Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Outdated Software Puts Voters Personal Information at Risk

Outdated Software Puts Voters Personal Information at Risk

As the U.S. election rapidly approaches, many citizens are strongly concerned with who they’ll vote for. Unfortunately, not enough of these same citizens are nearly as concerned with what they’ll vote on, as the electronic voting machines utilized in many polling places are notoriously insecure to breaches.

While most of the country doesn’t actually utilize these machines (¾ of American voters use paper ballots to elect the new President) there are some states who use these electronic machines exclusively: Delaware, Georgia, Louisiana, New Jersey and South Carolina. Because of this, there’s still a chance that these flawed machines could negatively influence an election. The way we see it, businesses could learn some valuable cybersecurity lessons from this major electoral oversight.

It is a matter of common sense that older operating systems will be vulnerable to more recent threats, even without the knowledge that developers eventually stop producing security patches to better protect the outdated OS after a period of time.

Knowing this, however, only makes it worse to know that the majority of electronic voting machines currently run Windows XP, which hasn’t received a patch since 2014. That makes three years of threats evolving and improving while these voting machines have gone without a single security update. This means that there is a potential for serious tampering to occur, potentially keeping citizens from being able to vote.

Furthermore, many of these machines have not been replaced in years, despite newer and more secure models becoming available. This is in part due to a lack of financial resources in most areas, and in part due to legislative pushback against spending money to replace a machine that has yet to completely fail.

These issues reinforce the importance of maintaining up-to-date solutions, as well as updating and maintaining equipment proactively rather than subscribing to a problematic break-fix model.

Fortunately for the American voter, there are resources in place for those who are concerned for the sanctity and efficacy of their vote. The Verified Voting Foundation, devoted to “safeguarding elections in the digital age,” has an online map resource that breaks down into counties and describes what devices they utilize in counting votes. However, there is little indication of when the website was last updated beyond the copyright information at the bottom of the page, which says 2014. Therefore, the website may not be fully up-to-date, so it is better used as a guideline, rather than gospel.

