253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Outdated Software Puts Voters Personal Information at Risk

Outdated Software Puts Voters Personal Information at Risk

As the U.S. election rapidly approaches, many citizens are strongly concerned with who they’ll vote for. Unfortunately, not enough of these same citizens are nearly as concerned with what they’ll vote on, as the electronic voting machines utilized in many polling places are notoriously insecure to breaches.

While most of the country doesn’t actually utilize these machines (¾ of American voters use paper ballots to elect the new President) there are some states who use these electronic machines exclusively: Delaware, Georgia, Louisiana, New Jersey and South Carolina. Because of this, there’s still a chance that these flawed machines could negatively influence an election. The way we see it, businesses could learn some valuable cybersecurity lessons from this major electoral oversight.

It is a matter of common sense that older operating systems will be vulnerable to more recent threats, even without the knowledge that developers eventually stop producing security patches to better protect the outdated OS after a period of time.

Knowing this, however, only makes it worse to know that the majority of electronic voting machines currently run Windows XP, which hasn’t received a patch since 2014. That makes three years of threats evolving and improving while these voting machines have gone without a single security update. This means that there is a potential for serious tampering to occur, potentially keeping citizens from being able to vote.

Furthermore, many of these machines have not been replaced in years, despite newer and more secure models becoming available. This is in part due to a lack of financial resources in most areas, and in part due to legislative pushback against spending money to replace a machine that has yet to completely fail.

These issues reinforce the importance of maintaining up-to-date solutions, as well as updating and maintaining equipment proactively rather than subscribing to a problematic break-fix model.

Fortunately for the American voter, there are resources in place for those who are concerned for the sanctity and efficacy of their vote. The Verified Voting Foundation, devoted to “safeguarding elections in the digital age,” has an online map resource that breaks down into counties and describes what devices they utilize in counting votes. However, there is little indication of when the website was last updated beyond the copyright information at the bottom of the page, which says 2014. Therefore, the website may not be fully up-to-date, so it is better used as a guideline, rather than gospel.

Despite the presumed budgetary benefits of waiting to replace equipment only when absolutely necessary, a break/fix approach will ultimately cause an administrator more issues and wind up costing more in the long run. On the other hand, a managed service approach allows for a stable, budgetable cost for IT services with reduced downtime, maintained solutions and systems, and an overall more pleasant and productive experience. If you’re interested in implementing a managed solution to your company’s IT, as American polling places clearly should, contact Graemouse Technologies for more information.

Save Considerable Time By Automating Your Data Bac...
Tip of the Week: 4 Tools that Provide Your Employe...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 22 July 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Privacy Innovation Small Business Business Computing Backup Google Efficiency Malware Alert Software Smartphones Hardware Managed IT Services Ransomware Hackers Social Media Internet Microsoft Law Enforcement Windows 10 Social Engineering Saving Money Productivity App Email Computers Operating System Business Management Private Cloud How To Public Cloud Hosted Solutions Cybercrime Google Drive Data Data Breach Server Cast Networking Wi-Fi Emails Computer Fan Bring Your Own Device Network Security Office Quick Tips Data Storage Computer Supercomputer Internet Exlporer Netflix Relocation FENG Telephone Systems Facebook Apple IT Management IBM BDR End of Support Productivity IT Support Humor Windows 10 iPhone IT Plan Spam Current Events Internet exploMicrosoft OneNote Save Money Flexibility Unsupported Software Budget Knowledge Advertising Settings Downtime User Tips Windows Automation Software Tips Network Congestion Managed Service Provider Root Cause Analysis Cybersecurity Android Health BYOD Business IT Consultant Gadgets Spam Blocking Meetings Samsung Files Mobile Device Management Leadership Hybrid Cloud Windows 10s Data Backup Chrome History Safety Phishing Vulnerability Outsourced IT Network Hiring/Firing Business Continuity Data loss The Internet of Things Money Browser webinar Solid State Drive Passwords Managed IT Services Router Employer-Employee Relationship Government Screen Mirroring Upgrade Bandwidth User Error Miscellaneous Conferencing Audit Marketing Collaboration

Blog Archive

Newsletter Sign Up