4 Reasons Why You Need Computer Security

You need computer security

4 Reasons Why You Need Computer Security



There are many of us that are so careless about our devices. How many of us password our system or devices. Some do not even believe that it is necessary to add strong passwords to their devices. This makes it very easy for intruders to have access to your devices. In this article, I want to talk about four reasons why you need computer security. Follow me as we are going to look at some of these reasons together in this article.

You need computer security

What is computer security?

Security can be defined as the state of well being of information and infrastructure that are stored inside our devices.


Computer Security is the protection of computer resources and other information that are stored and processed on a computer system.


Why then do we need computer security…

#1 CIA

Computer Security is needed in order to protect the Confidentiality, Integrity and availability of computer systems and resources. If will ensure that information is available when they are needed and that it is coming from the expected source.


#2 Complexity 

You also need to know that computer administration and management has become so complex and this has provided more avenue for attacks. For instance, some of us like to have many apps on our devices. The truth of the matter is that the more app that you have, the more medium for hackers to attack your devices. 


#3 Evolution of technology 

Another major is that the evolution of new technologies has focused more on ease of use than security. Some of the new devices try to make their devices easier to use and they do not try in any way to make their devices difficult so that more people will appreciate their products. This also creates an avenue for hackers to attack legitimate users.


#4 Network paths

Also, when two or more devices are connected to share resources together, it will create an avenue for network attacks. In this case, once the intruder is successful in attacking one of the devices, it will also spread to other devices on the network as well. 


Action Point

I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you can drop your comment. Thanks in anticipation.



Download Our App.


CEHNigeria On Google Playstore

Download Our Blog App On Google Playstore. 


Have a deeper understanding of Google Search Console. Use SEOPOZ



Have a deeper understanding of Google Search Console. Join SEOPOZ for free. 

Join Our Whatsapp Group Here


Join Our Whatsapp Group

Follow Us On Twitter and I will Follow Back


Follow Us On Twitter

Kindly follow me on Twitter and I promise I will follow back. Aside you all get updates when we post new articles. 

About Adeniyi Salau 884 Articles
I am an IT enthusiast and a man of many parts. I am a Certified Digital Marketer, Project Manager and a Real Estate Consultant. I love writing because that's what keeps me going. I am running this blog to share what I know with others. I am also a Superlife Stem Cell Distributor. Our Stem Cell Products can cure many ailments.

Be the first to comment

Leave a Reply

Your email address will not be published.


CommentLuv badge