4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Voting Machine You Use May Have Serious Security Issues

The Voting Machine You Use May Have Serious Security Issues

The ability to vote is considered one of the great rights in the world, putting one’s voice and opinion into action to shape history. However, it has been demonstrated that the electronic voting machines that some states in the U.S. use simply aren’t secure enough to ensure that the democratic process is preserved.

The issues present in voting infrastructure have been known for years. By using expensive electronic voting machines, many polling places are putting themselves in the position of being stuck with old, outdated systems without the necessary funds to replace them. In fact, it was predicted that 43 states would use ten-year-old electronic voting machines, an age that is uncomfortably close to the total lifespan of the machine.

This could easily result in machine crashes and failures, potentially causing votes to be lost or--with some touch-screen machines--registered for a different candidate than the voter input. Adding to this issue is the fact that, with exclusively digital voting machine, there is no way to check the results against anything else if there needs to be an audit.

This issue was only proven further during the 2017 DefCon conference, where the unprecedented Voting Village revealed what a hacker could do to an actual voting machine. This kind of activity had never been done before because, until late 2016, it had been illegal to tamper with voting machines--even if just for research purposes. Researchers discovered that there were plenty of ways to breach voting systems through both remote access and physical tampering.

Influencing an election doesn’t even necessarily require tampering with the votes themselves, either. By slowing the systems to a crawl, or simply rendering them inoperable, hackers can easily keep many people from voting.

Lawrence Norden, of the Brennan Center for Justice, argues that going low-tech is the best way to combat this kind of interference, supplemented by the use of encryption, blockchain, and other technological solutions. According to a blog post by Norden, the voting process needs to reintroduce paper.

As he says in his blog:

“Specifically, every new voting machine in the United States should have a paper record that the voter reviews, and that can be used later to check the electronic totals that are reported.

This could be a paper ballot the voter fills out before it is scanned by a machine, or a record created by the machine on which the voter makes her selections—so long as she can review that record and make changes before casting her vote.”

According to Norden, this would eliminate the risk of an undetected change or error in software causing an undetectable change or error in the outcome of an election.

Just like your organization, having accurate data and computing infrastructure that doesn’t work against your goals is key here. When hardware and software becomes out of date, not only do you deal with the same quirks and problems that were baked in from the beginning, but you also deal with new problems and unreliability. When your data is at stake, this can be a major issue.

If your business has embraced digital filing (which we highly recommend), imagine putting the integrity of your data at risk by using an old computer. While going back to physical paper documents might be a solution, it will cost your business a lot of time and effort to accommodate, when compared to the cost of upgrading your IT. What are your thoughts? Leave them in the comments section below.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 19 November 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Backup Hackers Productivity Hosted Solutions Business Management Managed Service Provider Malware Google IT Services Business Efficiency Windows IT Support Disaster Recovery Innovation Business Continuity Hardware VoIP Workplace Tips User Tips Saving Money Computer Miscellaneous Virtualization Upgrade Windows 10 Mobile Devices Mobile Device Management Data Network Security Server Mobile Computing Alert Email Microsoft Office Communication Network Save Money Smartphone Quick Tips Small Business communications Smartphones BYOD Going Green Mobile Office Information Technology Social Media Apps Health Android Office Browser Application Gadgets Operating System Ransomware Chrome Managed IT Services Outsourced IT Managed IT Disaster Mobility Tablet WiFi Holiday Firewall Productivity Avoiding Downtime Remote Computing Passwords Unified Threat Management IT Solutions Cybersecurity Spam Best Practice BDR Data Management Risk Management Search Cybercrime Telephone Systems The Internet of Things Facebook Automation Vendor Management Hard Drives Hacking Saving Time History Remote Monitoring Employer-Employee Relationship VPN Budget Apple Big Data Data Backup Law Enforcement Marketing Content Filtering Office Tips Proactive IT User Error Phishing Password iPhone Customer Relationship Management Collaboration Hosted Solution Money Computers Data Recovery Wireless Technology Phone System Recovery Printer Bring Your Own Device USB Work/Life Balance Analytics Encryption Gmail Router Antivirus Office 365 Government Shortcut Humor Administration Social Wearable Technology Lithium-ion battery Maintenance PowerPoint Vulnerability Telephony Virus Current Events Data Protection Tech Support SaaS Outlook Data Security Audit HaaS Point of Sale IT COnsultant Business Intelligence App Computer Repair Politics Cost Management Personal Information Intranet Bandwidth Social Engineering Printer Server Laptop Wireless Unsupported Software OneNote Google Drive Users Cloud Computing Private Cloud Education Trending Save Time Windows 8 Net Neutrality Identity Theft Mouse Compliance Solid State Drive Sports Augmented Reality Flexibility Paperless Office Two-factor Authentication Managing Stress Network Congestion Excel Fax Server Samsung Wi-Fi Help Desk Workplace Emergency Artificial Intelligence Streaming Media Applications Travel Uninterrupted Power Supply online currency Update hacker Customer Service Biometrics Transportation Retail Virtual Reality IT Support Meetings Robot Windows 10 Computer Care Battery Social Networking Automobile Efficency End of Support Instant Messaging Emails HIPAA Entertainment Benefits Internet Exlporer DDoS Computer Accessories Data Storage Internet of Things Display Distributed Denial of Service Microsoft Excel Amazon Dark Web Co-managed IT Screen Mirroring Wiring WIndows 7 Employer Employee Relationship Worker Commute Information eWaste Operating Sysytem File Sharing Storage Inbound Marketing Cast Regulations Lifestyle PDF Debate Files Ebay Windows 10s Scalability systems Computing Nanotechnology Value Cameras Safety Text Messaging Chromecast Tablets User Hard Disk Drive How To hack Science Root Cause Analysis Upgrades HBO Presentation Virtual Desktop Bluetooth Administrator NFL Best Available best practices Training Nokia IT Technicians Colocation Cortana CrashOverride Consultant IT Management The Blindside Of SharePoint Access Word data breach Company Culture Twitter Black Market Legislation Settings Touchscreen WIndows Server 2008 IT Security Surge Protector Teamwork Windows Ink risk management Cleaning Television Experience 3D Printing Busines Continuity Patch Management Near Field Communication Keyboard Avoid Downtime Networking Google Maps Music Commerce ISP Regulation IT consulting Hiring/Firing Human Resources Running Cable Data storage Software as a Service Hard Drive Books Programming Sync Reliable Computing Blogging Smart Technology Video Games Document Management Uograde Data Loss Images iOS Data Breach Advertising Bloatware Managed IT Service Adobe Website Managed IT Services Legal Touchpad Google Docs Computer Fan Mobile Device Managed Security Branding OneDrive Licensing Scam Taxes Mobile IT solutions Supercomputer Electronic Medical Records IT service Professional Services IT Budget Domains Reputation Tutorial Buisness Shadow IT Relocation Comparison Specifications Gift Giving Youtube Microblogging Sales Managed Service Provder Webinar Webinar