ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Voter Databases Do a Lousy Job at Securing Personal Data

Voter Databases Do a Lousy Job at Securing Personal Data

Hackers are known to go after data of all kinds, but sometimes they have other goals in mind. With one of the biggest events in world politics fast approaching--the 2016 United States presidential election--it’s thought that this event could potentially be influenced by hackers.

Backed by apparent evidence of a data breach within the Democratic National Committee, as well as at least two state election databases, how does this argument hold water?

The two hacked databases stored voter registration information for the citizens of Illinois and Arizona. The Illinois attack leaked the personal data of 200,000 voters over the course of 10 days. The Arizona attack, however, was unsuccessful. What’s unclear about these attacks is whether or not they are related in some way to other high-profile attacks against political groups.

As reported by CIO: “According to the FBI’s alert, ‘an unknown actor’ attacked a state election database by using widely available penetration testing tools, including Acunetix, SQLMap, and DirBuster. The hackers then found an SQL injection vulnerability--a common attack point in websites--and exploited it to steal the data. The FBI has traced the attacks to eight IP addresses, which appear to be hosted from companies based in Bulgaria, the Netherlands, and Russia.”

This election season has been a major center of controversy, as there are claims of election fraud pouring in from all over the United States, as well as unfounded claims that the election may be “rigged.” In particular, it’s thought that this “voter fraud” stems from claims that voter registration databases were altered prior to state primary elections. Earlier this year, the United States formally accused Russia of being behind the hacks on the Democratic National Committee. And, of course, you can’t forget about all of the “experts” on social media who claim that the system is rigged, which attribute to the fears that the election will be influenced by foreign entities.

However, Homeland Security Secretary Jeh Johnson issued a statement regarding these fears: Homeland Security was not aware of “specific or credible cybersecurity threats” that could affect the election. Yet, these reassurances do little to mitigate the fact that these systems were infiltrated and accessed.

It just goes to show that even big targets can fall victim to hackers when their infrastructures aren’t prepared to deal with threats. If major political entities can become the victim of a cyber attack, just imagine what hackers could do to your own business. We want you to know that even companies that don’t seem to hold sensitive data can retain information useful to hackers, like credit card numbers or employee personal records.

