MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

The 2016 United States presidential election was an ugly one for multiple reasons--chief among them the accusation that hacked voting machines could have altered the outcome of the election significantly. Thankfully, there are steps being taken to alleviate the worries that third parties might alter the outcome of such important events.

One state that has been taking measures to keep hackers out of their affairs is Virginia, which has recently made the choice to phase out direct-recording electronic voting machines with those that can produce paper documents. Furthermore, Virginia has introduced legislation that will eliminate touch-screen voting devices by November 7th. This is the date when voters will decide on who their next governor will be, among other political positions.

Politico reports that Governor McAuliffe requested legislation which would provide funds to purchase new voting hardware, but it was initially denied. That was two years ago. Now, however, they have little choice but to upgrade away from their current systems, as the machines used currently will no longer be certified.

The Board of Elections has recommended that other states follow suit with this decision, but who can say whether they will or not? It’s easy to suggest that paper ballots retain the authenticity required of important elections, but counting paper ballots is a time-consuming process that we wouldn’t blame anyone for wanting to automate with more advanced technology. Still, the risk of using technology to do the dirty work is a risky one, as you are placed in a position where hackers can easily influence the data contained by the election system.

In a way, your business is no different. While it makes sense to have physical documents in the office for certain reasons, it makes even more sense to have these documents backed up in an online environment. Unfortunately, the same risks that plague voting systems can exist in your technological infrastructure. If the systems aren’t maintained, they could be subject to various vulnerabilities and hacking attacks. No business wants to endure one of these, especially with so much sensitive data on the line.

MERIT Solutions can equip your business with the tools you need to secure your organization’s future. We can equip your business with a Unified Threat Management tool that’s designed to augment your organization’s network security with a four-pronged defense mechanism designed to prevent infections in the first place. Call us at (757) 420-5150 today to learn more. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 16 January 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Business Computing Hackers Malware Software Network Security Hosted Solutions Backup Internet google Productivity Computer Managed IT Services Microsoft Disaster Recovery Business Continuity IT Support Outsourced IT User Tips Business Windows 10 Mobile Devices VoIP IT Services Email Business Management Hardware communications Innovation Productivity Data Backup Mobility Windows Managed IT Efficiency Smartphone Cybersecurity Cybercrime Mobile Device Management Server Ransomware Apps Save Money Saving Money Data Recovery Telephone Systems Small Business Law Enforcement Operating System Hosted Solution Quick Tips Android browser Virtualization Money Information Technology Chrome Recovery VPN Office 365 Microsoft Office Passwords BYOD Data Password BDR Holiday Computers Unsupported Software Cloud Computing Social Media Social upgrade Work/Life Balance App Budget Smartphones Communication Data Management Facebook Government Google Drive Hacking Phishing Avoiding Downtime Wireless Gadgets Alert Health Miscellaneous Managed Service Provider Risk Management Office tips Applications Private Cloud History Identity Theft Proactive IT Data Security Best Practice Shortcut The Internet of Things search Wi-Fi Collaboration IT Support Firewall Application Current Events Audit User Error Windows 10 Personal Information Wireless Technology Vulnerability Politics Two-factor Authentication Automation Telephony Managed IT Services USB Save Time Workplace Tips Robot Television Users Encryption End of Support Social Engineering Remote Computing Streaming Media Apple Marketing Artificial Intelligence Flexibility Internet of Things Google Docs WiFi Cost Management Humor Going Green Disaster Bandwidth Data Protection SaaS Employer-Employee Relationship Redundancy Antivirus Samsung Commerce Content Filtering Network Sports Battery HaaS Cortana Compliance Hacker Solid State Drive Internet Exlporer Gmail Automobile Spam Update Excel iPhone Saving Time Data Storage Cleaning IT solutions Mobile Computing Transportation Office Computer Care OneNote Phone System DDoS Data Breach Networking Sync Exchange Scam Dark Web Meetings Music Legal Distributed Denial of Service Software as a Service altivista Sales Cast Emails Workers Adobe SBS Employer Employee Relationship compaq Settings Analytics Laptop Uninterrupted Power Supply Data Loss Retail Keyboard Instant Messaging Worker Commute Updates Wearable Technology Licensing Computer Accessories WannaCry hp Mobile Device Big Data Touchpad Conferencing HBO Webinar Reputation Managing Stress Advertising Microsoft Word Mobile domain Books Scalability Microsoft Excel Gifts Hiring/Firing IT solutions Education Data storage Router Professional Services remote Vendor Management Yahoo How To eWaste File Sharing Chromecast IT Management Maintenance Benefits Windows 10s Administration Running Cable Travel Server 2008 Nanotechnology Ali Rowghani Unified Threat Management Storage Trending Credit Cards WIndows Server 2008 Hard Disk Drive Colocation Hard Drives Entertainment Tech Support Tablets Training Root Cause Analysis Upgrades Electronic Medical Records Files Administrator FAQ Lithium-ion battery Patch Management Point of Sale HIPAA NFL server installation dvd "cannot install required files" Company Culture Augmented Reality stock Consultant Business Intelligence Touchscreen Black Market Lifestyle Access Charger Outlook Smart Technology Relocation Avoid Downtime Word Value Legislation tweet Managed IT Service Shadow IT Wireless Charging iOS Document Management PDF Experience Windows Ink calculator Comparison Twitter Evernote Regulation control Computer Fan Text Messaging Video Games Google Maps Specifications WSJ Screen Mirroring Virtual Reality Cache Monitors Remote Monitoring Thank You Safety Congratulations Emergency CrashOverride Worker

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...