Contact us today!

Network Solutions Unlimited Blog

Network Solutions Unlimited has been serving the Decatur area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Voting Machine You Use May Have Serious Security Issues

The ability to vote is considered one of the great rights in the world, putting one’s voice and opinion into action to shape history. However, it has been demonstrated that the electronic voting machines that some states in the U.S. use simply aren’t secure enough to ensure that the democratic process is preserved.

The issues present in voting infrastructure have been known for years. By using expensive electronic voting machines, many polling places are putting themselves in the position of being stuck with old, outdated systems without the necessary funds to replace them. In fact, it was predicted that 43 states would use ten-year-old electronic voting machines, an age that is uncomfortably close to the total lifespan of the machine.

This could easily result in machine crashes and failures, potentially causing votes to be lost or--with some touch-screen machines--registered for a different candidate than the voter input. Adding to this issue is the fact that, with exclusively digital voting machine, there is no way to check the results against anything else if there needs to be an audit.

This issue was only proven further during the 2017 DefCon conference, where the unprecedented Voting Village revealed what a hacker could do to an actual voting machine. This kind of activity had never been done before because, until late 2016, it had been illegal to tamper with voting machines--even if just for research purposes. Researchers discovered that there were plenty of ways to breach voting systems through both remote access and physical tampering.

Influencing an election doesn’t even necessarily require tampering with the votes themselves, either. By slowing the systems to a crawl, or simply rendering them inoperable, hackers can easily keep many people from voting.

Lawrence Norden, of the Brennan Center for Justice, argues that going low-tech is the best way to combat this kind of interference, supplemented by the use of encryption, blockchain, and other technological solutions. According to a blog post by Norden, the voting process needs to reintroduce paper.

As he says in his blog:

“Specifically, every new voting machine in the United States should have a paper record that the voter reviews, and that can be used later to check the electronic totals that are reported.

This could be a paper ballot the voter fills out before it is scanned by a machine, or a record created by the machine on which the voter makes her selections—so long as she can review that record and make changes before casting her vote.”

According to Norden, this would eliminate the risk of an undetected change or error in software causing an undetectable change or error in the outcome of an election.

Just like your organization, having accurate data and computing infrastructure that doesn’t work against your goals is key here. When hardware and software becomes out of date, not only do you deal with the same quirks and problems that were baked in from the beginning, but you also deal with new problems and unreliability. When your data is at stake, this can be a major issue.

If your business has embraced digital filing (which we highly recommend), imagine putting the integrity of your data at risk by using an old computer. While going back to physical paper documents might be a solution, it will cost your business a lot of time and effort to accommodate, when compared to the cost of upgrading your IT. What are your thoughts? Leave them in the comments section below.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 21 November 2017

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Root Cause Analysis Instant Messaging Data Backup Travel CrashOverride Windows Solid State Drive Downtime Adobe Emails Cloud Computing Managed IT Services Congratulations Chromecast IT Management Technology Monitors Training Hackers Employer Employee Relationship Cybersecurity Customer Wi-Fi Backup USB IT Services Retail Electronic Medical Records Telephone Systems Gadgets Shadow IT Applications Tip of the Week Entertainment Data Management Mobility Cast Hardware Personal Information Business Continuity The Internet of Things Internet Exlporer Unsupported Software Business Owner Techology Innovation Screen Mirroring Vulnerability iPhone Charger Computers Specifications HIPAA Facebook Computer Public Computer Spam Application Big Data Unified Threat Management Recovery Redundancy Passwords Bluetooth Users Mobile Device Management HaaS Computer Accessories Best Practices Microsoft Transportation File Sharing Microsoft Office Workplace Tips Business Management Operating System Internet of Things Email Assessment Business Social Engineering Remote Computing Lifestyle WiFi Hard Disk Drive Cache Managed IT Budget Consultant Cloud Private Cloud Hybrid Cloud Health Network Computer Fan Business Intelligence Phone System Chrome Smartphones Proactive IT Robot Remote Monitoring Collaboration Hiring/Firing Apple Data Protection Files IT solutions Hacking Network Security Software as a Service Google Communications Virtual Reality IT Support HBO Cortana Data Recovery Webinar Sales Value Work/Life Balance Commerce Document Management WannaCry Avoiding Downtime Outlook Tablets Rootkit Legislation Upgrade Meetings Social Media How to Managed IT Service Sports IT Support Government Content Filtering Windows 10 Touchscreen Mobile Devices Information Technology Productivity Google Maps Internet Vendor Management Firewall Android Excel Nanotechnology Computer Care Word Office 365 Disaster Recovery Employer-Employee Relationship Best Practice Physical Security Outsourced IT Windows Ink Risk Management Audiobook SaaS Compliance Phishing Public Cloud Security Bandwidth Scalability Search Hard Drives Managed Service Provider Hosted Solutions Money Smart Technology Advertising Worker Commute Server Browser Politics NFL Comparison Encryption Licensing hacker VoIP Laptop Cost Management Sync Regulation Bring Your Own Device Data Loss Wireless Technology Managed IT Services Cleaning Microsoft Excel Productivity Two Factor Authentication Going Green Office Tips Loyalty Google Docs Professional Services Ransomware Content Battery Reputation Monitor Flexibility Software Video Games Windows 10 Data storage Colocation OneNote Humor Quick Tips Safety Audit History Mobile Device Automobile Data Keyboard Television Dark Web Storage Windows 10s Spam Blocking Samsung Apps Two-factor Authentication Touchpad Password Alert Legal User Tips IT Solutions Relocation Emergency BDR Upgrades Wireless Save Money Internet exploMicrosoft Troubleshooting PDF User Error Law Enforcement Scam iOS Books Hosted Solution Data Security App BYOD Data Breach Benefits Small Business Office Efficiency Marketing Router Thank You VPN Miscellaneous Mobile Google Drive Black Market Experience Patch Management Saving Money Administration Holiday Shortcut Data Storage WIndows Server 2008 How To Computing Infrastructure Privacy Augmented Reality End of Support Malware Business Computing Artificial Intelligence Settings Smartphone Worker Gmail Cybercrime Virtualization Automation Save Time Education

Sign Up for Our Newsletter

  • Company Name *
  • First Name *
  • Last Name *