Liku Zelleke

Liku Zelleke

linkedin-icon

Liku Zelleke is a field support technician at DXC Technology and a prolific blogger. He has over two decades’ experience in the IT industry starting at Ethiopian Airlines in 1997, holding a number of roles during his 25 years with the company from Helpdesk Tech Support through to Database Administrator, Systems Administrator, Network Administrator and a Systems Support Professional.

He hasn’t looked back since the day, years ago, when he discovered he could combine that experience with his other passion: writing. Today, he writes on topics related to network configuration, optimization, and security.

Articles by Liku

Data discovery tools help businesses rein in their data assets and better leverage the information they have at hand. Find out the best tools in this post.  
By Liku Zelleke in Net Admin on January 23, 2024
Data mapping software and tools are used to plan and design the flow of data ETL by taking the correct data sets from the correct sources, transforming them into expected formats, and uploading them into their corresponding target databases. In this post, we have listed the best for you to choose from according to your needs.
By Liku Zelleke in Net Admin on March 25, 2024
Businesses need to ensure that their data is secure to assure their clients that whatever information they hand over will be in safe hands. This means there is always a need for cybersecurity risk management solutions.
By Liku Zelleke in Net Admin on October 25, 2024
A secure email gateway helps address the security challenges faced by modern businesses. We compare the seven best secure email gateways for businesses of any size.
By Liku Zelleke in Net Admin on February 21, 2024
There will be times when answering the question “Have you tried turning it on and off again?” won’t provide a solution to your network problems. Find all the answers here, troubleshoot your network connectivity like a professional
By Liku Zelleke in Net Admin on September 13, 2024
Cybersecurity risk management is the continuous process of identifying, analyzing, evaluating, and addressing an organization’s cyber security threats. Learn how to design and implement your security processes.
By Liku Zelleke in Information Security on March 5, 2024
A head-to-head comparison to help decide which is the most suitable USB locking software between Gilisoft USB Lock and Endpoint according to your needs.
By Liku Zelleke in Net Admin on November 14, 2022
Data loss due to unsecured or failed USB drives could have serious consequences for your organization. Put an end to data leaks and theft by controlling portable storage devices like USB
By Liku Zelleke in Net Admin on January 19, 2023
Τhe best way of securing data is by making it unusable to anyone but its owners and other authorized users with the help of data encryption tools.
By Liku Zelleke in Net Admin on November 14, 2022
Page 2 of 7