The election systems of countries around the world are not as secure as they should be.
It’s the big question on everyone’s mind during Election 2020: Is my vote safe?
With voting already well under way, cyberattackers are working overtime to stop election workers from counting votes and to taint election results. Therefore, everyone’s worried if criminals will prevent accurate vote counts and impact the results of the Nov. 3 General Election.
Jerry Ray is COO of SecureAge.
“Whatever the pathway or intended target within the realm of candidates, platforms, parties, voters and voting infrastructure, the most inevitable and effective cyberattacks will be subtle, unnoticed, misattributed and masked within the culture of doubt and suspicion cast upon the election for the sake of either plausible deniability by the victors or grounds for dispute by the vanquished,” he said. “With only a fraction of a percent of the voting population able to determine the outcome, the attackers need only work in the margins and against those least able to defend themselves or least likely to notice.”
All manner of reasons can motivate a ransomware attack on a political organization in the runup to an election. That’s according to Doug Matthews, Veritas’ vice president of enterprise data protection and compliance. Political hacktivists may carry out election attacks. And they may believe there’s a moral imperative to stop an opposing candidate.
“Or they’re purely financially motivated, where hackers believe organizations under the pressure of a voting deadline will be more likely to pay up,” he said. “Regardless of the motivation, a ransomware attack can be devastating to an organization. So political bodies must be acutely aware of and prepared for ransomware.”
Adam Levin is chairman and founder of CyberScout, and author of “Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves.“
The election systems of countries around the world are not as secure as they should be, he said. And they don’t include defense against the kinds of bot-driven disinformation that increasingly decides outcomes.
“We should continue to do everything in our power to ensure the integrity of the vote, which means proper funding and training for election systems and staffing,” Levin said.
U.S. electoral systems are resilient, Ray said. Moreover, they can combat malicious activities related to voting infrastructure.
“While voters don’t necessarily need to be concerned about the security of the election, such as votes being manipulated or concerns over mail-in-ballots, the threat of misinformation will continue to be strong during and past a definitive election result,” he said. “ Recently, many networks and social media channels have taken steps to stop the spread of misinformation. These are strong steps in the right direction from the tech world.”
Many of the lessons learned from this election cycle will set precedent for future elections at all levels.
Our slideshow above shows nine ways cybercriminals are targeting the election.
Centreon Partners Get Access to Reinvented Partner Program
Sage Names Top Partners Amid ‘Tumultuous’ 2020 Business Landscape
Splunk Strengthens Observability Platform with Flowmill Purchase
IT Skills Shortage: Bad for Orgs, Good for MSPs
Pure Storage Enhances as-a-Service Offer, Bolsters Transparency
As Insider Threats Soar, Code42 Takes Incydr 100% Channel
Datto Earnings Jump in First Quarterly Financial Report Since Going Public
MSP 501 Profile: DP Solutions Puts Clients First in Solving IT Problems
Please log in again. The login page will open in a new tab. After logging in you can close it and return to this page.