MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

The 2016 United States presidential election was an ugly one for multiple reasons--chief among them the accusation that hacked voting machines could have altered the outcome of the election significantly. Thankfully, there are steps being taken to alleviate the worries that third parties might alter the outcome of such important events.

One state that has been taking measures to keep hackers out of their affairs is Virginia, which has recently made the choice to phase out direct-recording electronic voting machines with those that can produce paper documents. Furthermore, Virginia has introduced legislation that will eliminate touch-screen voting devices by November 7th. This is the date when voters will decide on who their next governor will be, among other political positions.

Politico reports that Governor McAuliffe requested legislation which would provide funds to purchase new voting hardware, but it was initially denied. That was two years ago. Now, however, they have little choice but to upgrade away from their current systems, as the machines used currently will no longer be certified.

The Board of Elections has recommended that other states follow suit with this decision, but who can say whether they will or not? It’s easy to suggest that paper ballots retain the authenticity required of important elections, but counting paper ballots is a time-consuming process that we wouldn’t blame anyone for wanting to automate with more advanced technology. Still, the risk of using technology to do the dirty work is a risky one, as you are placed in a position where hackers can easily influence the data contained by the election system.

In a way, your business is no different. While it makes sense to have physical documents in the office for certain reasons, it makes even more sense to have these documents backed up in an online environment. Unfortunately, the same risks that plague voting systems can exist in your technological infrastructure. If the systems aren’t maintained, they could be subject to various vulnerabilities and hacking attacks. No business wants to endure one of these, especially with so much sensitive data on the line.

MERIT Solutions can equip your business with the tools you need to secure your organization’s future. We can equip your business with a Unified Threat Management tool that’s designed to augment your organization’s network security with a four-pronged defense mechanism designed to prevent infections in the first place. Call us at (757) 420-5150 today to learn more. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 23 October 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Business Computing Privacy Best Practices Hackers Malware Software Hosted Solutions Backup Network Security google Internet Computer Disaster Recovery Business Continuity Productivity Microsoft Windows 10 Business Managed IT Services VoIP IT Services Innovation IT Support Hardware Mobile Devices Outsourced IT User Tips communications Business Management Ransomware Efficiency Mobility Email Windows Productivity Mobile Device Management Telephone Systems Save Money Smartphone Managed IT Cybercrime Saving Money Server Law Enforcement Cybersecurity Apps Hosted Solution Quick Tips Android Operating System Virtualization BDR Data Backup Money Passwords browser Information Technology Password Small Business Recovery Chrome Microsoft Office BYOD Data VPN Miscellaneous Managed Service Provider Computers Unsupported Software Budget Data Management Data Recovery upgrade Social Office 365 Communication Hacking Avoiding Downtime Wireless Facebook Health Government Risk Management Office tips Applications Data Security Private Cloud Cloud Computing Proactive IT Gadgets Social Media Workplace Tips Shortcut Work/Life Balance Wi-Fi Smartphones Firewall Application Current Events Audit search App Google Drive Automation Telephony USB Alert Save Time Computer Care Phone System Robot Gmail Encryption History Users Remote Computing Identity Theft End of Support Update IT solutions Best Practice Internet of Things Flexibility DDoS The Internet of Things IT Support Holiday Cost Management Humor Disaster Television Employer-Employee Relationship Social Engineering Samsung Streaming Media Antivirus Apple Network Windows 10 Battery WiFi HaaS Spam Going Green Hacker Compliance Solid State Drive Internet Exlporer Phishing Bandwidth Personal Information Wireless Technology Automobile Data Storage Politics Managed IT Services iPhone Saving Time User Error Cleaning Mobile Computing Office Transportation Text Messaging Cast Emails Video Games Virtual Reality server installation dvd "cannot install required files" Adobe Scam Settings stock Data Loss Music Marketing Legal Licensing Google Docs Employer Employee Relationship tweet Laptop HBO Analytics Uninterrupted Power Supply Webinar Instant Messaging calculator Mobile Keyboard Computer Accessories Worker Commute Twitter Artificial Intelligence control Mobile Device Touchpad Data Protection Big Data IT solutions Collaboration Managing Stress Reputation Professional Services WSJ Advertising Exchange IT Management Books Windows 10s Scalability Nanotechnology Distributed Denial of Service Education altivista Travel Hiring/Firing Vendor Management Data storage Commerce Router SBS SaaS WIndows Server 2008 Hard Disk Drive How To Root Cause Analysis compaq Administration Tablets Benefits Chromecast Unified Threat Management Patch Management Content Filtering Sports Wearable Technology Augmented Reality hp Colocation NFL Hard Drives Training Business Intelligence Entertainment Tech Support Touchscreen domain Upgrades Outlook Electronic Medical Records Files Vulnerability Administrator Point of Sale Lithium-ion battery Word Company Culture Managed IT Service HIPAA remote Consultant Excel iOS Black Market Smart Technology Access eWaste Yahoo Relocation Windows Ink Value Avoid Downtime Shadow IT Server 2008 Two-factor Authentication Regulation Computer Fan Running Cable OneNote Document Management Ali Rowghani Google Maps PDF Screen Mirroring Trending Experience Data Breach Sync Dark Web Meetings Worker Thank You WannaCry Cache Congratulations Monitors Microsoft Excel Remote Monitoring File Sharing Storage Safety CrashOverride Emergency Software as a Service

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...