Marho Atumu

Marho is a Community Support agent at The Events Calendar and enjoys helping people discover how information technology can provide great solutions to their everyday problems. His career in IT can clearly be traced to his love for all things science fiction.

  • What Is a Cloud Dedicated Server? A Definitive Guide

    What Is a Cloud Dedicated Server? A Definitive Guide

    Need the flexibility of the cloud and the performance of a bare metal server? A cloud dedicated server can offer the best of both worlds.

    Read Article
  • What is VMware vCenter HA Admission Control?

    What is VMware vCenter HA Admission Control?

    Find out what VMware vCenter HA Admission Control is, how it works, and why you need it - all at Liquid Web.

    Read Article
  • Tactical Server Hardening Checklist for Windows and Linux Security

    Tactical Server Hardening Checklist for Windows and Linux Security

    Get this easy-to-use 8-step server hardening checklist for Linux and Windows for security against DDoS, malware, or code injection.

    Read Article
  • 10 Absolute Best Ways to Mitigate Security Risk

    10 Absolute Best Ways to Mitigate Security Risk

    Find out the 10 absolute best ways to mitigate security risk and threats, including practical tips and strategies for prevention.

    Read Article
  • Top 5 Cybersecurity Frameworks in 2022

    Top 5 Cybersecurity Frameworks in 2022

    Implement robust security controls in 2022 and secure data by leveraging one of these top cybersecurity frameworks.

    Read Blog
  • A Complete Guide to System Hardening

    A Complete Guide to System Hardening

    Find out what system hardening is, how to harden a server, the benefits and best practices for 2021. Read the guide today.

    Read Article
  • What is Security-as-a-Service (SECaaS)? Definition & Examples

    What is Security-as-a-Service (SECaaS)? Definition & Examples

    Security-as-a-Service (SECaaS), like SaaS, outsources cloud-based security services in a subscription service model, saving time and increasing defense.

    Read Blog
  • What is Bring Your Own Device and How to Create Your BYOD Policy Today

    What is Bring Your Own Device and How to Create Your BYOD Policy Today

    Find out what BYOD is, the advantages and risks of BYOD, and how to create your first Bring Your Own Device policy for your organization today.

    Read Blog
  • What is an Information Security Policy and How to Create One

    What is an Information Security Policy and How to Create One

    Find out what an information policy is, its elements and best practices, and five steps to create your first information security policy today.

    Read Blog
  • How to Create Your First Cyber Incident Response (IR) Plan

    How to Create Your First Cyber Incident Response (IR) Plan

    Discover what an incident response plan is, the six phases of all IR plans, and the seven steps you need to take today to create and implement your plan.

    Read Blog
  • Business Continuity: How to Prepare Your Business

    Business Continuity: How to Prepare Your Business

    Discover what business continuity is, the processes involved in management, and how to create your first business continuity plan.

    Read Blog
  • loading
    Loading More...