we make managing your business technology more manageable

Georgia Voter Info Leak: The Importance of Using Updated Security Methods

Posted January 19th, 2016

it security lockYou may have heard that in mid-November of last year, more than 6 million Georgia voters’ information was leaked due to an outdated and highly insecure method of data transfer. Confidential voter information, including social security numbers, dates of birth, and driver license numbers, were burned onto DVDs and given out to 12 political and media groups by the Secretary of State’s Office.

The idea of using DVDs to store and transfer highly sensitive data is incredibly outdated and not at all safe. Without password protection or encryption, this data could have been easily accessed by anyone who had one of the DVDs. Also, if you were to rip the information onto a computer hard drive, there’s no telling who could end up with the data then.

Thankfully, in this case all of the DVDs were returned and destroyed. The lesson everyone should learn here is that sensitive data must be protected with modern security protocols. Such protocols include:

  • Data encryption – Keeps others from being able to look at your data.
  • Password protection – Only allows those with authorization to gain access to your data.
  • Virtual private networks – Creates virtual point-to-point connections to keep your devices safe from outside interference.
  • Cloud computing – Facilitates the secure transfer of data in the blink of an eye.

If you think your network could use a security boost, contact PerformanceIT to do a Free Network Assessment. Our assessment can find any potential security holes so that we can suggest the best personalized solutions.

Contact Us

Get In Touch

Please leave this field empty.