Velocity Technology Partners Blog

Velocity Technology Partners has been serving the Bogart area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

The 2016 United States presidential election was an ugly one for multiple reasons--chief among them the accusation that hacked voting machines could have altered the outcome of the election significantly. Thankfully, there are steps being taken to alleviate the worries that third parties might alter the outcome of such important events.

One state that has been taking measures to keep hackers out of their affairs is Virginia, which has recently made the choice to phase out direct-recording electronic voting machines with those that can produce paper documents. Furthermore, Virginia has introduced legislation that will eliminate touch-screen voting devices by November 7th. This is the date when voters will decide on who their next governor will be, among other political positions.

Politico reports that Governor McAuliffe requested legislation which would provide funds to purchase new voting hardware, but it was initially denied. That was two years ago. Now, however, they have little choice but to upgrade away from their current systems, as the machines used currently will no longer be certified.

The Board of Elections has recommended that other states follow suit with this decision, but who can say whether they will or not? It’s easy to suggest that paper ballots retain the authenticity required of important elections, but counting paper ballots is a time-consuming process that we wouldn’t blame anyone for wanting to automate with more advanced technology. Still, the risk of using technology to do the dirty work is a risky one, as you are placed in a position where hackers can easily influence the data contained by the election system.

In a way, your business is no different. While it makes sense to have physical documents in the office for certain reasons, it makes even more sense to have these documents backed up in an online environment. Unfortunately, the same risks that plague voting systems can exist in your technological infrastructure. If the systems aren’t maintained, they could be subject to various vulnerabilities and hacking attacks. No business wants to endure one of these, especially with so much sensitive data on the line.

Velocity Technology Partners can equip your business with the tools you need to secure your organization’s future. We can equip your business with a Unified Threat Management tool that’s designed to augment your organization’s network security with a four-pronged defense mechanism designed to prevent infections in the first place. Call us at (800) - 983 - 5765 today to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 18 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Hardware Workers Microsoft Office IT Services Data Backup Computer Money Cortana Comparison Risk Management Licensing Android HBO Gifts Virtualization Networking Data Management Windows 10 Commerce Specifications IT Solutions Wireless Technology Cloud Marketing Outlook Identity Theft Security History Vulnerability Social Media Productivity WIndows Server 2008 Microsoft Excel User Tips Computers Software FAQ The Internet of Things Privacy Charger Data Protection Unsupported Software Mobile Device Management SaaS Best Practices IT Support Patch Management Google Maps Smartphone Travel Excel Telephone Systems Holiday Word Applications Law Enforcement Wireless Charging Windows Collaboration Cybersecurity IT support Maintenance Business Management Updates OneNote Network Security Lifestyle Thank You Technology Redundancy Proactive IT Phishing Artificial Intelligence Disaster Recovery Internet User Error Work/Life Balance VoIp Encryption Hackers Mobile Devices Tip of the Week Evernote VPN Office 365 Best Practice BYOD Audit Smartphones Data Security Managed IT Backup Adobe IT Management Shortcut Google Drive Software as a Service Business Continuity Content Filtering Mobility Gadgets Windows Ink Data Loss WiFi Congratulations NFL Credit Cards eWaste Malware App Microsoft Word Server Politics File Sharing Tablets Sales iPhone Saving Money Sports Apps Browser Spam Storage Cast Cloud Computing Google Screen Mirroring Personal Information Wi-Fi Hosted Solutions Emergency Managed Service Provider Data Storage Email Outsourced IT Passwords Two-factor Authentication Sync Data Breach Legislation Microsoft Google Docs Communications Retail Government Managed IT Services Data Recovery Chrome Alert Small Business Conferencing Hosted Solution Apple WannaCry Cybercrime

Blog Archive

February
March
April
May
June
July
August
September
October
November
December