3 great triangles of computer security

computer security

 

Computer security is one reoccurring theme on my blog. This is because security is something I love so much. I have been a victim of security negligence and I would love to help others.

 

In my previous article, I have looked at some of the elements of security. In this article, I want to look at triangles of security. 

 

A triangle has three sides. Maybe it was named triangles of security because it has three sides.

 

I want to look at that three sides. You should know that when any of it is missing, we cannot say that the computer is secured. Now let us examine the three in details in this article.





ease of use

This is a dilemma. We want our computers and other devices to be easy to use. Besides that, we want it to be secured. I am currently using one to secure my Android phone.

 

Believe me, I am already thinking of removing it. It is a lot of stress to swipe and open my phone. You should note that when you are moving too much towards ease of use, your computer can never be secured.

 

functionality

This is the second side of the angle. We want the device to be secured. We also want it to be able to perform the function that it needs to perform. You should be able to chat and download games without any hindrance.

 

I know how some of us will react when password pops up when you are downloading.

 

That is the challenge that we have to cope with. Devices are designed to perform their routine functions but that does not mean we should compromise security. 

 

security

These are restrictions that are enforced on device users in order to secure their devices. They are logged out at intervals in order to restrict access. Sometimes as the device user, you are made to pass through hell when you forget passwords.

computer security

These are some of the headaches we have to live with in order to guarantee computer security. 

 

Above all, when you move towards one angle of the security ball, you are gradually moving towards the others. You cannot eat your cake and have it. 

 

 

Action Point

If you enjoy our article, sign up to get our next article in your inbox.

 

You need to confirm your subscription by clicking on the link sent to you. You can check the spam folder for it. Add us to your mailing list to receive directly from us. 

 

PS: Click on the link below to sign up for my Online E-Course CRM Training. Make sure you confirm your subscription by clicking on the link sent to you. Thanks.

 

 

 

image_pdfGENERATE PDFimage_printPRINT
About crmnigeria 84 Articles
Adeniyi Salau C.E.P. C.S.C.U, M.C.P., M.C.T.P (MICROSOFT PROJECT 2016), Hubspot Inbound Marketing Expert is a Digital Marketer of repute who is committed to sharing his knowledge with readers out. He strongly believe I.T Knowledge is for everyone. He is already championing that cause.

Be the first to comment

Leave a Reply

Your email address will not be published.


*


CommentLuv badge