Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Outdated Software Puts Voters Personal Information at Risk

Outdated Software Puts Voters Personal Information at Risk

As the U.S. election rapidly approaches, many citizens are strongly concerned with who they’ll vote for. Unfortunately, not enough of these same citizens are nearly as concerned with what they’ll vote on, as the electronic voting machines utilized in many polling places are notoriously insecure to breaches.

While most of the country doesn’t actually utilize these machines (¾ of American voters use paper ballots to elect the new President) there are some states who use these electronic machines exclusively: Delaware, Georgia, Louisiana, New Jersey and South Carolina. Because of this, there’s still a chance that these flawed machines could negatively influence an election. The way we see it, businesses could learn some valuable cybersecurity lessons from this major electoral oversight.

It is a matter of common sense that older operating systems will be vulnerable to more recent threats, even without the knowledge that developers eventually stop producing security patches to better protect the outdated OS after a period of time.

Knowing this, however, only makes it worse to know that the majority of electronic voting machines currently run Windows XP, which hasn’t received a patch since 2014. That makes three years of threats evolving and improving while these voting machines have gone without a single security update. This means that there is a potential for serious tampering to occur, potentially keeping citizens from being able to vote.

Furthermore, many of these machines have not been replaced in years, despite newer and more secure models becoming available. This is in part due to a lack of financial resources in most areas, and in part due to legislative pushback against spending money to replace a machine that has yet to completely fail.

These issues reinforce the importance of maintaining up-to-date solutions, as well as updating and maintaining equipment proactively rather than subscribing to a problematic break-fix model.

Fortunately for the American voter, there are resources in place for those who are concerned for the sanctity and efficacy of their vote. The Verified Voting Foundation, devoted to “safeguarding elections in the digital age,” has an online map resource that breaks down into counties and describes what devices they utilize in counting votes. However, there is little indication of when the website was last updated beyond the copyright information at the bottom of the page, which says 2014. Therefore, the website may not be fully up-to-date, so it is better used as a guideline, rather than gospel.

