Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Voter Databases Do a Lousy Job at Securing Personal Data

Voter Databases Do a Lousy Job at Securing Personal Data

Hackers are known to go after data of all kinds, but sometimes they have other goals in mind. With one of the biggest events in world politics fast approaching--the 2016 United States presidential election--it’s thought that this event could potentially be influenced by hackers.

Backed by apparent evidence of a data breach within the Democratic National Committee, as well as at least two state election databases, how does this argument hold water?

The two hacked databases stored voter registration information for the citizens of Illinois and Arizona. The Illinois attack leaked the personal data of 200,000 voters over the course of 10 days. The Arizona attack, however, was unsuccessful. What’s unclear about these attacks is whether or not they are related in some way to other high-profile attacks against political groups.

As reported by CIO: “According to the FBI’s alert, ‘an unknown actor’ attacked a state election database by using widely available penetration testing tools, including Acunetix, SQLMap, and DirBuster. The hackers then found an SQL injection vulnerability--a common attack point in websites--and exploited it to steal the data. The FBI has traced the attacks to eight IP addresses, which appear to be hosted from companies based in Bulgaria, the Netherlands, and Russia.”

This election season has been a major center of controversy, as there are claims of election fraud pouring in from all over the United States, as well as unfounded claims that the election may be “rigged.” In particular, it’s thought that this “voter fraud” stems from claims that voter registration databases were altered prior to state primary elections. Earlier this year, the United States formally accused Russia of being behind the hacks on the Democratic National Committee. And, of course, you can’t forget about all of the “experts” on social media who claim that the system is rigged, which attribute to the fears that the election will be influenced by foreign entities.

However, Homeland Security Secretary Jeh Johnson issued a statement regarding these fears: Homeland Security was not aware of “specific or credible cybersecurity threats” that could affect the election. Yet, these reassurances do little to mitigate the fact that these systems were infiltrated and accessed.

It just goes to show that even big targets can fall victim to hackers when their infrastructures aren’t prepared to deal with threats. If major political entities can become the victim of a cyber attack, just imagine what hackers could do to your own business. We want you to know that even companies that don’t seem to hold sensitive data can retain information useful to hackers, like credit card numbers or employee personal records.

To learn how your business can protect its data, reach out to Evolve IT at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 14 November 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Cloud Hackers Privacy Email Productivity Malware Business Software Business Computing User Tips Computer Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Google Innovation Smartphone Windows 10 IT Support Mobile Devices Network Security Ransomware Gmail Hardware Hacking WiFi Bandwidth Facebook Microsoft Office Office Backup Operating System Apps Business Continuity Disaster Recovery The Internet of Things Communication Social Media Alert Employer-Employee Relationship Networking Data storage History Two-factor Authentication Data Small Business Windows Phishing Experience App Mobile Computing Big Data communications Safety Money Unified Threat Management Mobile Device Management Network Quick Tips Managed Service Provider Outlook Firewall Wireless Technology Content Filtering Cybercrime Android Apple Website Smartphones Best Practice Network Congestion Retail Application Save Money Music Customer Service Laptop Managed IT services Cryptocurrency IBM Router Google Docs Education Office 365 Holiday Bluetooth Cleaning Black Market Saving Money YouTube Processors Analytics Automation Office Tips intranet LiFi Staffing Lithium-ion battery Downtime Memory BYOD Passwords Streaming Media Help Desk Deep Learning Micrsooft Social Networking Visible Light Communication Disaster BDR Public Speaking Virtualization Business Growth Data Management IP Address Vendor Management Robot Advertising Recovery Sports Government Society Keyboard Google Wallet Spam Augmented Reality Search Monitors User Information Technology Running Cable Internet of Things Hard Drives Windows 8 Shortcut Hosted Solution Windows XP IT Services Remote Computing DDoS Displays Artificial Intelligence Documents Compliance Heating/Cooling Word Tech Support Drones End of Support Social Printer Browser Business Management Virtual Desktop Wireless Securty Writing Competition Unified Communications Document Management Encryption Presentation Entrepreneur Law Enforcement SaaS VoIP Domains Proactive IT Cortana Hacker
QR-Code