MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

The 2016 United States presidential election was an ugly one for multiple reasons--chief among them the accusation that hacked voting machines could have altered the outcome of the election significantly. Thankfully, there are steps being taken to alleviate the worries that third parties might alter the outcome of such important events.

One state that has been taking measures to keep hackers out of their affairs is Virginia, which has recently made the choice to phase out direct-recording electronic voting machines with those that can produce paper documents. Furthermore, Virginia has introduced legislation that will eliminate touch-screen voting devices by November 7th. This is the date when voters will decide on who their next governor will be, among other political positions.

Politico reports that Governor McAuliffe requested legislation which would provide funds to purchase new voting hardware, but it was initially denied. That was two years ago. Now, however, they have little choice but to upgrade away from their current systems, as the machines used currently will no longer be certified.

The Board of Elections has recommended that other states follow suit with this decision, but who can say whether they will or not? It’s easy to suggest that paper ballots retain the authenticity required of important elections, but counting paper ballots is a time-consuming process that we wouldn’t blame anyone for wanting to automate with more advanced technology. Still, the risk of using technology to do the dirty work is a risky one, as you are placed in a position where hackers can easily influence the data contained by the election system.

In a way, your business is no different. While it makes sense to have physical documents in the office for certain reasons, it makes even more sense to have these documents backed up in an online environment. Unfortunately, the same risks that plague voting systems can exist in your technological infrastructure. If the systems aren’t maintained, they could be subject to various vulnerabilities and hacking attacks. No business wants to endure one of these, especially with so much sensitive data on the line.

MERIT Solutions can equip your business with the tools you need to secure your organization’s future. We can equip your business with a Unified Threat Management tool that’s designed to augment your organization’s network security with a four-pronged defense mechanism designed to prevent infections in the first place. Call us at (757) 420-5150 today to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, July 20 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Business Computing Network Security Hackers Malware Software Productivity Internet Hosted Solutions Managed IT Services Backup Business Management Mobile Devices google Computer Microsoft Business Outsourced IT Disaster Recovery Hardware communications VoIP Business Continuity IT Support Windows 10 Innovation IT Services Email User Tips Cybersecurity Efficiency Data Backup Windows Tech Term Cybercrime Internet of Things Data Recovery Small Business Apps Managed IT Server Ransomware Mobility Saving Money Mobile Device Management Law Enforcement browser Productivity Smartphone Data Operating System Office 365 Save Money Telephone Systems Android Virtualization BDR Money Passwords Smartphones Phishing Hosted Solution Quick Tips Cloud Computing Data Security IT Support Information Technology Password Recovery Holiday Network Microsoft Office Chrome BYOD Communication Automation Managed Service Provider VPN Government Collaboration Social Media Best Practice Update Two-factor Authentication Gadgets Workplace Tips Wireless Budget Data Management Vulnerability Risk Management Unsupported Software Social upgrade Data Breach Hacking Google Drive Work/Life Balance Avoiding Downtime App Cost Management Wi-Fi Alert Health Application Miscellaneous Computers Facebook History Data Protection Remote Computing Compliance Gmail Personal Information Proactive IT Blockchain Politics The Internet of Things Cleaning USB Save Time Employer-Employee Relationship Spam Social Engineering Tech Support Users Identity Theft Streaming Media Managed IT Services Artificial Intelligence Wireless Technology Flexibility Shortcut search Telephony Router Firewall Antivirus User Error Current Events Private Cloud Audit Office tips Applications HaaS End of Support Management Redundancy Travel Automobile Value Commerce Disaster IT solutions Humor Saving Time Cortana Mobile Security Patch Management Devices Windows 10 DDoS Office Computer Care Phone System Google Assistant Sports Television Legal Wireless Charging Excel Fraud Encryption Apple Data Storage Hacker Internet Exlporer Solid State Drive WiFi OneNote Big Data Networking Going Green Bandwidth iPhone Project Management eWaste Education Mobile Computing Data Loss Vendor Management SaaS Marketing Transportation MSP Google Docs Samsung Content Filtering Robot Battery Entertainment Microsoft Excel Computing Training Remote Monitoring Upgrades Electronic Medical Records IT solutions server installation dvd "cannot install required files" Gifts Monitoring stock Uninterrupted Power Supply Unified Communications Professional Services IT budget Point of Sale Laptop HIPAA File Sharing Analysis Company Culture Consultant IT Management Maintenance Safety Windows 10s Black Market tweet Financial Smart Technology Nanotechnology Touchpad Reputation Avoid Downtime Storage App store Credit Cards Financial Technology WIndows Server 2008 Device Security Hard Disk Drive Advertising Shadow IT calculator Twitter Bring Your Own Device Tablets Identities Root Cause Analysis Document Management Experience control FAQ Printing Data storage WSJ Hybrid Cloud NFL IoT Augmented Reality Business Intelligence Touchscreen Administration Video Games Chromecast Exchange Lifestyle Identity Charger Outlook Spyware Distributed Denial of Service Virtual Reality altivista Business Technology Word Language Scam Managed IT Service Music Colocation SBS Legislation Data Privacy Computer Forensics iOS Hard Drives compaq Files Wasting Money Windows Ink Employer Employee Relationship Analytics Wearable Technology Administrator Lithium-ion battery Comparison Hard Drive Evernote PowerPoint Regulation Edge Keyboard Computer Fan Instant Messaging hp Worker Commute Amazon Google Maps Virus Computer Accessories Mobile Device Screen Mirroring Relocation Access domain Specifications Chromebook Wireless Internet Sync Ciminal Dark Web Managing Stress Virtual Assistant Software as a Service Proactive Meetings Cast Books Emails Scalability remote Sales Smart Tech Workers Gamification Adobe Hiring/Firing PDF Yahoo Alexa for Business Websites Settings Running Cable How To Server 2008 Retail Connectivity Updates Memory Licensing Benefits WannaCry Text Messaging Ali Rowghani Trending Data Theft Unified Threat Management HBO Webinar Conferencing Content Filter Microsoft Word Students Mobile intranet Thank You Congratulations Emergency Worker CrashOverride Cache Monitors

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...