Despite the presumed budgetary benefits of waiting to replace equipment only when absolutely necessary, a break/fix approach will ultimately cause an administrator more issues and wind up costing more in the long run. On the other hand, a managed service approach allows for a stable, budgetable cost for IT services with reduced downtime, maintained solutions and systems, and an overall more pleasant and productive experience. If you’re interested in implementing a managed solution to your company’s IT, as American polling places clearly should, contact Total Tech Care for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Google Business Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Small Business Network Browser Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Upgrade Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Office Data Recovery Server Save Money Passwords Windows 10 Virtualization Tech Term Saving Money Holiday Social Media Gadgets Chrome Automation Managed IT Services Microsoft Office Managed Service Computers Facebook Cybercrime Operating System Artificial Intelligence BYOD Mobile Device Management Networking IT Support Health Internet of Things Hacking Wi-Fi Office 365 Telephone Systems Remote Information Technology Covid-19 Managed Service Provider Alert Information Spam Router Bandwidth Recovery Employer-Employee Relationship BDR Social Engineering Mobility Money Mobile Computing App Encryption History Applications Application Law Enforcement Human Resources Data Breach Big Data Remote Monitoring Password Apps How To Office Tips Training VPN Data Storage Government Patch Management Blockchain Private Cloud Paperless Office Remote Computing Managed IT Mobile Office Voice over Internet Protocol Data Security Flexibility Marketing WiFi IT solutions Wireless Entertainment Website Google Drive Budget Gmail Settings Vulnerability Avoiding Downtime Windows 7 Word Two-factor Authentication Servers Mouse HaaS Bring Your Own Device Data Management Work/Life Balance Infrastructure Risk Management End of Support Hacker Education Physical Security Safety Data Protection The Internet of Things Sports USB HIPAA Lithium-ion battery Redundancy Vendor Keyboard Managed Services Conferencing Display Firewall Scam Virtual Reality Employee/Employer Relationship Apple RMM Telephone System Staff Software as a Service Save Time Vendor Management Machine Learning Social Remote Work Connectivity User Error Meetings Cleaning Computer Accessories Hard Drives Current Events Retail Instant Messaging Telephony Samsung Robot Excel Battery Procurement Augmented Reality Shadow IT Fraud Biometrics Workplace Strategy Net Neutrality Legal Value Virtual Desktop Printer Remote Worker Help Desk Internet Exlporer Bluetooth Printing Spam Blocking Electronic Medical Records Cryptocurrency DDoS SharePoint PDF Hiring/Firing Managed Services Provider Comparison Proactive IT IT Consultant Database CES Customer Service Environment Remote Workers Best Practice YouTube Humor Business Intelligence Processor Black Market Business Technology Content Management Fax Server Access Control Worker Audit IT Management Hard Drive Virtual Assistant SaaS Document Management Authentication Wireless Technology Botnet Solid State Drive IT Plan How to Downtime Network Congestion Computing eWaste Unsupported Software Data storage Update Automobile Charger Virus Google Docs Identity Theft Computing Infrastructure Digital Signage Compliance Computer Care Going Green Wearable Technology Unified Threat Management OneNote Procedure Saving Time Reputation MSP Streaming Media Accountants Thought Leadership Managing Stress Credit Cards dark theme Content Shopping Netflix Microchip Google Search Two Factor Authentication Tech Support Techology IT Infrastructure Laptop Password Management Running Cable Password Manager AI Root Cause Analysis Multi-Factor Security Cameras Memory FinTech HBO Knowledge Customers Bing Music Twitter Skype Audiobook Social Network Search Engine Investment Touchpad NIST Business Mangement Data loss Trending Employees Outlook Employee/Employer Relationships Leadership Troubleshooting Smart Tech Addiction Amazon Windows 365 Start Menu Politics Advertising ISP ROI Loyalty Recycling Science Video Conferencing Screen Mirroring Printer Server Sales Frequently Asked Questions Bitcoin Wiring Shortcuts Books Notifications Practices Cache Amazon Web Services Point of Sale Mobile Personal Windows 10s Cryptomining Safe Mode Distributed Denial of Service Criminal Customer Relationship Management Supply Chain Management Cast Analyitcs Monitoring Tip of the week Batteries webinar Relocation GDPR Emergency Hosted Computing Wireless Internet Online Shopping Programming Windows 8.1 Professional Services Digitize Public Cloud Employer Employee Relationship Video Games Windows Server 2008 R2 Assessment File Sharing Specifications Customer relationships Windows Server 2008 Worker Commute Camera Inventory Wire Antivirus Evernote Email Best Practices Tools Experience IT Assessment Manufacturing Scalability Television Travel Windows 8 Millennials Computer Tips Business Owner Managed IT Service Printers Security Cameras IT service Biometric Security NarrowBand Smart Office Wireless Charging Virtual CIO OneDrive Peripheral Search Public Computer Consultant Tablet Domains Workforce Analytics Digital Security Cameras Regulations Using Data iPhone Virtual Private Network Transportation 5G Rootkit Cables Copiers Computer Fan Quick Tip IaaS Best Available Maintenance WIndows 7 Telecommuting Bloatware Ergonomics Workers Files Project Management Smartwatch Benefits Nanotechnology OLED Chromecast Cortana Development FENG Tablets PCI DSS Virtual Machine IBM Digital Signature Entrepreneur 2FA Flash Fiber Optics Colocation Warranty Employee Smart Technology Uninterrupted Power Supply Cabling HVAC Google Apps Messaging Policy Software Tips Hypervisor Supercomputer Monitor Analysis Shortcut Devices User PowerPoint Cost Management Dark mode Sync Windows Media Player Trend Micro Emails Administrator Default App Enterprise Content Management Social Networking SMS

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code