Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Network Solutions Unlimited has been serving the Decatur area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Voting Machine You Use May Have Serious Security Issues

The Voting Machine You Use May Have Serious Security Issues

The ability to vote is considered one of the great rights in the world, putting one’s voice and opinion into action to shape history. However, it has been demonstrated that the electronic voting machines that some states in the U.S. use simply aren’t secure enough to ensure that the democratic process is preserved.

The issues present in voting infrastructure have been known for years. By using expensive electronic voting machines, many polling places are putting themselves in the position of being stuck with old, outdated systems without the necessary funds to replace them. In fact, it was predicted that 43 states would use ten-year-old electronic voting machines, an age that is uncomfortably close to the total lifespan of the machine.

This could easily result in machine crashes and failures, potentially causing votes to be lost or--with some touch-screen machines--registered for a different candidate than the voter input. Adding to this issue is the fact that, with exclusively digital voting machine, there is no way to check the results against anything else if there needs to be an audit.

This issue was only proven further during the 2017 DefCon conference, where the unprecedented Voting Village revealed what a hacker could do to an actual voting machine. This kind of activity had never been done before because, until late 2016, it had been illegal to tamper with voting machines--even if just for research purposes. Researchers discovered that there were plenty of ways to breach voting systems through both remote access and physical tampering.

Influencing an election doesn’t even necessarily require tampering with the votes themselves, either. By slowing the systems to a crawl, or simply rendering them inoperable, hackers can easily keep many people from voting.

Lawrence Norden, of the Brennan Center for Justice, argues that going low-tech is the best way to combat this kind of interference, supplemented by the use of encryption, blockchain, and other technological solutions. According to a blog post by Norden, the voting process needs to reintroduce paper.

As he says in his blog:

“Specifically, every new voting machine in the United States should have a paper record that the voter reviews, and that can be used later to check the electronic totals that are reported.

This could be a paper ballot the voter fills out before it is scanned by a machine, or a record created by the machine on which the voter makes her selections—so long as she can review that record and make changes before casting her vote.”

According to Norden, this would eliminate the risk of an undetected change or error in software causing an undetectable change or error in the outcome of an election.

Just like your organization, having accurate data and computing infrastructure that doesn’t work against your goals is key here. When hardware and software becomes out of date, not only do you deal with the same quirks and problems that were baked in from the beginning, but you also deal with new problems and unreliability. When your data is at stake, this can be a major issue.

If your business has embraced digital filing (which we highly recommend), imagine putting the integrity of your data at risk by using an old computer. While going back to physical paper documents might be a solution, it will cost your business a lot of time and effort to accommodate, when compared to the cost of upgrading your IT. What are your thoughts? Leave them in the comments section below.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 21 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Assessment Gifts Advertising Audiobook Meetings Administration Project Management Cybercrime Communications WiFi Microsoft Office Data Management Miscellaneous Touchpad Unsupported Software Word Best Practice Samsung Mobility Android Two Factor Authentication Risk Management Outsourced IT Windows 10s Managed Service Provider Files Operating System Augmented Reality Saving Money Phishing Bluetooth Benefits Users Spam Blocking Cortana Experience Mobile Device Encryption Google Drive Consultant Workers VPN Employer-Employee Relationship Relocation Emails Internet exploMicrosoft Hackers Battery Backup Microsoft Excel Monitors Artificial Intelligence WannaCry Alert Software CrashOverride Legislation Cost Management Licensing Managed IT Going Green Loyalty Data Breach Congratulations Commerce Internet Hybrid Cloud Information Technology Google Docs Blockchain The Internet of Things Robot Politics Business Computing Vendor Management Cybersecurity Shadow IT Regulation BYOD iPhone Data Loss Specifications Root Cause Analysis Avoiding Downtime User Tips Upgrades Physical Security File Sharing Collaboration Reputation HBO Retail Hardware Computer Fan Customer Applications Mobile Hacking Browser Document Management intranet Network Security Computer Care Credit Cards Identities Government Worker Spam Cast Fraud Emergency Office Tips Proactive IT Nanotechnology Content Filtering Managed IT Services Tip of the Week Remote Monitoring Legal Scam Quick Tips HIPAA Device Security Redundancy Computers Spyware Automation Malware Cloud Computing App Outlook Email Ciminal Windows Ink Password Troubleshooting Save Money Budget SaaS Virtual Reality Devices Windows 10 Humor Efficiency Wi-Fi Data Backup Automobile Hosted Solutions History Colocation Updates Flexibility Computer Content Bandwidth Productivity Mobile Device Management Smartphone Audit Scalability hacker IT solutions Work/Life Balance Money Networking Recovery Gmail Business Continuity VoIP Workplace Tips Entertainment Sports Thank You Law Enforcement Big Data Windows Wireless Technology Rootkit Sync Edge Privacy Data Internet Exlporer Productivity Private Cloud Touchscreen Business Smartphones Social Engineering Marketing Holiday Vulnerability Google Maps Worker Commute Managed IT Services Cache Education Hard Drives Remote Computing BDR Data Recovery Storage Evernote Save Time Cleaning IT Support Office 365 MSP Personal Information Windows 10 Cloud Computing Infrastructure Telephone Systems Webinar Best Practices Tech Support Keyboard Lifestyle Adobe WIndows Server 2008 Managed IT Service Phone System Sales Search How To Google Mobile Devices Application IT Support Unified Threat Management HaaS Internet of Things Technology Network Wireless Firewall Charger Software as a Service Books Comparison Training eWaste Maintenance How to Monitor Dark Web Identity Theft Laptop IT Services Instant Messaging Server Two-factor Authentication Compliance Professional Services End of Support Ransomware Travel Techology Transportation Microsoft Conferencing Router Hard Disk Drive iOS Downtime NFL User Error Business Management Black Market Data Storage Business Intelligence Small Business Excel Innovation Television PDF Electronic Medical Records IT Management Health Solid State Drive Public Cloud OneNote Video Games USB Computer Accessories Public Computer Data Protection Chromecast FAQ Data storage Tablets Upgrade Patch Management Business Owner Safety Microsoft Word Hiring/Firing Value Facebook Office Disaster Recovery Virtualization Shortcut Wireless Charging Passwords Chrome Screen Mirroring IT budget Smart Technology Hosted Solution Social Media IT Solutions Settings Apps Bring Your Own Device Gadgets Security Apple Employer Employee Relationship Data Security

Sign Up for Our Newsletter

  • Company Name *
  • First Name *
  • Last Name *