Velocity Technology Partners Blog

Velocity Technology Partners has been serving the Bogart area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

The 2016 United States presidential election was an ugly one for multiple reasons--chief among them the accusation that hacked voting machines could have altered the outcome of the election significantly. Thankfully, there are steps being taken to alleviate the worries that third parties might alter the outcome of such important events.

One state that has been taking measures to keep hackers out of their affairs is Virginia, which has recently made the choice to phase out direct-recording electronic voting machines with those that can produce paper documents. Furthermore, Virginia has introduced legislation that will eliminate touch-screen voting devices by November 7th. This is the date when voters will decide on who their next governor will be, among other political positions.

Politico reports that Governor McAuliffe requested legislation which would provide funds to purchase new voting hardware, but it was initially denied. That was two years ago. Now, however, they have little choice but to upgrade away from their current systems, as the machines used currently will no longer be certified.

The Board of Elections has recommended that other states follow suit with this decision, but who can say whether they will or not? It’s easy to suggest that paper ballots retain the authenticity required of important elections, but counting paper ballots is a time-consuming process that we wouldn’t blame anyone for wanting to automate with more advanced technology. Still, the risk of using technology to do the dirty work is a risky one, as you are placed in a position where hackers can easily influence the data contained by the election system.

In a way, your business is no different. While it makes sense to have physical documents in the office for certain reasons, it makes even more sense to have these documents backed up in an online environment. Unfortunately, the same risks that plague voting systems can exist in your technological infrastructure. If the systems aren’t maintained, they could be subject to various vulnerabilities and hacking attacks. No business wants to endure one of these, especially with so much sensitive data on the line.

Velocity Technology Partners can equip your business with the tools you need to secure your organization’s future. We can equip your business with a Unified Threat Management tool that’s designed to augment your organization’s network security with a four-pronged defense mechanism designed to prevent infections in the first place. Call us at (800) - 983 - 5765 today to learn more.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 20 March 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Charger Hosted Solutions Software as a Service Project Management Sync Thank You Google Docs Language Wireless Charging Device Security Small Business Disaster Recovery Devices FAQ Chrome Mobile Devices Identity Theft Maintenance Law Enforcement Best Practice Cloud Computing Business Management Government Tip of the Week Identities Politics File Sharing Websites Word IT Solutions Tech Term Productivity Emergency Microsoft Office Proactive Social Engineering Congratulations User Error Cybersecurity Wireless Technology Work/Life Balance Communications Google Drive Mobile Device Management Telephone Systems Audit Windows Outlook Virus Mobility Malware OneNote Data Management Updates Two-factor Authentication WannaCry Social Media Security Smartphones History Money NFL Applications Microsoft Excel SaaS Sales eWaste HBO Operating System Data Recovery Antivirus Best Practices Innovation The Internet of Things Unsupported Software intranet Data Breach Network Security Edge Data Security Virtualization Holiday Sports Credit Cards Internet of Things Cybercrime Microsoft Marketing Windows 10 Networking Legal Cortana Computer Automation Proactive IT Evernote User Tips Content Filtering Data Protection Business Smartphone Hosted Solution Commerce Redundancy Vulnerability iPhone Server Business Computing IT Management Cast Windows Ink Passwords Softphones Microsoft Word WIndows Server 2008 WiFi Fraud Managed IT IT budget Collaboration Hardware Travel Software Artificial Intelligence Browser IT Support Lifestyle IoT Data Loss Phishing Comparison Data Backup VoIp Office 365 Encryption Legislation Efficiency App Workers Google VPN Managed IT Services Hackers IT Services Screen Mirroring Computers Patch Management Email IT support Data Backup Excel Tech Support Tablets Spam Risk Management Licensing Flexibility Internet Retail Update Cloud Apps Data Storage Gadgets Ciminal Android Storage Wi-Fi Saving Money MSP Adobe Gifts Blockchain Business Continuity Managed Service Provider Google Maps Personal Information Specifications Apple Spyware Conferencing Technology Outsourced IT Privacy Telephone Alert Shortcut BYOD