Eclipse Integrated Systems Blog

Eclipse Integrated Systems has been serving the Bridgewater area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Voting Machine You Use May Have Serious Security Issues

The Voting Machine You Use May Have Serious Security Issues

The ability to vote is considered one of the great rights in the world, putting one’s voice and opinion into action to shape history. However, it has been demonstrated that the electronic voting machines that some states in the U.S. use simply aren’t secure enough to ensure that the democratic process is preserved.

The issues present in voting infrastructure have been known for years. By using expensive electronic voting machines, many polling places are putting themselves in the position of being stuck with old, outdated systems without the necessary funds to replace them. In fact, it was predicted that 43 states would use ten-year-old electronic voting machines, an age that is uncomfortably close to the total lifespan of the machine.

This could easily result in machine crashes and failures, potentially causing votes to be lost or--with some touch-screen machines--registered for a different candidate than the voter input. Adding to this issue is the fact that, with exclusively digital voting machine, there is no way to check the results against anything else if there needs to be an audit.

This issue was only proven further during the 2017 DefCon conference, where the unprecedented Voting Village revealed what a hacker could do to an actual voting machine. This kind of activity had never been done before because, until late 2016, it had been illegal to tamper with voting machines--even if just for research purposes. Researchers discovered that there were plenty of ways to breach voting systems through both remote access and physical tampering.

Influencing an election doesn’t even necessarily require tampering with the votes themselves, either. By slowing the systems to a crawl, or simply rendering them inoperable, hackers can easily keep many people from voting.

Lawrence Norden, of the Brennan Center for Justice, argues that going low-tech is the best way to combat this kind of interference, supplemented by the use of encryption, blockchain, and other technological solutions. According to a blog post by Norden, the voting process needs to reintroduce paper.

As he says in his blog:

“Specifically, every new voting machine in the United States should have a paper record that the voter reviews, and that can be used later to check the electronic totals that are reported.

This could be a paper ballot the voter fills out before it is scanned by a machine, or a record created by the machine on which the voter makes her selections—so long as she can review that record and make changes before casting her vote.”

According to Norden, this would eliminate the risk of an undetected change or error in software causing an undetectable change or error in the outcome of an election.

Just like your organization, having accurate data and computing infrastructure that doesn’t work against your goals is key here. When hardware and software becomes out of date, not only do you deal with the same quirks and problems that were baked in from the beginning, but you also deal with new problems and unreliability. When your data is at stake, this can be a major issue.

If your business has embraced digital filing (which we highly recommend), imagine putting the integrity of your data at risk by using an old computer. While going back to physical paper documents might be a solution, it will cost your business a lot of time and effort to accommodate, when compared to the cost of upgrading your IT. What are your thoughts? Leave them in the comments section below.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 20 April 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Hackers Business Computing Internet Malware Software Google Business Management Network Security Microsoft Windows 10 Computer User Tips Backup Hosted Solutions Innovation Productivity Business Productivity Apps Email Windows Efficiency Mobile Devices Hardware Smartphone Cybersecurity Cybercrime Operating System Disaster Recovery Virtualization Browser Law Enforcement Managed IT Services IT Support Small Business Business Continuity Ransomware VoIP Data Security Android Phishing Server Microsoft Office Internet of Things communications Chrome Money Mobility Mobile Device Management Telephone Systems Data Backup Miscellaneous Passwords Office 365 Holiday Smartphones Quick Tips IT Services Tech Term Saving Money Wi-Fi Update Communication Collaboration Password Best Practice Health Unsupported Software Information Technology Risk Management Workplace Tips Social Gadgets Outsourced IT App Government Google Drive Cloud Computing Data Recovery Vulnerability Application Wireless Hacking Two-factor Authentication Work/Life Balance Save Money Computers Managed Service Provider Antivirus Office tips USB Alert User Error IT Support Politics Managed IT Upgrade Data Management Social Media Spam Facebook Windows 10 Data BDR Current Events Shortcut Identity Theft Audit Encryption Cost Management VPN Humor Telephony Computer Care Going Green Cortana Apple Remote Computing Proactive IT eWaste iPhone WiFi Office Fraud Streaming Media Network Social Engineering Bandwidth Artificial Intelligence Cleaning Patch Management Legal Television Search The Internet of Things Battery Flexibility Users Save Time Excel Employer-Employee Relationship History Commerce Meetings End of Support Private Cloud Sports Automobile Recovery Mobile Security Hosted Solution HaaS Mobile Computing DDoS Blockchain Data Storage Google Docs Automation Tech Support Personal Information OneNote Samsung Transportation Internet Exlporer Data Protection Managed IT Services Wireless Technology Language File Sharing Touchscreen Robot Books Benefits IT Management Touchpad Settings Licensing Company Culture Device Security Gmail Storage PDF Electronic Medical Records Smart Technology FAQ Wearable Technology Computer Fan IT Solutions Instant Messaging Travel Devices Virus Text Messaging Emails Safety Operating Sysytem Uninterrupted Power Supply Charger WannaCry Managing Stress Tablets Budget Spyware Proactive Legislation Webinar Avoiding Downtime Virtual Reality Wireless Charging Running Cable Video Games WIndows Server 2008 NFL SharePoint Chromecast Entertainment Websites Comparison IT solutions Scam Education Data Breach Nanotechnology Edge Word Mobile Device Data Theft Specifications Windows 10s Outlook Employer Employee Relationship Evernote Root Cause Analysis Ciminal Windows Ink Teamwork Experience Computing Sales Router Solid State Drive Cast Data storage Computer Accessories Point of Sale Networking Scalability Augmented Reality Project Management Google Maps SaaS Administrator Phone System App store Retail Hard Disk Drive BYOD Hacker Sync Workers How To IT budget Data Loss Unified Threat Management Access Music Conferencing Keyboard Vendor Management Updates Trending Advertising Upgrades Analytics Identity Lithium-ion battery Gifts HBO Adobe Bluetooth Reputation Files Microsoft Word Distributed Denial of Service Identities Screen Mirroring Microsoft Excel Consultant Big Data Hiring/Firing Data Privacy Credit Cards iOS Marketing Laptop Applications Fax Server Training Worker Commute Maintenance Black Market Hard Drive Cache Relocation Remote Monitoring Emergency Monitors Worker Disaster CrashOverride

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login