To learn how your business can protect its data, reach out to ClearView IT at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup communications Smartphone Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Managed IT Services Communication Data Recovery Quick Tips Productivity Social Media Users VoIP Mobile Device Automation Tech Term Windows 10 Business Continuity Facebook Disaster Recovery Passwords Holiday Covid-19 IT Support Browser Apps Managed Service Windows 10 Miscellaneous Cloud Computing Outsourced IT Remote Work Internet of Things Managed Service Provider Data Management Saving Money Operating System Government Artificial Intelligence Managed IT services Workplace Strategy Gadgets Networking Windows Server WiFi Information Remote Bandwidth Encryption Mobile Device Management Business Technology App Virtualization Blockchain Spam Employee/Employer Relationship Budget Gmail History Office Apple Two-factor Authentication Information Technology Office 365 Conferencing Access Control Data Security Cybercrime Wi-Fi BDR Big Data Health Analytics Document Management Remote Computing Hacker Save Money Patch Management Vendor Compliance Remote Monitoring Voice over Internet Protocol Help Desk Employer-Employee Relationship Hacking Cost Management IT Management Training Outlook Data storage Password Money Customer Service Unified Threat Management Firewall Applications Augmented Reality Word Project Management BYOD Vulnerabilities IBM Website Computing Search... Best Practice Vendor Management Hard Drive Mobile Office Retail Managed Services Alert Data loss Legal Hiring/Firing Update Chrome Sports Travel Social SaaS DDoS Virtual Reality Data Breach Social Engineering Cryptocurrency Paperless Office Antivirus Black Market Maintenance iPhone Cleaning Mobile Computing Education Cortana Robot Windows 11 Content Filtering Marketing Monitoring Running Cable Healthcare Websites Router Remote Workers Mobility Storage Meetings The Internet of Things Windows 7 YouTube Free Resource Google Maps Twitter Scam Law Enforcement How To Laptop End of Support Printer User VPN Images 101 Downtime Tech Terms Integration Hack Safety Identity Theft Display Notifications Managed IT Digital Unified Communications Virtual Assistant Virtual Desktop Google Docs Employees Experience Bluetooth Avoiding Downtime Taxes Distributed Denial of Service Holidays Office Tips Private Cloud Processor Memory PowerPoint Administration Cooperation Disaster Video Conferencing Presentation Physical Security Specifications IT Consultant Virtual Machines Politics Machine Learning Computer Repair Settings Lithium-ion battery Multi-factor Authentication Start Menu Customer Relationship Management Professional Services Solid State Drive Downloads Computer Care Co-Managed IT Processors Entertainment Vulnerability Saving Time Drones Chromebook Software as a Service Managed Services Provider Data Protection Computers Bitcoin Automobile Virtual Private Network Telephone How To Current Events Wireless Technology Microchip Flexibility HIPAA Solutions eWaste Excel Reliable Computing Fileless Malware Smart Devices Heating/Cooling Writing Tablet Environment G Suite Tip of the week Windows XP Mouse Remote Working VoIP Gamification Business Owner Social Networking Tracking Company Culture Trend Micro Regulations Be Proactive AI Telephone System Digital Security Cameras Scalability Directions Electronic Health Records Backup and Disaster Recovery Transportation Web Server Administrator SharePoint Text Messaging Content Wasting Time Proactive IT Digital Payment Desktop eCommerce Worker Accountants Modem Workplace Strategies Bring Your Own Device Electronic Medical Records Videos Surveillance Access Database Time Management Inbound Marketing Managing Costs Music Public Cloud Equifax SSID Staffing Health IT Media Audit Development IP Address Spyware Tactics Employer/Employee Relationships Hard Drive Disposal Botnet Username Virtual Machine File Sharing Electronic Payment Optimization Micrsooft Startup Smart Technology Freedom of Information Reviews Rental Service Redundancy 2FA Navigation Flash Cache Addiction Teamwork email scam Data Storage Telephone Systems Unified Threat Management Hypervisor Business Growth Workers Mobile Security Competition Legislation Phone System Medical IT News Shopping Recovery User Tip Paperless Printing Evernote Network Management SQL Server CCTV LiFi PCI DSS Banking Touchscreen Licensing Entrepreneur Google Wallet Humor Application Deep Learning Emails Supply Chain Computer Malfunction Fake News Gig Economy Documents Messenger Emergency Proxy Server Business Communications Internet Service Provider Vendor Mangement Service Level Agreement Azure Business Intelligence Computing Infrastructure Computer Accessories Regulations Compliance Business Metrics Management Managed IT Service Hosted Solution Samsung Device security Securty Books Memes Uninterrupted Power Supply Wireless Headphones Workplace Webcam Microsoft Excel Human Resources Tech Net Neutrality Domains Language Business Mangement Going Green Society Business Cards Tablets Financial Data Error Reading Bookmark IT Monitors Scams Visible Light Communication Risk Management Google Apps Google Calendar Term Download Windows 8 Supercomputer Piracy HTML Telework Virus Relocation Browsers Communitications Public Speaking Displays Nanotechnology Microsoft 365 Cables Advertising Motion Sickness Smartwatch Streaming Media Comparison Google Play Procurement Work/Life Balance Google Drive Upload Troubleshooting Tech Support Software License Keyboard FinTech Social Network Knowledge Data Analysis IT Assessment Hard Drives Corporate Profile Screen Reader Point of Sale CES In Internet of Things Television Security Cameras Supply Chain Management Telephony Trends Value intranet Employer Employee Relationship Mobile Technology Shortcut Network Congestion Cabling Devices Shortcuts Organization Wireless Hacks Customer Resource management Cyber security

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?