Despite the presumed budgetary benefits of waiting to replace equipment only when absolutely necessary, a break/fix approach will ultimately cause an administrator more issues and wind up costing more in the long run. On the other hand, a managed service approach allows for a stable, budgetable cost for IT services with reduced downtime, maintained solutions and systems, and an overall more pleasant and productive experience. If you’re interested in implementing a managed solution to your company’s IT, as American polling places clearly should, contact Total Tech Care for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones IT Support Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Upgrade Phishing Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Server Cloud Computing Save Money Data Recovery Office Passwords Windows 10 Tech Term Chrome Virtualization Social Media Saving Money Holiday Gadgets Managed Service Microsoft Office Automation Managed IT Services Artificial Intelligence Operating System Facebook Computers Cybercrime IT Support Wi-Fi Hacking Internet of Things BYOD Health Mobile Device Management Networking Spam Managed Service Provider Covid-19 Office 365 Telephone Systems Information Technology Remote Alert Information Social Engineering Mobility Router BDR Recovery Employer-Employee Relationship Bandwidth Remote Monitoring Password Money Big Data Encryption App Applications History Data Breach Mobile Computing Law Enforcement Application Human Resources Mobile Office Apps Data Storage Patch Management Office Tips Training Government VPN Blockchain Private Cloud Paperless Office How To Remote Computing Managed IT HaaS Bring Your Own Device Data Management Work/Life Balance Infrastructure Voice over Internet Protocol Vulnerability Windows 7 Word Google Drive Wireless Flexibility Servers Marketing Gmail WiFi Avoiding Downtime IT solutions Settings Entertainment Website Budget Data Security Two-factor Authentication Mouse Vendor User Error Managed Services Cleaning Display Meetings Conferencing End of Support Employee/Employer Relationship Education Physical Security Risk Management Scam Hacker RMM Safety Data Protection HIPAA Sports Redundancy The Internet of Things Lithium-ion battery Keyboard Vendor Management Firewall USB Staff Software as a Service Virtual Reality Telephone System Save Time Apple Machine Learning Connectivity Remote Work Social Google Docs Database Computing Infrastructure Hiring/Firing Identity Theft Remote Workers Going Green Wearable Technology Processor Retail Hard Drives Battery Augmented Reality Instant Messaging Excel Shadow IT Fraud Robot Hard Drive Legal Business Intelligence Remote Worker Biometrics Virus Audit Internet Exlporer Worker Virtual Desktop Computing IT Management Cryptocurrency Unified Threat Management Computer Accessories Botnet PDF DDoS IT Plan SharePoint Comparison Proactive IT CES Digital Signage Unsupported Software Best Practice Printer YouTube Charger Customer Service Black Market Content Management Bluetooth Environment Business Technology Access Control Compliance Procurement OneNote Computer Care Fax Server Workplace Strategy Current Events Net Neutrality Virtual Assistant Document Management Telephony Authentication Help Desk Solid State Drive SaaS Wireless Technology Samsung Downtime IT Consultant Printing How to Value Data storage Network Congestion Update Humor Automobile Spam Blocking eWaste Electronic Medical Records Managed Services Provider Batteries Tablets Screen Mirroring HVAC Monitoring Loyalty Google Apps Windows 8.1 Monitor Analysis Digitize Books Entrepreneur Frequently Asked Questions Mobile Administrator Windows 10s Devices Consultant Windows Server 2008 R2 Shortcut Analytics Cast Enterprise Content Management Customer relationships Tip of the week MSP Email Best Practices Reputation webinar Accountants IT Assessment Streaming Media Emergency Cost Management Manufacturing Content Professional Services Microchip Public Cloud Thought Leadership Tech Support Employer Employee Relationship Credit Cards Social Networking Best Available Laptop Assessment Password Manager WIndows 7 Managed IT Service Security Cameras Techology Password Management Computer Tips Windows Server 2008 Virtual CIO Customers OneDrive Multi-Factor Security Biometric Security Audiobook Tools Search Engine Twitter Running Cable Peripheral Touchpad Television Business Mangement Using Data Memory NIST Digital Security Cameras Smart Tech Copiers Trending 5G Politics Advertising Addiction Quick Tip Amazon Public Computer Recycling User PowerPoint Smartwatch Windows Media Player Ergonomics Regulations Wiring Practices Development Notifications Transportation OLED Science Computer Fan Cache PCI DSS Rootkit Amazon Web Services Virtual Machine Criminal Managing Stress Fiber Optics Employee Safe Mode 2FA GDPR Relocation Workers Hosted Computing Messaging Benefits Cabling Cameras FENG Wireless Internet Distributed Denial of Service Policy Online Shopping Customer Relationship Management Hypervisor Dark mode IBM Trend Micro Analyitcs Video Games File Sharing Worker Commute Flash Camera Inventory SMS Smart Technology Specifications Programming Default App Saving Time Experience Wire Procedure Evernote dark theme Supercomputer Shopping Travel Google Search Scalability Software Tips Business Owner Sync Printers Emails Antivirus AI Millennials IT Infrastructure Windows 8 Printer Server Bing Smart Office FinTech NarrowBand Wireless Charging IT service Social Network Search Virtual Private Network iPhone Netflix Two Factor Authentication Workforce Investment Employee/Employer Relationships Tablet Root Cause Analysis Employees Cables Windows 365 Knowledge Domains Music ISP HBO Skype Project Management Files Nanotechnology Video Conferencing Telecommuting ROI Bitcoin Shortcuts Data loss IaaS Sales Chromecast Cortana Maintenance Point of Sale Leadership Digital Signature Personal Troubleshooting Bloatware Cryptomining Outlook Start Menu Warranty Colocation Supply Chain Management Uninterrupted Power Supply

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code