Velocity Technology Partners Blog

Velocity Technology Partners has been serving Athens, Gainesville and North Georgia since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

The 2016 United States presidential election was an ugly one for multiple reasons--chief among them the accusation that hacked voting machines could have altered the outcome of the election significantly. Thankfully, there are steps being taken to alleviate the worries that third parties might alter the outcome of such important events.

One state that has been taking measures to keep hackers out of their affairs is Virginia, which has recently made the choice to phase out direct-recording electronic voting machines with those that can produce paper documents. Furthermore, Virginia has introduced legislation that will eliminate touch-screen voting devices by November 7th. This is the date when voters will decide on who their next governor will be, among other political positions.

Politico reports that Governor McAuliffe requested legislation which would provide funds to purchase new voting hardware, but it was initially denied. That was two years ago. Now, however, they have little choice but to upgrade away from their current systems, as the machines used currently will no longer be certified.

The Board of Elections has recommended that other states follow suit with this decision, but who can say whether they will or not? It’s easy to suggest that paper ballots retain the authenticity required of important elections, but counting paper ballots is a time-consuming process that we wouldn’t blame anyone for wanting to automate with more advanced technology. Still, the risk of using technology to do the dirty work is a risky one, as you are placed in a position where hackers can easily influence the data contained by the election system.

In a way, your business is no different. While it makes sense to have physical documents in the office for certain reasons, it makes even more sense to have these documents backed up in an online environment. Unfortunately, the same risks that plague voting systems can exist in your technological infrastructure. If the systems aren’t maintained, they could be subject to various vulnerabilities and hacking attacks. No business wants to endure one of these, especially with so much sensitive data on the line.

Velocity Technology Partners can equip your business with the tools you need to secure your organization’s future. We can equip your business with a Unified Threat Management tool that’s designed to augment your organization’s network security with a four-pronged defense mechanism designed to prevent infections in the first place. Call us at (800) - 983 - 5765 today to learn more.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, July 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Spyware Device Security Money Word OneNote Encryption Apple Risk Management Students Managed IT services Sync Wi-Fi Congratulations Identity Theft VoIp Value Business Continuity Computer intranet Financial Technology Virtualization WiFi Update Artificial Intelligence Apps Management Hosted Solutions Audit Telephone Mobile Device Management Vendor Management Email Data Management Remote Computing Microsoft Excel Technology Language Small Business Productivity SaaS Printing Network Security Monitoring Hosted Solution Applications IT support Company Culture Unsupported Software Managed IT Streaming Media Analysis Cast Proactive Softphones Router Saving Money Shortcut Mobile Security Phishing Windows Ink Google Docs Emergency Sales Data Backup Smartphones Software as a Service Credit Cards Websites Efficiency Software Gifts Computing Social Engineering File Sharing Automation Wireless Internet Cloud Computing Fraud Application Google Drive WIndows Server 2008 Tablets Employer-Employee Relationship Innovation Excel Screen Mirroring The Internet of Things Storage Best Practices FAQ Two-factor Authentication Network Identity Data Protection IT Solutions Computers Data Security Mobility History Hardware Workers Social Media Microsoft Office Managing Stress IT budget Office 365 Devices Backup Work/Life Balance Vulnerability Comparison Privacy App Cybercrime PowerPoint Computer Forensics Legal HBO Unified Communications Google Disaster Recovery Microsoft Word Spam Ciminal Hackers Big Data Adobe BYOD Licensing NFL Smartphone Security Thank You Malware Bring Your Own Device Antivirus IT Support Collaboration Gamification App store Internet Data Theft Holiday Business User Error Project Management Chrome Android eWaste Retail Server Outsourced IT Government Remote Monitoring Cleaning Blockchain Mobile Devices Law Enforcement Browser Data Proactive IT Politics Cloud Telephone Systems Identities Cost Management Safety Edge Managed IT Services Evernote Google Maps Windows Hard Drive Marketing Flexibility BDR Content Filter Connectivity Personal Information Memory Outlook Tech Support Data Loss Communication Communications Passwords User Tips Compliance Twitter Sports IT Services IT Management Best Practice Alert Charger Financial Operating System Content Filtering Updates Commerce Ransomware WannaCry Wireless Technology Managed Service Provider Networking Tech Term Chromebook Cybersecurity Business Computing Patch Management Windows 10 Data Recovery Google Assistant Maintenance Education Data Breach Conferencing Data Storage Smart Tech Microsoft Wireless Charging VPN Gadgets MSP Internet of Things Business Management Travel iPhone Lifestyle Data Privacy Tip of the Week Redundancy IoT Hybrid Cloud Legislation Virus Specifications Cortana Gmail