MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

The 2016 United States presidential election was an ugly one for multiple reasons--chief among them the accusation that hacked voting machines could have altered the outcome of the election significantly. Thankfully, there are steps being taken to alleviate the worries that third parties might alter the outcome of such important events.

One state that has been taking measures to keep hackers out of their affairs is Virginia, which has recently made the choice to phase out direct-recording electronic voting machines with those that can produce paper documents. Furthermore, Virginia has introduced legislation that will eliminate touch-screen voting devices by November 7th. This is the date when voters will decide on who their next governor will be, among other political positions.

Politico reports that Governor McAuliffe requested legislation which would provide funds to purchase new voting hardware, but it was initially denied. That was two years ago. Now, however, they have little choice but to upgrade away from their current systems, as the machines used currently will no longer be certified.

The Board of Elections has recommended that other states follow suit with this decision, but who can say whether they will or not? It’s easy to suggest that paper ballots retain the authenticity required of important elections, but counting paper ballots is a time-consuming process that we wouldn’t blame anyone for wanting to automate with more advanced technology. Still, the risk of using technology to do the dirty work is a risky one, as you are placed in a position where hackers can easily influence the data contained by the election system.

In a way, your business is no different. While it makes sense to have physical documents in the office for certain reasons, it makes even more sense to have these documents backed up in an online environment. Unfortunately, the same risks that plague voting systems can exist in your technological infrastructure. If the systems aren’t maintained, they could be subject to various vulnerabilities and hacking attacks. No business wants to endure one of these, especially with so much sensitive data on the line.

MERIT Solutions can equip your business with the tools you need to secure your organization’s future. We can equip your business with a Unified Threat Management tool that’s designed to augment your organization’s network security with a four-pronged defense mechanism designed to prevent infections in the first place. Call us at (757) 420-5150 today to learn more. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 March 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Business Computing Hackers Network Security Malware Software Internet Hosted Solutions Backup Managed IT Services google Business Management Productivity Microsoft Disaster Recovery Computer Business IT Support communications Mobile Devices VoIP Outsourced IT Business Continuity Windows 10 User Tips Hardware Innovation Productivity IT Services Email Cybercrime Data Backup Windows Mobility Mobile Device Management Managed IT Server Small Business Efficiency browser Ransomware Apps Smartphone Cybersecurity Operating System Saving Money Telephone Systems Data Recovery Internet of Things Save Money Hosted Solution Quick Tips Passwords Android Virtualization Law Enforcement Recovery VPN Data Security Microsoft Office Office 365 BYOD Password Data Holiday BDR Money Phishing Information Technology Chrome Smartphones Data Management Wi-Fi Facebook Government Update Google Drive Hacking IT Support Avoiding Downtime Automation Gadgets Alert Wireless Health Miscellaneous Managed Service Provider Computers Risk Management Vulnerability Unsupported Software Social upgrade Best Practice Social Media Cloud Computing App Communication Work/Life Balance Budget Firewall User Error Application Antivirus Current Events Audit Wireless Technology Personal Information Collaboration Politics Two-factor Authentication Workplace Tips Telephony USB Save Time Windows 10 Office tips Social Engineering Applications Private Cloud History Spam Proactive IT Identity Theft Managed IT Services search The Internet of Things Flexibility Shortcut Data Breach Cost Management Employer-Employee Relationship SaaS Network Sports Data Loss Marketing Samsung Content Filtering Tech Support Battery Google Docs HaaS Hacker Solid State Drive Gmail Blockchain Internet Exlporer Compliance Data Protection Automobile Redundancy iPhone IT solutions Commerce DDoS Mobile Computing Transportation Saving Time Cleaning Office Cortana Robot Phone System Fraud Patch Management Television Computer Care Tech Term Remote Computing Apple Legal End of Support Streaming Media Users Encryption WiFi Excel Artificial Intelligence Data Storage Going Green Bandwidth Project Management Humor Disaster OneNote eWaste Data storage Books Networking MSP Scalability Sync Dark Web Meetings Running Cable Hiring/Firing Server 2008 Education Software as a Service Ali Rowghani Sales Router Cast Emails Administration Vendor Management Chromecast Trending Workers intranet How To Adobe Settings Benefits Retail Colocation Hard Drives Unified Threat Management Updates IT budget Licensing WannaCry Files server installation dvd "cannot install required files" Administrator stock Entertainment Conferencing Maintenance Lithium-ion battery HBO Webinar Training Upgrades Electronic Medical Records Microsoft Word Mobile Point of Sale Microsoft Excel Access tweet HIPAA Gifts Device Security IT solutions Relocation Company Culture Consultant Identities Black Market Professional Services Smart Technology calculator File Sharing Twitter Devices Avoid Downtime IT Management Windows 10s Value PDF IoT control Shadow IT Travel Nanotechnology Document Management Storage WSJ Experience Credit Cards Spyware WIndows Server 2008 Hard Disk Drive Text Messaging Language Exchange Tablets Root Cause Analysis Distributed Denial of Service altivista FAQ Video Games SBS Virtual Reality NFL Augmented Reality Business Intelligence Touchscreen Scam compaq Lifestyle Music Charger Edge Outlook Laptop Wearable Technology Virus Uninterrupted Power Supply Word Managed IT Service Employer Employee Relationship hp Legislation Analytics Wireless Charging Ciminal iOS Touchpad Keyboard Proactive domain Instant Messaging Windows Ink Reputation Computer Accessories Worker Commute Comparison Mobile Device Big Data Evernote Regulation Computer Fan Advertising Websites remote Managing Stress Google Maps Specifications Screen Mirroring Yahoo Data Theft Cache Thank You Monitors Remote Monitoring Congratulations Safety Emergency Worker CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...