ct logo wslogan

2 minutes reading time (345 words)

Security Concerns Have Led To New Voting Machines In Virginia

Security Concerns Have Led To New Voting Machines In Virginia

Regardless of your feelings on the matter, the 2016 United States presidential election was an extremely divisive one--in no small part, due to the suspicion that the outcome of the election may have been significantly influenced by hacked voting machines. This uncertainty has led to some states making strides to ensure that their technology will no longer be responsible for such doubts.

Virginia is one of those states, deciding to remove direct-recording electronic voting machines in favor of those that produce paper documentation. In addition to that, there is now legislation in Virginia that will remove all touch-screen voting devices from circulation by November 7, 2017. This is when the next governor is to be elected, along with various other positions.

According to Politico, Governor McAuliffe has pushed for legislation to provide the necessary budget to replace new voting machines, but this legislation was denied two years ago. Things have changed since then, and now the state has little choice to obtain new machines, as the old ones will no longer be certified for use.

Other states have been recommended to emulate this decision by the Board of Elections, but again--it’s only a recommendation. While paper ballots do seem to be more reliable and authentic as the tangible option, counting them can be a drag. Therefore, it only makes sense that the states would want to expedite the process with technological assistance. Even so, there is the risk that this key democratic data can be manipulated and altered.

You can find a similar scenario much closer to home, in your very own business. If your systems aren’t painstakingly maintained--as many states’ voting machines are not--they can be vulnerable to numerous hacks and other attacks. Do you really want to risk your sensitive data when a solution is so easy to find?

i-medIT’s technicians can help give you the ability to better prepare for a successful future for your business. One way is by equipping you with a Unified Threat Management tool that helps protect your business from threats before they have a chance to strike. Call 630-549-6199 for more information.



Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Cloud Business Computing Hackers Backup Microsoft Malware Innovation Email Internet Tech Term Android Mobile Devices Data Network Security Cybercrime Small Business VoIP Ransomware Smartphones Hardware Data Backup Windows Business Efficiency Software Cloud Computing Browser User Tips Smartphone How To Internet of Things Computers Cybersecurity Business Management Communication Network Communications Managed IT Services Upgrade Computer Collaboration Automation Business Continuity Artificial Intelligence Money Productivity Mobile Device Management Chrome Router Law Enforcement Data Recovery Hosted Solutions Social Engineering Social Media Saving Money Server Windows 10 Telephone Systems Data Security Vulnerability Alert Office 365 Outsourced IT Connectivity Two-factor Authentication Disaster Recovery App Save Money Managed IT Services Bring Your Own Device Safety Gadgets Phishing BDR Data Breach Spam Operating System Bandwidth Data Protection Word Microsoft Office IT Support IT Services Networking Paperless Office Identity Theft Remote Monitoring Miscellaneous Business Intelligence Managed IT Quick Tips Internet Exlporer Apps IT Management Windows 7 OneNote Update Infrastructure IT Plan Passwords Cleaning CES Sports Data storage Gmail Unsupported Software Physical Security YouTube Password Redundancy Content Management Windows 10 Government Recovery Avoiding Downtime Private Cloud Google Drive Virtualization The Internet of Things Spam Blocking Downtime Comparison Website Blockchain VPN Public Cloud Applications Productivity BYOD Facebook Wi-Fi Data Storage HVAC Online Shopping Uninterrupted Power Supply Going Green Big Data Meetings Smart Tech Voice over Internet Protocol HIPAA Reputation Windows Server 2008 Laptop Apple Mobile Device Hosted Computing eWaste Hybrid Cloud Electronic Medical Records Conferencing Data Management NarrowBand Holiday Samsung Digital Signature Virtual Assistant Workers End of Support Knowledge Cache Enterprise Content Management Telephony Evernote Files Office Tips IBM Human Resources Customer Machine Learning Credit Cards Touchpad iPhone DDoS Inventory Criminal Monitor PDF Emails HBO Millennials Office Wireless Technology Flexibility Value Solid State Drive Encryption Telephone System Botnet Internet exploMicrosoft Network Congestion Wireless Internet Hacking Marketing Settings Password Management Skype Wireless Charging Black Market History Supercomputer Data loss Devices Multi-Factor Security Staff Flash Fraud Managed Service Provider Access Control Hiring/Firing Frequently Asked Questions Workforce Relocation Audit Accountants Travel Password Manager Advertising IT Consultant Wire NIST Start Menu Cortana Tech Support Patch Management Budget Screen Mirroring Thought Leadership Trending Amazon Workplace Tips USB Root Cause Analysis Authentication Google Docs Automobile Excel Telecommuting Legal Computer Fan Business Mangement Outlook Software Tips Smart Office Charger Cryptocurrency Tools Google Apps User Error Shadow IT Scam Cast Work/Life Balance Netflix Servers Sync Amazon Web Services Health Nanotechnology Document Management Tip of the week Remote Work Chromecast Keyboard FENG Practices Recycling Humor webinar HaaS Entertainment Computer Care Windows 10s Safe Mode Employer-Employee Relationship Robot Current Events Addiction Specifications Remote Computing Worker Wireless Experience Assessment Users IT Support Benefits Rootkit Books Video Games Music Television Virtual Reality Save Time Thank You Battery Firewall Training Emergency Webinar Company Culture Scalability Wearable Technology Public Computer CrashOverride WiFi Information Technology Worker Commute Mobility Risk Management Loyalty Congratulations Education Smart Technology Content Vendor Management Search Employer Employee Relationship Bluetooth IT solutions Managing Stress Politics SaaS Computing Infrastructure Two Factor Authentication Techology Audiobook How to Twitter Computer Accessories Instant Messaging Troubleshooting Best Practice Transportation