4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Voting Machine You Use May Have Serious Security Issues

The Voting Machine You Use May Have Serious Security Issues

The ability to vote is considered one of the great rights in the world, putting one’s voice and opinion into action to shape history. However, it has been demonstrated that the electronic voting machines that some states in the U.S. use simply aren’t secure enough to ensure that the democratic process is preserved.

The issues present in voting infrastructure have been known for years. By using expensive electronic voting machines, many polling places are putting themselves in the position of being stuck with old, outdated systems without the necessary funds to replace them. In fact, it was predicted that 43 states would use ten-year-old electronic voting machines, an age that is uncomfortably close to the total lifespan of the machine.

This could easily result in machine crashes and failures, potentially causing votes to be lost or--with some touch-screen machines--registered for a different candidate than the voter input. Adding to this issue is the fact that, with exclusively digital voting machine, there is no way to check the results against anything else if there needs to be an audit.

This issue was only proven further during the 2017 DefCon conference, where the unprecedented Voting Village revealed what a hacker could do to an actual voting machine. This kind of activity had never been done before because, until late 2016, it had been illegal to tamper with voting machines--even if just for research purposes. Researchers discovered that there were plenty of ways to breach voting systems through both remote access and physical tampering.

Influencing an election doesn’t even necessarily require tampering with the votes themselves, either. By slowing the systems to a crawl, or simply rendering them inoperable, hackers can easily keep many people from voting.

Lawrence Norden, of the Brennan Center for Justice, argues that going low-tech is the best way to combat this kind of interference, supplemented by the use of encryption, blockchain, and other technological solutions. According to a blog post by Norden, the voting process needs to reintroduce paper.

As he says in his blog:

“Specifically, every new voting machine in the United States should have a paper record that the voter reviews, and that can be used later to check the electronic totals that are reported.

This could be a paper ballot the voter fills out before it is scanned by a machine, or a record created by the machine on which the voter makes her selections—so long as she can review that record and make changes before casting her vote.”

According to Norden, this would eliminate the risk of an undetected change or error in software causing an undetectable change or error in the outcome of an election.

Just like your organization, having accurate data and computing infrastructure that doesn’t work against your goals is key here. When hardware and software becomes out of date, not only do you deal with the same quirks and problems that were baked in from the beginning, but you also deal with new problems and unreliability. When your data is at stake, this can be a major issue.

If your business has embraced digital filing (which we highly recommend), imagine putting the integrity of your data at risk by using an old computer. While going back to physical paper documents might be a solution, it will cost your business a lot of time and effort to accommodate, when compared to the cost of upgrading your IT. What are your thoughts? Leave them in the comments section below.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 22 January 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency IT Support Windows Disaster Recovery Innovation Business Continuity Hardware Workplace Tips VoIP Mobile Devices User Tips Saving Money Computer Windows 10 Miscellaneous Virtualization Upgrade Network Security Mobile Device Management Data Server Email Mobile Computing Alert communications Communication Network Save Money Microsoft Office Small Business Social Media Smartphone Quick Tips Information Technology Smartphones BYOD Going Green Mobile Office Apps Health Android Office Managed IT Services Outsourced IT Browser Operating System Gadgets Application Ransomware Chrome Tablet WiFi Mobility Holiday Firewall The Internet of Things Avoiding Downtime Productivity Disaster Managed IT Cybersecurity Data Backup Search Cybercrime History Telephone Systems Remote Computing Unified Threat Management Passwords IT Solutions Data Recovery Spam Best Practice BDR Data Management Risk Management Remote Monitoring Employer-Employee Relationship VPN Budget Apple Facebook Automation Vendor Management Marketing Hard Drives Hacking Saving Time User Error Law Enforcement Phishing Password iPhone Collaboration Customer Relationship Management Hosted Solution Computers Wireless Technology Phone System Recovery Money Big Data Content Filtering Office Tips Proactive IT Work/Life Balance Wearable Technology Lithium-ion battery Maintenance Office 365 PowerPoint Virus Telephony Current Events Printer Bring Your Own Device USB Vulnerability Analytics Encryption Gmail Router Antivirus Government Shortcut Humor Administration Social Intranet Bandwidth Printer Server Social Engineering Laptop Data Security OneNote Politics Users Personal Information Private Cloud Education Trending Windows 8 Net Neutrality Wireless Unsupported Software Tech Support Google Drive Cloud Computing SaaS Save Time Outlook Audit HaaS Point of Sale Data Protection IT COnsultant Business Intelligence App Computer Repair Cost Management Biometrics Retail Virtual Reality Samsung Wi-Fi Meetings Emergency Artificial Intelligence Applications Social Networking Efficency Instant Messaging Emails hacker HIPAA Entertainment Transportation Benefits DDoS Computer Accessories Battery Robot Computer Care Display Mouse Compliance Automobile End of Support IT Support Augmented Reality Paperless Office Windows 10 Two-factor Authentication Managing Stress Internet Exlporer Excel Network Congestion Fax Server Help Desk Internet of Things Workplace Identity Theft Streaming Media Solid State Drive Sports Travel Flexibility Uninterrupted Power Supply Redundancy online currency Data Storage Update Customer Service Microsoft Excel Dark Web Surge Protector Teamwork Safety Text Messaging Screen Mirroring Television 3D Printing Chromecast Busines Continuity How To Near Field Communication File Sharing Networking Upgrades Cast Administrator Windows 10s Training Consultant IT consulting ISP Colocation systems Nanotechnology Human Resources Running Cable The Blindside Of Hard Drive Black Market Access Tablets Hard Disk Drive Company Culture Touchscreen Reliable Computing Programming hack Blogging Root Cause Analysis HBO IT Security Uograde Images NFL best practices Bloatware Cleaning Experience Cortana Website CrashOverride IT Management Keyboard Avoid Downtime Word data breach Branding Music OneDrive Legislation Settings WIndows Server 2008 Distributed Denial of Service Hiring/Firing Amazon Data storage Windows Ink Co-managed IT risk management WIndows 7 Books Wiring Patch Management eWaste Storage Smart Technology Information Inbound Marketing Video Games Regulations Document Management Google Maps Lifestyle Data Breach Debate Advertising Ebay Commerce Regulation Value Legal Computing Cameras Touchpad Software as a Service Mobile Device User Managed Security Sync Science Scam Presentation Data Loss iOS Virtual Desktop Bluetooth Best Available Managed IT Service Adobe Managed IT Services IT Technicians Employer Employee Relationship Nokia Worker Commute Operating Sysytem Google Docs Computer Fan SharePoint PDF Twitter Files Licensing Scalability Buisness IT Budget Credit Cards Mobile IT solutions Spyware Reputation FAQ Professional Services Gift Giving Charger Microblogging Youtube Wireless Charging Shadow IT Sales Relocation WannaCry Managed Service Provder Webinar Evernote Comparison Workers IT service Specifications Updates Domains Conferencing Microsoft Word Taxes Gifts Tutorial Device Security Supercomputer Electronic Medical Records Webinar Devices