croom new

The Voting Machine You Use May Have Serious Security Issues

The Voting Machine You Use May Have Serious Security Issues

The ability to vote is considered one of the great rights in the world, putting one’s voice and opinion into action to shape history. However, it has been demonstrated that the electronic voting machines that some states in the U.S. use simply aren’t secure enough to ensure that the democratic process is preserved.

The issues present in voting infrastructure have been known for years. By using expensive electronic voting machines, many polling places are putting themselves in the position of being stuck with old, outdated systems without the necessary funds to replace them. In fact, it was predicted that 43 states would use ten-year-old electronic voting machines, an age that is uncomfortably close to the total lifespan of the machine.

This could easily result in machine crashes and failures, potentially causing votes to be lost or--with some touch-screen machines--registered for a different candidate than the voter input. Adding to this issue is the fact that, with exclusively digital voting machine, there is no way to check the results against anything else if there needs to be an audit.

This issue was only proven further during the 2017 DefCon conference, where the unprecedented Voting Village revealed what a hacker could do to an actual voting machine. This kind of activity had never been done before because, until late 2016, it had been illegal to tamper with voting machines--even if just for research purposes. Researchers discovered that there were plenty of ways to breach voting systems through both remote access and physical tampering.

Influencing an election doesn’t even necessarily require tampering with the votes themselves, either. By slowing the systems to a crawl, or simply rendering them inoperable, hackers can easily keep many people from voting.

Lawrence Norden, of the Brennan Center for Justice, argues that going low-tech is the best way to combat this kind of interference, supplemented by the use of encryption, blockchain, and other technological solutions. According to a blog post by Norden, the voting process needs to reintroduce paper.

As he says in his blog:

“Specifically, every new voting machine in the United States should have a paper record that the voter reviews, and that can be used later to check the electronic totals that are reported.

This could be a paper ballot the voter fills out before it is scanned by a machine, or a record created by the machine on which the voter makes her selections—so long as she can review that record and make changes before casting her vote.”

According to Norden, this would eliminate the risk of an undetected change or error in software causing an undetectable change or error in the outcome of an election.

Just like your organization, having accurate data and computing infrastructure that doesn’t work against your goals is key here. When hardware and software becomes out of date, not only do you deal with the same quirks and problems that were baked in from the beginning, but you also deal with new problems and unreliability. When your data is at stake, this can be a major issue.

If your business has embraced digital filing (which we highly recommend), imagine putting the integrity of your data at risk by using an old computer. While going back to physical paper documents might be a solution, it will cost your business a lot of time and effort to accommodate, when compared to the cost of upgrading your IT. What are your thoughts? Leave them in the comments section below.

Tip of the Week: How to Better Use Your Smartphone...
Hackers May Meet Their Match With AI
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 16 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Internet Google Hackers Malware Software Business Management Microsoft User Tips Tech Term Productivity Hosted Solutions Innovation Computer Windows 10 Efficiency Backup Cybersecurity Browser Productivity Business Apps Mobile Devices Email Smartphones Windows Managed IT Services Saving Money Hardware Communication Small Business Cybercrime Virtualization Smartphone VoIP Law Enforcement Collaboration Android Data Recovery Data Backup Passwords Operating System Workplace Tips Internet of Things Disaster Recovery communications Microsoft Office IT Support Business Continuity Data Security Miscellaneous Ransomware Social Media Phishing Mobile Device Management Telephone Systems Office 365 BDR Data Wireless Quick Tips Holiday Chrome Network Money Gadgets Server IT Support Users Update Cloud Computing Mobility Government Password Best Practice Wi-Fi Google Drive Health Windows 10 Social Risk Management Vulnerability Unsupported Software Application IT Services App Information Technology Mobile Device Cost Management Employer-Employee Relationship Outsourced IT Hacking Facebook Upgrade Current Events Data Management Office tips Proactive IT USB Save Money Spam Sports Artificial Intelligence Antivirus Streaming Media Managed Service Provider Bandwidth Blockchain User Error Shortcut Identity Theft Automation Patch Management Politics Alert Managed IT Services Two-factor Authentication Computers Work/Life Balance Managed IT Going Green Save Time Excel Networking Company Culture Storage iPhone Managing Stress Apple HaaS Devices VPN SaaS Commerce eWaste Telephony Humor Automobile Social Engineering Computer Care Cortana WiFi Personal Information Mobile Computing DDoS Remote Computing Legal Mobile Security Information Recovery Wireless Charging Search Google Docs Analytics Office Fraud Flexibility Television Marketing Business Intelligence Data Storage Tech Support Cleaning Gmail Samsung OneNote Data Protection Encryption Router History Compliance Maintenance Transportation Internet Exlporer End of Support Battery Wireless Technology The Internet of Things Touchscreen Private Cloud Meetings Audit Hosted Solution Computing Plug-In Touchpad Solid State Drive Point of Sale Trends Troubleshooting Settings Data storage IT Solutions FAQ Internet Explorer Microsoft Office 365 Trending Computer Accessories Augmented Reality Google Maps Project Management Phone System Cables Electronic Medical Records BYOD Retail Chromebook Reporting Smart Technology Computer Fan Travel Microsoft Teams Lithium-ion battery App store Remote Monitoring and Management Hacker Hard Disk Drive Sync Workers Advertising A.I. Administrator Video Games Safety Emails Charger Threat Access Control Data Loss IT budget Music Virus Voice over Internet Protocol Conferencing Reputation Printing Medical IT WannaCry Tablets Spyware Running Cable G Suite Unified Threat Management SharePoint Analysis Uninterrupted Power Supply Keyboard Operating Sysytem Updates Movies Access Legislation Webinar WIndows Server 2008 Virtual Reality PowerPoint Authentication Budget Vendor Management Bluetooth Distributed Denial of Service Proactive HBO Gifts Black Market Google Assistant GDPR NFL Entertainment Bring Your Own Device Upgrades Identity Managed Service Avoiding Downtime Adobe Microsoft Word Comparison Websites Amazon IT solutions Data Breach Education Connectivity Authorization Chromecast Microsoft Excel Identities Big Data Fax Server Credit Cards Value Dark Web Files Scam Nanotechnology Word Edge Hybrid Cloud Consultant Specifications Scalability Teamwork Data Privacy Hiring/Firing iOS Applications PDF Worker Commute Unified Communications Screen Mirroring Data Theft Virtual Assistant Laptop Windows 10s Outlook Evernote Downloads Training File Sharing Language Books IT Management Instant Messaging Error Employer Employee Relationship Root Cause Analysis Windows Ink Ciminal Experience Managed IT Service Cast Sales How To Hard Drive Benefits Licensing Device Security Text Messaging Wearable Technology RAM Robot Cache Remote Monitoring Emergency CrashOverride Monitors Worker Printers Relocation Twitter Regulation Disaster

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login