Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Outdated Software Puts Voters Personal Information at Risk

Outdated Software Puts Voters Personal Information at Risk

As the U.S. election rapidly approaches, many citizens are strongly concerned with who they’ll vote for. Unfortunately, not enough of these same citizens are nearly as concerned with what they’ll vote on, as the electronic voting machines utilized in many polling places are notoriously insecure to breaches.

While most of the country doesn’t actually utilize these machines (¾ of American voters use paper ballots to elect the new President) there are some states who use these electronic machines exclusively: Delaware, Georgia, Louisiana, New Jersey and South Carolina. Because of this, there’s still a chance that these flawed machines could negatively influence an election. The way we see it, businesses could learn some valuable cybersecurity lessons from this major electoral oversight.

It is a matter of common sense that older operating systems will be vulnerable to more recent threats, even without the knowledge that developers eventually stop producing security patches to better protect the outdated OS after a period of time.

Knowing this, however, only makes it worse to know that the majority of electronic voting machines currently run Windows XP, which hasn’t received a patch since 2014. That makes three years of threats evolving and improving while these voting machines have gone without a single security update. This means that there is a potential for serious tampering to occur, potentially keeping citizens from being able to vote.

Furthermore, many of these machines have not been replaced in years, despite newer and more secure models becoming available. This is in part due to a lack of financial resources in most areas, and in part due to legislative pushback against spending money to replace a machine that has yet to completely fail.

These issues reinforce the importance of maintaining up-to-date solutions, as well as updating and maintaining equipment proactively rather than subscribing to a problematic break-fix model.

Fortunately for the American voter, there are resources in place for those who are concerned for the sanctity and efficacy of their vote. The Verified Voting Foundation, devoted to “safeguarding elections in the digital age,” has an online map resource that breaks down into counties and describes what devices they utilize in counting votes. However, there is little indication of when the website was last updated beyond the copyright information at the bottom of the page, which says 2014. Therefore, the website may not be fully up-to-date, so it is better used as a guideline, rather than gospel.

Despite the presumed budgetary benefits of waiting to replace equipment only when absolutely necessary, a break/fix approach will ultimately cause an administrator more issues and wind up costing more in the long run. On the other hand, a managed service approach allows for a stable, budgetable cost for IT services with reduced downtime, maintained solutions and systems, and an overall more pleasant and productive experience. If you’re interested in implementing a managed solution to your company’s IT, as American polling places clearly should, contact Total Tech Care for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 18 April 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones IT Support Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Managed IT Services Windows Upgrade Phishing Outsourced IT Data Backup Ransomware Windows 10 Save Money Data Recovery Office Server Cloud Computing Passwords Windows 10 Chrome Virtualization Social Media Tech Term Saving Money Holiday Gadgets Microsoft Office Automation Managed Service Managed IT Services Artificial Intelligence Operating System Facebook Computers Cybercrime Wi-Fi Hacking Health BYOD Mobile Device Management Internet of Things Networking IT Support Managed Service Provider Office 365 Telephone Systems Covid-19 Information Information Technology Spam Remote Alert Social Engineering Mobility Recovery Employer-Employee Relationship Router BDR Bandwidth Big Data Password Money App History Encryption Data Breach Applications Mobile Computing Human Resources Application Law Enforcement Remote Monitoring Data Storage Patch Management Blockchain Apps Office Tips Paperless Office Training VPN Government Remote Computing How To Private Cloud Mobile Office Managed IT Bring Your Own Device Data Management Work/Life Balance Vulnerability Windows 7 Word Wireless Flexibility Servers Gmail Marketing Google Drive WiFi Settings Infrastructure Voice over Internet Protocol IT solutions Entertainment Website Budget Two-factor Authentication Avoiding Downtime Data Security Mouse HaaS Cleaning Conferencing Vendor Risk Management Hacker Scam Managed Services Staff Software as a Service Display Telephone System End of Support Machine Learning The Internet of Things Education Lithium-ion battery Physical Security Connectivity Remote Work Safety Employee/Employer Relationship Vendor Management Sports HIPAA Redundancy RMM Firewall Keyboard USB Virtual Reality Apple Social Data Protection User Error Save Time Meetings Retail Hard Drives Instant Messaging Content Management Business Technology Robot Access Control Excel Computing Infrastructure Going Green Managed Services Provider Biometrics Virtual Assistant Virtual Desktop Authentication Database Business Intelligence Virus Remote Workers Battery Audit Worker DDoS IT Management Shadow IT Legal Unified Threat Management Processor Computer Accessories Botnet Update SharePoint Internet Exlporer IT Plan Hard Drive Google Docs Customer Service Identity Theft PDF Unsupported Software Environment Printer Computing Charger Proactive IT Bluetooth Fax Server Compliance Augmented Reality OneNote Best Practice Computer Care YouTube Current Events SaaS Fraud Telephony Black Market Remote Worker Digital Signage Samsung IT Consultant Network Congestion Cryptocurrency eWaste Document Management Value Wireless Technology Humor Solid State Drive Procurement How to Downtime Spam Blocking Electronic Medical Records Workplace Strategy Comparison Net Neutrality CES Help Desk Data storage Hiring/Firing Wearable Technology Printing Automobile webinar Emergency Wire Video Conferencing Evernote ROI Tip of the week Bitcoin Professional Services Travel Shortcuts Monitor Public Cloud Employer Employee Relationship Best Available Sales WIndows 7 Running Cable Printers Point of Sale Personal Millennials Cryptomining Assessment Smart Office Supply Chain Management Memory Wireless Charging Windows Server 2008 Batteries Tools Reputation Streaming Media Monitoring Virtual Private Network Windows 8.1 Digitize Content Workforce Tech Support Television Laptop Cables Windows Server 2008 R2 Techology Customers Customer relationships Public Computer User Project Management Email Best Practices PowerPoint Nanotechnology IT Assessment Audiobook Windows Media Player Science Telecommuting Manufacturing Regulations Touchpad Transportation Cortana Digital Signature Managed IT Service Security Cameras Computer Fan Rootkit Computer Tips Managing Stress Distributed Denial of Service Warranty Virtual CIO Customer Relationship Management OneDrive Politics Biometric Security Advertising Workers Benefits HVAC Peripheral Analyitcs Google Apps Cameras Programming Analysis Using Data FENG Notifications Digital Security Cameras IBM Administrator Devices Copiers 5G Flash Smart Technology Enterprise Content Management Quick Tip MSP Ergonomics Accountants Smartwatch Relocation Antivirus Supercomputer Microchip Thought Leadership Development Windows 8 Credit Cards OLED Software Tips Password Manager Virtual Machine Video Games Sync Emails IT service Password Management PCI DSS 2FA Printer Server Fiber Optics Worker Commute Multi-Factor Security Employee Search Engine Twitter Messaging Experience Tablet Cabling Business Mangement Hypervisor Scalability Netflix Two Factor Authentication Domains NIST Policy Dark mode Smart Tech Trend Micro Business Owner Trending Root Cause Analysis NarrowBand Knowledge IaaS Music Maintenance Addiction SMS Amazon Default App HBO Bloatware Recycling Saving Time Search Skype Procedure Wiring dark theme Practices Shopping Google Search iPhone Data loss Leadership Troubleshooting Cache AI Tablets Amazon Web Services IT Infrastructure Outlook Entrepreneur Criminal Start Menu Bing Safe Mode FinTech GDPR Hosted Computing Social Network Files Screen Mirroring Loyalty Chromecast Books Shortcut Wireless Internet Online Shopping Investment Frequently Asked Questions Cost Management Employee/Employer Relationships Mobile Windows 10s Consultant File Sharing Employees Camera Windows 365 Analytics Social Networking Inventory Specifications ISP Colocation Cast Uninterrupted Power Supply

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code