(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Security Concerns Have Led To New Voting Machines In Virginia

Security Concerns Have Led To New Voting Machines In Virginia

Regardless of your feelings on the matter, the 2016 United States presidential election was an extremely divisive one--in no small part, due to the suspicion that the outcome of the election may have been significantly influenced by hacked voting machines. This uncertainty has led to some states making strides to ensure that their technology will no longer be responsible for such doubts.

Virginia is one of those states, deciding to remove direct-recording electronic voting machines in favor of those that produce paper documentation. In addition to that, there is now legislation in Virginia that will remove all touch-screen voting devices from circulation by November 7, 2017. This is when the next governor is to be elected, along with various other positions.

According to Politico, Governor McAuliffe has pushed for legislation to provide the necessary budget to replace new voting machines, but this legislation was denied two years ago. Things have changed since then, and now the state has little choice to obtain new machines, as the old ones will no longer be certified for use.

Other states have been recommended to emulate this decision by the Board of Elections, but again--it’s only a recommendation. While paper ballots do seem to be more reliable and authentic as the tangible option, counting them can be a drag. Therefore, it only makes sense that the states would want to expedite the process with technological assistance. Even so, there is the risk that this key democratic data can be manipulated and altered.

You can find a similar scenario much closer to home, in your very own business. If your systems aren’t painstakingly maintained--as many states’ voting machines are not--they can be vulnerable to numerous hacks and other attacks. Do you really want to risk your sensitive data when a solution is so easy to find?

NTConnections’s technicians can help give you the ability to better prepare for a successful future for your business. One way is by equipping you with a Unified Threat Management tool that helps protect your business from threats before they have a chance to strike. Call (703) 288-9767 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Hosted Solutions Productivity Microsoft Internet Malware Backup Google Mobile Devices Efficiency VoIP Business IT Support Email IT Services Network Security Managed Service Provider Miscellaneous Innovation Server Data Workplace Tips Disaster Recovery Business Continuity Network Business Management Software Windows Upgrade Saving Money Hardware Communication Android Mobile Device Management Virtualization Computer Browser Smartphone Managed IT Services Save Money User Tips Data Backup Smartphones communications Cybercrime Microsoft Office Holiday BYOD Windows 10 Outsourced IT WiFi Computers Hacking Chrome Big Data Ransomware Small Business Data Recovery Social Media Remote Monitoring Operating System Mobile Computing Cloud Computing IT Solutions VPN Internet of Things Managed IT Services Alert Application Apple Automation Proactive IT Avoiding Downtime Collaboration The Internet of Things Quick Tips Social Engineering Information Technology BDR Employer-Employee Relationship Passwords Office Marketing Budget Bring Your Own Device Recovery Tech Term spam Cybersecurity Gadgets Telephone Systems Bandwidth Managed IT Going Green Remote Computing Mobility Health Two-factor Authentication Data Protection Vendor Management Business Intelligence Website iPhone Save Time Firewall App Gmail Router Private Cloud How To Vulnerability Compliance Artificial Intelligence Data Security Redundancy Wireless Technology User Error IT Support Document Management Productivity Risk Management PowerPoint Windows 10 Excel Antivirus Phone System Office Tips Content Filtering Money Downtime History Tablet Lithium-ion battery Analytics Value Retail Memory Search Phishing Identity Theft Networking Mouse Apps Office 365 Law Enforcement Data Management Humor Applications Infrastructure Saving Time Statistics Data Storage Streaming Media Internet Exlporer Data storage Online Currency Workers Word Comparison Encryption Biometrics Outlook Business Owner Printer eWaste OneNote Flexibility Hard Drives Current Events IT Management Mobile Device Facebook Administration Work/Life Balance Maintenance Smart Tech IT Plan Entertainment Running Cable Physical Security DDoS CES Data loss Skype Unsupported Software Unified Threat Management Robot Update Google Drive Public Cloud Mobile Office Environment Customer Relationship Management Intranet Human Resources SaaS Training Best Available Safety HIPAA People Programming Government Network Congestion Credit Cards Cleaning Meetings Trending HaaS Fax Server IT Consultant Black Market Solid State Drive Authentication Amazon Tip of the week Shadow IT User Wireless Files Science Tools Company Culture Licensing FENG Password Instant Messaging Analysis Shortcut Nanotechnology Amazon Web Services Windows 8.1 Update Samsung Windows Server 2008 Wi-Fi SharePoint Colocation Twitter Windows 8 Password Manager Electronic Medical Records Accountants Connectivity Bluetooth Online Shopping Crowdfunding Windows 7 Sports Monitor Hosted Solution Computing Infrastructure Tablets Business Mangement Botnet Specifications Data Warehousing Notifications Legal Devices USB Evernote Regulations YouTube Print Server Reputation Wearable Technology End of Support Recycling Travel IoT Millennials Windows Media Player Social Wireless Charging Servers NarrowBand Customers Internet exploMicrosoft Criminal Net Neutrality Hiring/Firing Root Cause Analysis Workforce Thought Leadership Computer Repair Best Practice Social Networking WIndows 7 Fiber-Optic Flash Chromecast Software as a Service Patch Management Advertising Analyitcs Insurance Telecommuting Content Filter Laptop Managing Stress Settings Cables Sync Scam Distributed Denial of Service Content Management Virus Virtual Desktop Practices Touchscreen Remote Work Storage LinkedIn Charger Software Tips Touchpad IT service Unified Communications Telephony Debate Google Docs Relocation Hybrid Cloud Virtual Reality Blockchain Computer Accessories Hosted Computing Addiction Computer Care Uninterrupted Power Supply Domains Theft Start Menu Spam Blocking Voice over Internet Protocol Audit IaaS PDF Bloatware Staff Cameras Customer Service Inventory Cache Video Surveillance HBO Keyboard Consultant Cortana Mobile Education Multi-Factor Security Screen Mirroring Entrepreneur Digital Signature Printer Server Access Control Fraud Wireless Internet Frequently Asked Questions Tech Support Hacker Google Apps Professional Services Piracy Computer Fan Lifestyle Cast Worker Commute Cost Management Strategy Wire Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Books Emails CrashOverride IBM Webinar Emergency Worker Users Content Supercomputer IT solutions Rootkit Video Games Audiobook Knowledge Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication