COMPUTER SECURITY

4 Reasons Why You Need Computer Security

4 Reasons Why You Need Computer Security

 

 

There are many of us that are so careless about our devices. How many of us password our system or devices.

 

Some do not even believe that it is necessary to add strong passwords to their devices.

 

This makes it very easy for intruders to have access to your devices. In this article, I want to talk about four reasons why you need computer security. Follow me as we are going to look at some of these reasons together in this article.

NHS Header

 

What is computer security?

Security can be defined as the state of well being of information and infrastructure that are stored inside our devices.

 

 

Computer Security is the protection of computer resources and other information that are stored and processed on a computer system.

 

 

Why then do we need computer security…

#1 CIA

Computer Security is needed in order to protect the Confidentiality, Integrity and availability of computer systems and resources.

 

If will ensure that information is available when they are needed and that it is coming from the expected source.

 

 

#2 Complexity 

You also need to know that computer administration and management has become so complex and this has provided more avenue for attacks.

 

For instance, some of us like to have many apps on our devices. The truth of the matter is that the more app that you have, the more medium for hackers to attack your devices. 

 

 

#3 Evolution of technology 

Another major is that the evolution of new technologies has focused more on ease of use than security. Some of the new devices try to make their devices easier to use and they do not try in any way to make their devices difficult so that more people will appreciate their products.

 

This also creates an avenue for hackers to attack legitimate users.

 

#4 Network paths

Also, when two or more devices are connected to share resources together, it will create an avenue for network attacks.

 

In this case, once the intruder is successful in attacking one of the devices, it will also spread to other devices on the network as well. 

 

 

Action Point
PS: If you would like to have an online course on any of the courses that you found on this blog, I will be glad to do that on individual and corporate level, I will be very glad to do that I have trained several individuals and groups and they are doing well in their various fields of endeavour. Some of those that I have trained includes staffs of Dangote Refinery, FCMB, Zenith Bank, New Horizons Nigeria among others. Please come on Whatsapp and let’s talk about your training. You can reach me on Whatsapp HERE. Please note that I will be using Microsoft Team to facilitate the training.

I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you can drop your comment. Thanks in anticipation.

 

Fact Check Policy

CRMNIGERIA is committed to fact-checking in a fair, transparent and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.

 

Become Part Of our Fan Base on Facebook. Click Here.
Follow Us on Twitter. Click Here.
Many Crypto. One place. Use Roqqu

Hi, I now use RavenBank to send, receive and save money. I also pay my bills with ease, you should try it out too

 

Fact Check Policy
truehost
whatsapp

Adeniyi Salau

Adeniyi Salau is a highly dedicated and committed Blogger of repute. He likes sharing his IT knowledge with others. My desire is to impact as many lives as possible with my IT skills. You can download my mobile APP. Download the ICTLOAD APP on Google Playstore. Thanks.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button