(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Security Concerns Have Led To New Voting Machines In Virginia

Regardless of your feelings on the matter, the 2016 United States presidential election was an extremely divisive one--in no small part, due to the suspicion that the outcome of the election may have been significantly influenced by hacked voting machines. This uncertainty has led to some states making strides to ensure that their technology will no longer be responsible for such doubts.

Virginia is one of those states, deciding to remove direct-recording electronic voting machines in favor of those that produce paper documentation. In addition to that, there is now legislation in Virginia that will remove all touch-screen voting devices from circulation by November 7, 2017. This is when the next governor is to be elected, along with various other positions.

According to Politico, Governor McAuliffe has pushed for legislation to provide the necessary budget to replace new voting machines, but this legislation was denied two years ago. Things have changed since then, and now the state has little choice to obtain new machines, as the old ones will no longer be certified for use.

Other states have been recommended to emulate this decision by the Board of Elections, but again--it’s only a recommendation. While paper ballots do seem to be more reliable and authentic as the tangible option, counting them can be a drag. Therefore, it only makes sense that the states would want to expedite the process with technological assistance. Even so, there is the risk that this key democratic data can be manipulated and altered.

You can find a similar scenario much closer to home, in your very own business. If your systems aren’t painstakingly maintained--as many states’ voting machines are not--they can be vulnerable to numerous hacks and other attacks. Do you really want to risk your sensitive data when a solution is so easy to find?

NTConnections’s technicians can help give you the ability to better prepare for a successful future for your business. One way is by equipping you with a Unified Threat Management tool that helps protect your business from threats before they have a chance to strike. Call (703) 288-9767 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 21 October 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Productivity Business Computing Microsoft Backup Malware Hosted Solutions Internet Efficiency Mobile Devices Google IT Support Business VoIP Miscellaneous IT Services Managed Service Provider Server Workplace Tips Business Continuity Disaster Recovery Network Innovation Data Upgrade Hardware Email Business Management Computer Software Windows Save Money Saving Money Mobile Device Management Communication Microsoft Office Network Security Virtualization Browser Android User Tips Windows 10 WiFi Smartphone Smartphones Hacking BYOD Social Media Operating System Managed IT Services Holiday Chrome Application Apple Proactive IT Remote Monitoring Avoiding Downtime Mobile Computing Computers communications IT Solutions Cybercrime Big Data Alert Quick Tips Outsourced IT Small Business Automation Information Technology Passwords Office Marketing Budget The Internet of Things Ransomware spam Recovery Employer-Employee Relationship Managed IT Services Going Green Remote Computing Collaboration Health Mobility VPN Data Backup Vendor Management Cybersecurity iPhone Gadgets Save Time Firewall Social Engineering Telephone Systems App Managed IT Wireless Technology User Error Bring Your Own Device Office 365 PowerPoint Excel Phone System Antivirus Downtime History Tablet Analytics Retail Memory Gmail Lithium-ion battery Search Bandwidth Compliance IT Support Private Cloud Networking Mouse Redundancy Black Market Document Management Data Management Risk Management Online Currency Internet of Things Website Outlook Printer Internet Exlporer Data storage Money Flexibility Biometrics Content Filtering Current Events Unsupported Software Administration Office Tips Maintenance Public Cloud Entertainment Hard Drives Phishing Running Cable Router Facebook Value How To Vulnerability Unified Threat Management Data Security Skype Mobile Office Physical Security DDoS Customer Relationship Management Intranet BDR Robot Best Available Google Drive Environment Artificial Intelligence Cloud Computing People Law Enforcement Programming Solid State Drive SaaS Network Congestion Data Storage Safety IT Consultant Government Word Meetings Windows 10 Business Owner HaaS Humor Saving Time Statistics Fax Server Hacker OneNote Company Culture Licensing Data Warehousing Regulations Windows 8.1 Update Samsung Cost Management Two-factor Authentication Twitter Travel Shadow IT End of Support Wireless Science IT Management Servers Crowdfunding Streaming Media Instant Messaging Shortcut Data Recovery Internet exploMicrosoft SharePoint Windows 8 Root Cause Analysis IT Plan Flash Encryption Bluetooth Software as a Service Patch Management Print Server Sports Advertising Monitor eWaste Windows Media Player Tablets Data loss Sync Notifications USB Update YouTube Reputation Wearable Technology Net Neutrality Hiring/Firing Software Tips Computer Repair Telephony WIndows 7 Social NarrowBand Hybrid Cloud Customers Computer Care Start Menu HIPAA Best Practice Managing Stress Social Networking Spam Blocking Audit Chromecast LinkedIn Virus Analyitcs Touchscreen HBO Mobile Settings Debate Screen Mirroring Laptop Distributed Denial of Service Computer Accessories Frequently Asked Questions Professional Services Virtual Desktop IT service Human Resources Computer Fan Cast Touchpad Video Surveillance Relocation Applications Cameras Virtual Reality Tip of the week Tools Trending Uninterrupted Power Supply Files Consultant Training Domains FENG Education Windows Server 2008 IaaS Printer Server Bloatware Apps Workers Cleaning Colocation Customer Service Worker Commute Piracy Business Intelligence Windows 7 Entrepreneur Botnet Hosted Solution Tech Support Computing Infrastructure User Legal Employer Employee Relationship Data Breach Automobile Emails Books Mobile Device CrashOverride IBM Work/Life Balance Webinar Emergency Worker Supercomputer Content IT solutions Video Games Rootkit Knowledge Audiobook Netflix Scam Scalability Users Charger Politics Google Docs Transportation How to webinar Benefits PDF Loyalty Conferencing Keyboard Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Productivity Password Wi-Fi Television Troubleshooting Electronic Medical Records Techology Public Computer