28zAJqan5UTz9ytENHbTPTZqUkgzAY/30qdH4jb/DULDtjV uo2sHNnt3nYkm2HK7q71h3Nh2gSf6+gZ1gP7B7oaaCEofc3/4da15kHU9wARAQAB tEhNci4gT2thbiBBY2lrZWwsIENlcnQuIElUIE1hbmFnZXIgJiBJVCBTZWN1cml0 eSA8b2thbmFjaWtlbDkzQGdtYWlsLmNvbT6JAlQEEwEIAD4WIQSwMOHf4QxEQtez +KsaZ0vrAZnhrgUCXrxUMQIbIwUJA8HX7wULCQgHAgYVCgkICwIEFgIDAQIeAQIX gAAKCRAaZ0vrAZnhrhbuD/42k6XTlr6J6400S9PrNcSTNRMHz8wx9mqR9WvbcBhk 8OTs6wUP/XOGYS67yIgNmXcl9ueJQUsMAbmVF1nDBIy9HnkUvUJrb8gMS+qA6kOg q3E9Un7sgEYLRdeaP0YhcqzrHE/+/7IYoCZkuxQA6eIvmyIdZQZEAmRbWN1osXR2 iojmT15qPMNauAuYUGVOHBPLklllqKHf7DZ1ldcfCW6guPelOMvKXoNt8N25bTzD q1GNRIh1LKmllPN5kE/2olK2QvNjOoewn0C5uGzZh3tkVcaWFI4iZBF+qRFDfpPO 1j9iKv+YVNeioAV8WrU9bVcYF87XXjvhpQiUUPf3GfOyhWYR1AClTibiY8pEg03+ S374vUD+8C6xOTdDWZDZTq+y+jKqDxJywyOBO7PK6S8JsrnxDWPoyCNdQhiesnBh Jfuop9PD+58YUK3UgeUCC1A9pqSpFVsZL/eiyNTnfxgIA1T+Zrp+ZGO81PcczmVT pKVAGOWafzJ89SjRf9hc5O0fIwzO+HNcdMEM6T7ZMLjxd52vpgTV+92rO4AGNGMA JgQ9JuY1LW+KEthl0abQEnPf4TrdIghZ/3FlsCtL8EaCKkxjgIZZdPv4/zbPbVnQ PHol15BEJQmGTUd8LOBBvhYxPwCUEDxYaLKaLQSVj01Pe2eMFV6+9oYkD3XEIGco ILkCDQRevFQxARAA5pXalEmKM5jSkZpV3kxyyjidbZxrILqTdCEnbLr+gVoAKKf0 w3xwaN30lOyKLeeS9Z6ZiYQEBEKDVbDUQrq/2WqpjF+RnigEVg7i4AQusgP/ax/S 75uMQM9Odqov4ouH9IODKr+7wiqJVKjrSO1z0AjGu/n4h5SbS6lUIkU0G4KY76e8 unaohHNFtdXrwt1AOf/ZgJPtuRsDXP8cVXDXdSw82d573rDXkLSqU0pnnEyRiNOW fQNq2GnhSGEVekgck+8xksmMeuUAVwWSRVrpCSESOSN+1Fb4wdfXhQU2utgah7Uu 9QGd9C73LfDBjOwPTXBqtMbTa0dFlPZW3h1yW7UJpDyx+imnBiNF2oKUVyt8kc5O L47nf9+4Gwk1KWyh4Fxz/xhufXal8MlCVYw8Y/pB5veUKKJubiDMTlPJUXfxeMgj oSGYnlIIA2Jnf9qkPjwnEXrwrqzgASOMsTVUhwr2SjaCTqvd9Fp1p3E77HaM20UM OA0+UW/NfTvl144dbuSAd6WUzwtAyTCLMNwYYka478ul5OiuuQJIKbDJFXS8fTj3 YLagDuL/rMrAXr7Xex3q+ceVHWJivjpU5Gqzh9tpzK6DA8pjnjVUOioqZ7kw8ZI7 wZasDFXgoW6+2XyrXrM+4Hkpid2mE2N5vhIxdEhMZIXMWSZJYZLh8JqdCu8AEQEA AYkCPAQYAQgAJhYhBLAw4d/hDERC17P4qxpnS+sBmeGuBQJevFQxAhsMBQkDwdfv AAoJEBpnS+sBmeGubFcQAJSWjNsXSqKMCZlv4NLYLbCWN4M3qQcKbzt4de9hAMsm JVJ+Hp0kKwmAn6KeNW9DVavBSu9KGo8c4K8tIQBag6P0li7YdLaU2lf02+8t2oco 1KYf6uTIrZgQgrYpjD6wj6U7ZtlZRp2kOSOH7pIQWDX3DJC5zE8vhyVMFKPdttQs eTMA+ksPU+zgJdZLPrJKziEvALmdOPtcY9CiV0nUfXh4VHBbev+BwhUpQaRj9nHu iNTi0qF7Qr8qEAvZ/cWtlrGFyldCY4EWMY+0uG5+X4+0vDvB5ua17szQaFAeRMuc A55L8we5EXIhqyI+L8UOkRx5NN1+Qi3/lQf494/+eKtF1pkn+ZKuSo7CTUHKO39U c7GPnWuTF6cISJMpIdj1ukkDBPYvKYg5YbjyET+v60p1PAopoQTh9iUvK4Iz2bYc cbUq0OfbsljaqQ7b9CgcAXGRwGn9J4fGAahuQoAglbPclaih51P0l2a2slW1QzO8 lAgIQMdjZl2No7YyRzBDoh9D3KFrSp3T/gKheWbRzFgNFIr3LPCigYzlxukfilhO 0P/Wq0/gXDVDY7CoYVuP+0AU8I6muowZSKdyUW+TgArAttfX83mrTNQFBb5viR82 IkYspBDENN1zFo9kNyPR4bZ4eZqd0MoR2Y9zUL1Tuv6PlDXa4xeV6dKOFCne4Lkw =BGrY -----END PGP PUBLIC KEY BLOCK-----
How to Use
- Copy or download the key and import it into your PGP client.
- Verify the fingerprint out-of-band.
- Encrypt your message to this key and email it to contact@okan-acikel.com.