You are here
Home > COMPUTER SECURITY TIPS > 3 Great Triangles Of Computer Security Arrangement

3 Great Triangles Of Computer Security Arrangement

3 Great Triangles Of Computer Security Arrangement



Computer security is one reoccurring theme on my blog. This is because security is something I love so much. I have been a victim of security negligence and I would love to help others.

In my previous article, I have looked at some of the elements of security. In this article, I want to look at the triangles of security. 


A triangle has three sides. Maybe it was named triangles of security because it has three sides.
I want to look at those three sides. You should know that when any of it is missing, we cannot say that the computer is secured. Now let us examine the three in details in this article.


ease of use
This is a dilemma. We want our computers and other devices to be easy to use. Besides that, we want it to be secured. I am currently using one to secure my Android phone.
Believe me, I am already thinking of removing it. It is a lot of stress to swipe and open my phone. You should note that when you are moving too much towards ease of use, your computer can never be secured.


This is the second side of the angle. We want the device to be secured. We also want it to be able to perform the function that it needs to perform. You should be able to chat and download games without any hindrance.
I know how some of us will react when password pops up when you are downloading.
That is the challenge that we have to cope with. Devices are designed to perform their routine functions but that does not mean we should compromise security. 


These are restrictions that are enforced on device users in order to secure their devices. They are logged out at intervals in order to restrict access. Sometimes as the device user, you are made to pass through hell when you forget passwords.
3 great triangles of computer security arrangement
These are some of the headaches we have to live with in order to guarantee computer security. 
Above all, when you move towards one angle of the security ball, you are gradually moving towards the others. You cannot eat your cake and have it. 


Now your take on this argument.

We would also like to hear what you feel about the topic we discussed today. Your feedback is very important to us. Feel free to drop your comments and recommendations. If you have a contrary opinion, you can drop that too.


You can also join our Facebook Page CRMNigeria for more updates. You can do that by clicking on the link or searching for our page on Facebook.


Action Point.
You need to confirm your subscription by clicking on the link sent to you. You can check the spam folder for it. Add us to your mailing list to receive directly from us.


PS: Click on the link below to sign up for my Online E-Course CRM Training. Make sure you confirm your subscription by clicking on the link sent to you. Thanks.

Adeniyi Salau
Adeniyi Salau PMP , CCNA R&S , CDMP, CEP, MOS, MCP, CSCU (Project 2016), Microsoft Certified Security and Networking Associate is a Google and Beingcert Certified Digital Marketer, Project Manager and SEO Expert of repute with about a decade of Blogging and online marketing experience. He is always ready to share his experience with others.

Leave a Reply

CommentLuv badge