4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

The 2016 United States presidential election was an ugly one for multiple reasons--chief among them the accusation that hacked voting machines could have altered the outcome of the election significantly. Thankfully, there are steps being taken to alleviate the worries that third parties might alter the outcome of such important events.

One state that has been taking measures to keep hackers out of their affairs is Virginia, which has recently made the choice to phase out direct-recording electronic voting machines with those that can produce paper documents. Furthermore, Virginia has introduced legislation that will eliminate touch-screen voting devices by November 7th. This is the date when voters will decide on who their next governor will be, among other political positions.

Politico reports that Governor McAuliffe requested legislation which would provide funds to purchase new voting hardware, but it was initially denied. That was two years ago. Now, however, they have little choice but to upgrade away from their current systems, as the machines used currently will no longer be certified.

The Board of Elections has recommended that other states follow suit with this decision, but who can say whether they will or not? It’s easy to suggest that paper ballots retain the authenticity required of important elections, but counting paper ballots is a time-consuming process that we wouldn’t blame anyone for wanting to automate with more advanced technology. Still, the risk of using technology to do the dirty work is a risky one, as you are placed in a position where hackers can easily influence the data contained by the election system.

In a way, your business is no different. While it makes sense to have physical documents in the office for certain reasons, it makes even more sense to have these documents backed up in an online environment. Unfortunately, the same risks that plague voting systems can exist in your technological infrastructure. If the systems aren’t maintained, they could be subject to various vulnerabilities and hacking attacks. No business wants to endure one of these, especially with so much sensitive data on the line.

4IT can equip your business with the tools you need to secure your organization’s future. We can equip your business with a Unified Threat Management tool that’s designed to augment your organization’s network security with a four-pronged defense mechanism designed to prevent infections in the first place. Call us at 305-278-7100 today to learn more.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 15 December 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Backup Hackers Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows IT Support Innovation Disaster Recovery Business Continuity Hardware Workplace Tips VoIP User Tips Saving Money Computer Virtualization Upgrade Windows 10 Miscellaneous Mobile Device Management Mobile Devices Data Server Network Security Mobile Computing Email Alert Save Money Microsoft Office Communication Network Quick Tips communications Small Business Smartphone BYOD Going Green Mobile Office Social Media Smartphones Information Technology Android Office Apps Health Chrome Application Ransomware Managed IT Services Browser Outsourced IT Gadgets Operating System Firewall Avoiding Downtime Disaster Tablet Productivity Managed IT WiFi Mobility Holiday Cybercrime The Internet of Things Remote Computing Telephone Systems Unified Threat Management Risk Management IT Solutions Spam BDR Cybersecurity Search Best Practice Data Management Passwords VPN Vendor Management Facebook Employer-Employee Relationship Budget Hard Drives History Remote Monitoring Automation Saving Time Hacking Apple Wireless Technology Password Marketing Money Hosted Solution Computers Big Data Data Backup Phone System Content Filtering Recovery iPhone Customer Relationship Management Proactive IT Law Enforcement Office Tips User Error Collaboration Data Recovery Phishing Current Events Telephony Humor Printer Administration USB Wearable Technology Analytics Encryption Maintenance PowerPoint Gmail Router Virus Government Work/Life Balance Office 365 Lithium-ion battery Antivirus Shortcut Social Vulnerability Bring Your Own Device Trending Education Social Engineering Net Neutrality Point of Sale Wireless IT COnsultant Unsupported Software Computer Repair Cloud Computing Google Drive Tech Support Private Cloud Save Time Data Security Outlook Data Protection App SaaS Users Cost Management Audit Windows 8 HaaS Intranet Bandwidth Printer Server Business Intelligence Laptop Politics Personal Information OneNote Network Congestion Virtual Reality Computer Care Meetings Battery Robot Help Desk Data Storage Automobile Display End of Support Emails Instant Messaging Augmented Reality HIPAA Entertainment Benefits Internet Exlporer Paperless Office DDoS Computer Accessories Internet of Things Fax Server Identity Theft Mouse Compliance Solid State Drive Workplace Flexibility Sports Social Networking Streaming Media Two-factor Authentication Managing Stress Uninterrupted Power Supply Excel online currency Samsung Wi-Fi Emergency IT Support Artificial Intelligence Travel Applications Windows 10 hacker Efficency Update Customer Service Biometrics Transportation Retail Busines Continuity Data Loss Experience iOS Keyboard Networking Managed IT Service Avoid Downtime Near Field Communication Adobe Managed IT Services Website Google Docs Music Computer Fan Hiring/Firing Human Resources IT consulting Running Cable Licensing OneDrive Data storage Amazon Nokia Microsoft Excel Books Dark Web Smart Technology Screen Mirroring Video Games Reliable Computing Co-managed IT Document Management Advertising File Sharing Data Breach Bloatware Cast Legal Lifestyle Mobile Device Windows 10s Touchpad Ebay Computing systems Managed Security Nanotechnology Scam Branding Distributed Denial of Service Tablets Hard Disk Drive hack Root Cause Analysis Employer Employee Relationship HBO WIndows 7 Hard Drive eWaste NFL Worker Commute Storage best practices Operating Sysytem Inbound Marketing PDF Regulations Cortana CrashOverride IT Management Scalability Files Uograde Twitter Images Word data breach Value Settings Text Messaging Cameras Legislation Safety WIndows Server 2008 How To User Chromecast Surge Protector Television Upgrades Windows Ink Science risk management Virtual Desktop 3D Printing Presentation Training Bluetooth Patch Management Best Available Administrator Colocation Consultant IT Technicians Google Maps The Blindside Of Commerce Wiring Company Culture SharePoint Regulation Black Market ISP Access Information Touchscreen Software as a Service IT Security Debate Cleaning Teamwork Sync Programming Blogging Relocation Gifts Redundancy Webinar Credit Cards Mobile IT solutions FAQ Professional Services Taxes Tutorial Supercomputer Electronic Medical Records Youtube IT service Microblogging IT Budget Domains Sales Reputation Comparison Managed Service Provder Webinar Specifications Gift Giving Buisness Conferencing Shadow IT