253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Outdated Software Puts Voters Personal Information at Risk

Outdated Software Puts Voters Personal Information at Risk

As the U.S. election rapidly approaches, many citizens are strongly concerned with who they’ll vote for. Unfortunately, not enough of these same citizens are nearly as concerned with what they’ll vote on, as the electronic voting machines utilized in many polling places are notoriously insecure to breaches.

While most of the country doesn’t actually utilize these machines (¾ of American voters use paper ballots to elect the new President) there are some states who use these electronic machines exclusively: Delaware, Georgia, Louisiana, New Jersey and South Carolina. Because of this, there’s still a chance that these flawed machines could negatively influence an election. The way we see it, businesses could learn some valuable cybersecurity lessons from this major electoral oversight.

It is a matter of common sense that older operating systems will be vulnerable to more recent threats, even without the knowledge that developers eventually stop producing security patches to better protect the outdated OS after a period of time.

Knowing this, however, only makes it worse to know that the majority of electronic voting machines currently run Windows XP, which hasn’t received a patch since 2014. That makes three years of threats evolving and improving while these voting machines have gone without a single security update. This means that there is a potential for serious tampering to occur, potentially keeping citizens from being able to vote.

Furthermore, many of these machines have not been replaced in years, despite newer and more secure models becoming available. This is in part due to a lack of financial resources in most areas, and in part due to legislative pushback against spending money to replace a machine that has yet to completely fail.

These issues reinforce the importance of maintaining up-to-date solutions, as well as updating and maintaining equipment proactively rather than subscribing to a problematic break-fix model.

Fortunately for the American voter, there are resources in place for those who are concerned for the sanctity and efficacy of their vote. The Verified Voting Foundation, devoted to “safeguarding elections in the digital age,” has an online map resource that breaks down into counties and describes what devices they utilize in counting votes. However, there is little indication of when the website was last updated beyond the copyright information at the bottom of the page, which says 2014. Therefore, the website may not be fully up-to-date, so it is better used as a guideline, rather than gospel.

Despite the presumed budgetary benefits of waiting to replace equipment only when absolutely necessary, a break/fix approach will ultimately cause an administrator more issues and wind up costing more in the long run. On the other hand, a managed service approach allows for a stable, budgetable cost for IT services with reduced downtime, maintained solutions and systems, and an overall more pleasant and productive experience. If you’re interested in implementing a managed solution to your company’s IT, as American polling places clearly should, contact Graemouse Technologies for more information.

Save Considerable Time By Automating Your Data Bac...
Tip of the Week: 4 Tools that Provide Your Employe...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 19 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Efficiency IT Consultant Travel History Employer-Employee Relationship Avoiding Downtime Mobile Devices Fraud Microsoft Work/Life Balance Hardware Comparison Word Safety Windows 10s FENG Internet Cast Mobile Device Management Data Tools HBO Outsourced IT Computer Fan Bring Your Own Device Social Media Law Enforcement Tip of the Week Excel Hackers Technology Vulnerability BYOD Software webinar Spam Blocking Relocation Alert Internet exploMicrosoft Backup Downtime Amazon Web Services Charger Disaster Recovery Conferencing Spam Redundancy Frequently Asked Questions Patch Management Telecommuting Windows 10 Two-factor Authentication Networking Cloud Computing Google Docs Facebook Data Breach Telephone Systems Browser Data Backup Router Computers Apple The Internet of Things Holiday Productivity Automation Private Cloud Password Manager Money App Government Communications IT Plan Flash Online Shopping Managed IT Services Sync Malware Samsung Business Computing Bandwidth Physical Security Solid State Drive Start Menu Identity Theft Email Humor Root Cause Analysis Advertising Productivity Cybersecurity How To Data Recovery Business Continuity VoIP Computer Social Engineering Save Money Managed IT Services Screen Mirroring Cortana Smartphone Telephony Apps Infrastructure Keyboard Ransomware Security Workers Innovation Windows 7 Wi-Fi Operating System Google Skype Supercomputer Emails Best Practices Network Congestion Miscellaneous Hosted Solutions Emergency Remote Monitoring Server Business Gadgets Saving Money IT Services Wireless Charging Unsupported Software Small Business Workforce Quick Tips Hiring/Firing IT Management Flexibility Artificial Intelligence Privacy Health Smartphones Credit Cards Business Intelligence Hybrid Cloud Chrome Communication Botnet IT Support Knowledge Audit Passwords Public Cloud Computer Care Update Business Management Cybercrime Upgrade Software Tips Millennials Internet Exlporer Voice over Internet Protocol Budget Value Virtualization Meetings Scam Website Data loss User Error Network Security Tip of the week Cloud Title II OneNote Google Drive Office 365 Netflix Android Windows 10 Online HaaS Current Events Collaboration Amazon User Tips iPhone Data Security Net Neutrality Recovery Outlook Files Data Storage Windows FCC Multi-Factor Security Evernote Specifications BDR End of Support Phishing

Newsletter Sign Up