4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

The 2016 United States presidential election was an ugly one for multiple reasons--chief among them the accusation that hacked voting machines could have altered the outcome of the election significantly. Thankfully, there are steps being taken to alleviate the worries that third parties might alter the outcome of such important events.

One state that has been taking measures to keep hackers out of their affairs is Virginia, which has recently made the choice to phase out direct-recording electronic voting machines with those that can produce paper documents. Furthermore, Virginia has introduced legislation that will eliminate touch-screen voting devices by November 7th. This is the date when voters will decide on who their next governor will be, among other political positions.

Politico reports that Governor McAuliffe requested legislation which would provide funds to purchase new voting hardware, but it was initially denied. That was two years ago. Now, however, they have little choice but to upgrade away from their current systems, as the machines used currently will no longer be certified.

The Board of Elections has recommended that other states follow suit with this decision, but who can say whether they will or not? It’s easy to suggest that paper ballots retain the authenticity required of important elections, but counting paper ballots is a time-consuming process that we wouldn’t blame anyone for wanting to automate with more advanced technology. Still, the risk of using technology to do the dirty work is a risky one, as you are placed in a position where hackers can easily influence the data contained by the election system.

In a way, your business is no different. While it makes sense to have physical documents in the office for certain reasons, it makes even more sense to have these documents backed up in an online environment. Unfortunately, the same risks that plague voting systems can exist in your technological infrastructure. If the systems aren’t maintained, they could be subject to various vulnerabilities and hacking attacks. No business wants to endure one of these, especially with so much sensitive data on the line.

4IT can equip your business with the tools you need to secure your organization’s future. We can equip your business with a Unified Threat Management tool that’s designed to augment your organization’s network security with a four-pronged defense mechanism designed to prevent infections in the first place. Call us at 305-278-7100 today to learn more.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 17 March 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Internet software Business Computing Business Management Hackers Backup Productivity Hosted Solutions Malware Managed Service Provider Google IT Services Business Efficiency Windows IT Support Disaster Recovery Innovation Hardware VoIP Business Continuity Mobile Devices Network Security User Tips Workplace Tips Computer Saving Money Miscellaneous Windows 10 Virtualization Upgrade Mobile Device Management Data Server Email communications Alert Mobile Computing Small Business Communication Save Money Microsoft Office Network Smartphones Smartphone Managed IT Services Outsourced IT Quick Tips Apps Social Media Productivity BYOD Information Technology Going Green Mobile Office Browser Office Health Holiday Cybercrime Android Gadgets Managed IT Operating System Cybersecurity Chrome Application Ransomware Passwords Data Backup Disaster Firewall Best Practice Risk Management The Internet of Things Avoiding Downtime Tablet Mobility WiFi BDR Automation Search Internet of Things Collaboration Data Management Remote Computing History Unified Threat Management IT Solutions Spam Data Recovery Telephone Systems Budget Apple User Error Vendor Management Marketing Hacking VPN Wireless Technology Facebook Phishing Remote Monitoring Hard Drives Saving Time Employer-Employee Relationship Phone System Recovery Office Tips Data Security Law Enforcement Office 365 iPhone Customer Relationship Management Big Data Password Maintenance Hosted Solution Content Filtering Vulnerability Computers Money Proactive IT Government App Google Drive Intranet Bring Your Own Device Lithium-ion battery Two-factor Authentication OneNote Work/Life Balance Antivirus Current Events Humor Administration Shortcut Social Wearable Technology Printer IT Support Tech Support Social Engineering PowerPoint USB Virus Analytics Encryption Telephony Gmail Router Cloud Computing Data Breach Cost Management Save Time Bandwidth Printer Server Identity Theft Data Protection Laptop SaaS Excel Flexibility Audit Point of Sale HaaS IT COnsultant Education Trending Computer Repair Business Intelligence Net Neutrality Retail Politics Personal Information Windows 10 Outlook Users Wireless Private Cloud Unsupported Software Windows 8 Benefits End of Support Managed IT Services DDoS Google Docs Uninterrupted Power Supply Computer Accessories online currency Redundancy Data Storage Mouse Legal Compliance Internet Exlporer eWaste Network Congestion Managing Stress Solid State Drive Sports Help Desk Efficency Samsung Cortana Travel Wi-Fi Project Management Emergency Artificial Intelligence Display Update Customer Service Applications Biometrics Augmented Reality Virtual Reality Networking hacker Blockchain Paperless Office Meetings Social Networking Transportation Commerce Fax Server Emails Robot Computer Care Instant Messaging Battery Workplace Data Loss HIPAA Entertainment Streaming Media Automobile Books Adobe Device Security Smart Technology Video Games Computer Fan Twitter Document Management Branding Licensing Advertising Devices Distributed Denial of Service Microsoft Excel Surge Protector Dark Web Wiring Touchpad Mobile Device Credit Cards Television Screen Mirroring Information Managed Security WIndows 7 3D Printing Spyware Scam File Sharing Storage Debate Inbound Marketing Regulations FAQ Cast Windows 10s Fraud ISP Employer Employee Relationship systems Nanotechnology Value Cameras Operating Sysytem Charger Worker Commute Edge Tablets User PDF Hard Disk Drive Programming Blogging hack Science Scalability Root Cause Analysis Files HBO Nokia Presentation IT Budget Wireless Charging Virtual Desktop Ciminal Bluetooth Safety NFL Best Available Text Messaging best practices Chromecast Website IT Technicians How To CrashOverride IT Management Upgrades WannaCry SharePoint Word data breach Administrator OneDrive Training Legislation Settings WIndows Server 2008 Colocation Amazon Consultant Evernote MSP Co-managed IT Teamwork The Blindside Of Windows Ink risk management Busines Continuity Access Company Culture Comparison Black Market Patch Management Near Field Communication Touchscreen Workers IT Security Google Maps Lifestyle Hard Drive Ebay Cleaning Specifications Human Resources Experience Regulation IT consulting Computing Updates Identities Running Cable Keyboard Software as a Service Avoid Downtime Images Conferencing Uograde Music Sync Reliable Computing Microsoft Word IoT Hiring/Firing iOS Sales Data storage Gifts Bloatware Managed IT Service Managed Service Provder Language Webinar Webinar Tech Term Mobile IT solutions Proactive Taxes IT service Professional Services Websites Gift Giving Supercomputer Domains Electronic Medical Records Reputation Buisness Shadow IT Relocation Microblogging Youtube Tutorial