MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Voting Machine You Use May Have Serious Security Issues

The Voting Machine You Use May Have Serious Security Issues

The ability to vote is considered one of the great rights in the world, putting one’s voice and opinion into action to shape history. However, it has been demonstrated that the electronic voting machines that some states in the U.S. use simply aren’t secure enough to ensure that the democratic process is preserved.

The issues present in voting infrastructure have been known for years. By using expensive electronic voting machines, many polling places are putting themselves in the position of being stuck with old, outdated systems without the necessary funds to replace them. In fact, it was predicted that 43 states would use ten-year-old electronic voting machines, an age that is uncomfortably close to the total lifespan of the machine.

This could easily result in machine crashes and failures, potentially causing votes to be lost or--with some touch-screen machines--registered for a different candidate than the voter input. Adding to this issue is the fact that, with exclusively digital voting machine, there is no way to check the results against anything else if there needs to be an audit.

This issue was only proven further during the 2017 DefCon conference, where the unprecedented Voting Village revealed what a hacker could do to an actual voting machine. This kind of activity had never been done before because, until late 2016, it had been illegal to tamper with voting machines--even if just for research purposes. Researchers discovered that there were plenty of ways to breach voting systems through both remote access and physical tampering.

Influencing an election doesn’t even necessarily require tampering with the votes themselves, either. By slowing the systems to a crawl, or simply rendering them inoperable, hackers can easily keep many people from voting.

Lawrence Norden, of the Brennan Center for Justice, argues that going low-tech is the best way to combat this kind of interference, supplemented by the use of encryption, blockchain, and other technological solutions. According to a blog post by Norden, the voting process needs to reintroduce paper.

As he says in his blog:

“Specifically, every new voting machine in the United States should have a paper record that the voter reviews, and that can be used later to check the electronic totals that are reported.

This could be a paper ballot the voter fills out before it is scanned by a machine, or a record created by the machine on which the voter makes her selections—so long as she can review that record and make changes before casting her vote.”

According to Norden, this would eliminate the risk of an undetected change or error in software causing an undetectable change or error in the outcome of an election.

Just like your organization, having accurate data and computing infrastructure that doesn’t work against your goals is key here. When hardware and software becomes out of date, not only do you deal with the same quirks and problems that were baked in from the beginning, but you also deal with new problems and unreliability. When your data is at stake, this can be a major issue.

If your business has embraced digital filing (which we highly recommend), imagine putting the integrity of your data at risk by using an old computer. While going back to physical paper documents might be a solution, it will cost your business a lot of time and effort to accommodate, when compared to the cost of upgrading your IT. What are your thoughts? Leave them in the comments section below.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, June 22 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Business Computing Network Security Hackers Malware Software Productivity Internet Hosted Solutions Backup Business Management google Managed IT Services Computer Mobile Devices Outsourced IT Microsoft Disaster Recovery communications Business VoIP Business Continuity Windows 10 IT Support Hardware Innovation Cybersecurity Email User Tips IT Services Data Backup Efficiency Cybercrime Windows Managed IT Small Business Mobility Data Recovery Apps Server Ransomware Tech Term Saving Money Mobile Device Management browser Data Smartphone Productivity Law Enforcement Operating System Internet of Things Telephone Systems Android Virtualization Office 365 BDR Save Money Smartphones Cloud Computing Passwords Hosted Solution Quick Tips Phishing Money Data Security Recovery Microsoft Office Password Holiday BYOD Automation Managed Service Provider Chrome Communication Information Technology VPN Government Data Management Network Collaboration Update Work/Life Balance IT Support Gadgets Cost Management Wi-Fi Application Google Drive Hacking Avoiding Downtime Alert Vulnerability Health Social Miscellaneous upgrade Computers Two-factor Authentication App Data Breach Wireless Social Media Best Practice Risk Management Budget Unsupported Software Facebook Identity Theft Employer-Employee Relationship Gmail Artificial Intelligence Data Protection Flexibility Tech Support Shortcut Workplace Tips Wireless Technology Firewall Antivirus Current Events Social Engineering Telephony Audit Streaming Media Spam Compliance Personal Information Office tips Applications Private Cloud Managed IT Services Politics History search Remote Computing Proactive IT Cleaning USB Save Time The Internet of Things User Error Users Encryption Google Docs Sports Big Data IT solutions Redundancy Hacker Education Solid State Drive Internet Exlporer Vendor Management DDoS Router Management Commerce Blockchain SaaS Samsung Cortana Patch Management Windows 10 Content Filtering Television iPhone Battery Mobile Security HaaS Mobile Computing Devices Apple Transportation Google Assistant WiFi Excel Robot Wireless Charging Automobile Fraud Value Going Green Data Storage End of Support Bandwidth OneNote Saving Time eWaste Office Computer Care Phone System Data Loss Humor Disaster Project Management Marketing Legal Updates Licensing Data storage Websites WannaCry Employer Employee Relationship Connectivity server installation dvd "cannot install required files" HBO Chromecast MSP Webinar Analytics Conferencing Administration Memory stock Instant Messaging Microsoft Word Mobile Data Theft Keyboard Computer Accessories Worker Commute Microsoft Excel Content Filter Remote Monitoring intranet Mobile Device IT solutions Gifts Colocation Students tweet Managing Stress Hard Drives Professional Services Computing File Sharing Monitoring calculator Files IT Management Administrator IT budget Windows 10s Lithium-ion battery Books Scalability Unified Communications Twitter Travel Analysis control Nanotechnology Hiring/Firing Storage Maintenance WIndows Server 2008 Access Hard Disk Drive How To Credit Cards Relocation Financial WSJ Tablets App store Exchange Root Cause Analysis Benefits Distributed Denial of Service Financial Technology altivista Device Security Identities Unified Threat Management FAQ PDF NFL SBS Augmented Reality Training Touchscreen Entertainment Lifestyle Printing compaq Business Intelligence Outlook IoT Upgrades Electronic Medical Records Charger Point of Sale Text Messaging Wearable Technology Word Identity Spyware Company Culture HIPAA Legislation hp Managed IT Service Language Consultant iOS Safety Black Market Windows Ink Data Privacy domain Smart Technology Avoid Downtime Comparison Computer Forensics Regulation Computer Fan Shadow IT Evernote Document Management Google Maps Laptop Hard Drive remote Uninterrupted Power Supply Edge Experience Specifications PowerPoint Yahoo Screen Mirroring Networking Sync Virus Dark Web Running Cable Software as a Service Touchpad Chromebook Server 2008 Meetings Cast Ciminal Emails Video Games Sales Reputation Wireless Internet Ali Rowghani Workers Advertising Adobe Proactive Trending Virtual Reality Smart Tech Settings Scam Music Retail Gamification Cache Thank You Monitors Congratulations CrashOverride Emergency Worker

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...