triangles of computer security
Computer security is one reoccurring theme on my blog. This is because security is something I love so much. I have been a victim of security negligence and I would love to help others.
In my previous article, I have looked at some of the elements of security. In this article, I want to look at the triangles of security.
I want to look at that three sides. You should know that when any of it is missing, we cannot say that the computer is secured. Now let us examine the three in details in this article.
ease of use
This is a dilemma. We want our computers and other devices to be easy to use. Besides that, we want it to be secured. I am currently using one to secure my Android phone.
Believe me, I am already thinking of removing it. It is a lot of stress to swipe and open my phone. You should note that when you are moving too much towards ease of use, your computer can never be secured.
This is the second side of the angle. We want the device to be secured. We also want it to be able to perform the function that it needs to perform. You should be able to chat and download games without any hindrance.
I know how some of us will react when password pops up when you are downloading.
That is the challenge that we have to cope with. Devices are designed to perform their routine functions but that does not mean we should compromise security.
These are restrictions that are enforced on device users in order to secure their devices. They are logged out at intervals in order to restrict access. Sometimes as the device user, you are made to pass through hell when you forget passwords.
These are some of the headaches we have to live with in order to guarantee computer security.
Above all, when you move towards one angle of the security ball, you are gradually moving towards the others. You cannot eat your cake and have it.
If you enjoy our article, sign up to get our next article in your inbox.
You need to confirm your subscription by clicking on the link sent to you. You can check the spam folder for it. Add us to your mailing list to receive directly from us.
PS: Click on the link below to sign up for my Online E-Course CRM Training. Make sure you confirm your subscription by clicking on the link sent to you. Thanks.