(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Security Concerns Have Led To New Voting Machines In Virginia

Regardless of your feelings on the matter, the 2016 United States presidential election was an extremely divisive one--in no small part, due to the suspicion that the outcome of the election may have been significantly influenced by hacked voting machines. This uncertainty has led to some states making strides to ensure that their technology will no longer be responsible for such doubts.

Virginia is one of those states, deciding to remove direct-recording electronic voting machines in favor of those that produce paper documentation. In addition to that, there is now legislation in Virginia that will remove all touch-screen voting devices from circulation by November 7, 2017. This is when the next governor is to be elected, along with various other positions.

According to Politico, Governor McAuliffe has pushed for legislation to provide the necessary budget to replace new voting machines, but this legislation was denied two years ago. Things have changed since then, and now the state has little choice to obtain new machines, as the old ones will no longer be certified for use.

Other states have been recommended to emulate this decision by the Board of Elections, but again--it’s only a recommendation. While paper ballots do seem to be more reliable and authentic as the tangible option, counting them can be a drag. Therefore, it only makes sense that the states would want to expedite the process with technological assistance. Even so, there is the risk that this key democratic data can be manipulated and altered.

You can find a similar scenario much closer to home, in your very own business. If your systems aren’t painstakingly maintained--as many states’ voting machines are not--they can be vulnerable to numerous hacks and other attacks. Do you really want to risk your sensitive data when a solution is so easy to find?

NTConnections’s technicians can help give you the ability to better prepare for a successful future for your business. One way is by equipping you with a Unified Threat Management tool that helps protect your business from threats before they have a chance to strike. Call (703) 288-9767 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 13 December 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Efficiency Mobile Devices IT Support Business VoIP Managed Service Provider Miscellaneous IT Services Server Disaster Recovery Business Continuity Workplace Tips Upgrade Email Innovation Network Data Hardware Software Windows Save Money Saving Money Business Management Communication Computer Mobile Device Management Smartphones Managed IT Services Network Security Browser Microsoft Office Virtualization User Tips Windows 10 Holiday Smartphone WiFi Android BYOD Data Backup Social Media Outsourced IT Hacking Chrome Operating System communications Mobile Computing IT Solutions Small Business Apple Computers Proactive IT Remote Monitoring Avoiding Downtime Cybercrime Application The Internet of Things Automation Ransomware Alert Quick Tips Social Engineering Office Budget Collaboration Information Technology Big Data Passwords Marketing Recovery Managed IT Services Employer-Employee Relationship Health Mobility Bring Your Own Device VPN Going Green Remote Computing spam Firewall Managed IT Vendor Management Telephone Systems iPhone App Gadgets Cybersecurity Wireless Technology User Error Data Recovery Save Time History Tablet Cloud Computing IT Support Retail Memory Search Office Tips Bandwidth Antivirus Compliance Windows 10 Networking Lithium-ion battery Gmail BDR Analytics Router Private Cloud Mouse PowerPoint Redundancy Artificial Intelligence Website Excel Office 365 Phone System How To Content Filtering Downtime Two-factor Authentication Administration Internet Exlporer Entertainment Data storage Saving Time Biometrics Running Cable Document Management Law Enforcement Value Risk Management Unified Threat Management Skype Solid State Drive Online Currency Mobile Office Hard Drives Customer Relationship Management Data Storage Printer Word Facebook Business Intelligence Best Available People Business Owner Programming Current Events DDoS Network Congestion Physical Security Robot Maintenance Trending Environment IT Management Google Drive Work/Life Balance SaaS Humor Statistics Intranet Safety Government Unsupported Software Meetings Public Cloud HaaS Outlook Fax Server Phishing Vulnerability Black Market Data Management Flexibility Data Security Money Apps IT Consultant Internet of Things Streaming Media Instant Messaging HBO Shortcut Mobile SharePoint Multi-Factor Security Windows 8 Hiring/Firing Screen Mirroring Encryption WIndows 7 Frequently Asked Questions Bluetooth Sports Company Culture Professional Services eWaste Computer Fan Lifestyle Windows 8.1 Update Tablets Cast Monitor Notifications Managing Stress Tip of the week Applications USB Files YouTube Tools Wearable Technology Virus FENG Data Protection Productivity LinkedIn Reputation Social Windows Server 2008 Wi-Fi Debate Colocation NarrowBand Workers Computer Accessories Comparison Customers Best Practice Social Networking Windows 7 Print Server Botnet Hosted Solution Computing Infrastructure Chromecast Cameras OneNote Specifications Analyitcs Data Warehousing Video Surveillance Consultant Regulations Travel Computer Repair Education End of Support Laptop Net Neutrality Settings Distributed Denial of Service Printer Server Millennials Virtual Desktop Servers Worker Commute Human Resources Piracy Internet exploMicrosoft Touchpad IT service Relocation Root Cause Analysis Workforce Virtual Reality IT Plan Uninterrupted Power Supply User Training Flash Domains Software as a Service Licensing Patch Management Advertising Touchscreen IaaS Data loss Bloatware Samsung Cleaning Customer Service Twitter Sync Update Scam Entrepreneur Software Tips Crowdfunding Tech Support Telephony Google Docs Hacker Hybrid Cloud Cost Management Computer Care HIPAA Shadow IT Start Menu Wireless Windows Media Player Spam Blocking Voice over Internet Protocol Science Audit Loyalty Keyboard Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Password Television Troubleshooting Electronic Medical Records Techology Public Computer Employer Employee Relationship Legal Automobile Data Breach Emails Books Users CrashOverride Mobile Device IBM Webinar Emergency Worker Content Supercomputer IT solutions Telecommuting Rootkit Video Games Audiobook Knowledge Netflix Remote Work Charger Scalability Politics Transportation How to webinar Benefits PDF