Proactive Cyber Security Can Prevent Vote Hacking

In a heated political climate, even the appearance of vote hacking could threaten our nation’s democracy.

The most contentious issue this election season may not be immigration or minimum wage laws but cybersecurity; specifically, the specter of vote hacking. Shortly after the discovery that the Democratic National Convention’s email server had been hacked came news that voter databases in Illinois and Arizona had been compromised, exposing the personal information of as many as 200,000 voters.

Proactive Cybersecurity Can Prevent Vote Hacking

Granted, these were state voter databases, not voting machines. However, between GOP candidate Donald Trump suggesting that the election could be “rigged” and going so far as to encourage his supporters to “monitor the polls” for vote hacking, disturbing results from recent studies on voting machine cybersecurity, including one by Princeton researchers that found some machines to be less secure than iPhones, and another study showing that nearly all Americans are “unsettled” about data breaches in general, the American public is understandably nervous as they prepare to go to the polls.

Vote hacking isn’t an Area 51-style conspiracy theory; it is a legitimate concern that must be addressed with proactive cybersecurity.

Could the election be hacked?

In theory, yes. Many states use voting machines that are more than 15 years old, run wildly outdated operating systems such as Windows 2000 and XP, and, in some cases, provide no paper audit trail. Some election officials argue that these machines are generally not connected to the internet, and are therefore secure. However, isolation from the internet does not equate to security against voting hacks; malware could be installed via an infected thumb drive inserted into a machine by an intruder, a malicious insider, or even an unwitting election volunteer who fell victim to a social engineering scheme. While the logistics of manually installing malware may appear insurmountable – after all, there are tens of thousands of voting machines across the U.S. – hackers would not have to access every voting machine in America to alter the election results. They could focus their efforts on swing states, and then zero in even further to target specific voting districts where the results are expected to be very close.

Hackers could also decide not to actually tamper with votes but simply cause enough chaos to discourage some Americans from voting and plant seeds of doubt regarding the election results. For example, hackers could breach voter databases and delete or alter voter registration records, which would prevent some voters from being able to cast ballots; launch Election Night DDoS attacks on polling places that use the internet to verify voter records; or even disable media feeds and prevent news networks from accessing exit poll information and election returns.

What can election officials do to reassure the public about vote hacking?

In an effort to address the public’s concerns, Rep. Hank Johnson (D-Ga.) recently proposed the Election Integrity Act of 2016 and the Election Infrastructure and Security Promotion Act of 2016. The first bill would impose cybersecurity measures on voting machines, such as prohibiting the machines from being connected to the internet and requiring that they be subject to regular audits, updated frequently, and have the ability to produce a paper audit trail. The second bill would designate voting machines as part of the nation’s critical infrastructure, which would put them under the purview of the Department of Homeland Security and ensure that voting machines are treated with the same level of seriousness as the country’s power grid and water supply.

While these bills are a good starting point to address vote hacking, more needs to be done, and since the election is only a month away, election officials need to act now. In addition to voting machines themselves, voter databases and polling places must be secured. Since election officials are not information security experts, the help of qualified cybersecurity professionals should be enlisted to secure voter databases and polling places and ensure that Election Night is uneventful from a cybersecurity perspective.

The cybersecurity experts at Lazarus Alliance have deep knowledge of the cybersecurity field, are continually monitoring the latest information security threats, and are committed to protecting organizations of all sizes from security breaches. We offer full-service risk assessment services and Continuum GRC software to protect companies from data breaches, ransomware attacks, and other cyber threats.

Lazarus Alliance is proactive cybersecurity®. Call 1-888-896-7580 to discuss your organization’s cybersecurity needs and find out how we can help your organization secure your systems.

IoT Cyber Security Threatens Consumer Adoption of Smart Devices

If IoT cybersecurity concerns aren’t addressed, consumers will reject self-driving cars and other smart devices

Shortly after rideshare company Uber launched a pilot test of self-driving cars in Pittsburgh, competitor Lyft made the bold prediction that most of its cars would be self-driving within five years. While it can be argued that Lyft’s proclamation is overly optimistic, self-driving cars are no longer science fiction; rapid advances in machine learning and artificial intelligence are making it possible to turn more and more everyday gadgets and machines into smart Internet of Things (IoT) devices. However, consumers have grave concerns about the cybersecurity issues surrounding smart cars, smart thermostats, and other smart technology, and these concerns are not unfounded. Unless IoT manufacturers can ensure that IoT cybersecurity is solid, the IoT market could be severely hampered or, should a wide-scale hack occur, even grind to a halt.

If IoT cybersecurity concerns aren’t addressed, consumers will reject self-driving cars and other smart devices

Ransomware Possibly the Biggest Threat to IoT Cybersecurity

The IoT market is booming. Verizon predicts that the global market for IoT devices will grow from just under $600 billion in 2014 to $1.3 trillion in 2019. Although self-driving cars are still in their infancy, other smart devices, from fitness wearables to smart thermostats to connected insulin pumps, are ubiquitous. However, once a device connects to the internet, it immediately becomes a potential target for hackers, and IoT devices are particularly susceptible to ransomware attacks.

Recently, researchers at Intel Security discovered a vulnerability in a connected car that made it possible to install malware on the car’s infotainment system, causing the stereo to play the same song over and over. Many consumers are concerned about hackers being able to disable a smart car’s brakes or take control of its acceleration and steering. While these scenarios are possible, a ransomware attack on a smart car, which would render the car un-drivable until the owner paid a ransom, may be even more likely. Earlier this year, Hollywood Presbyterian Hospital paid a $17,000.00 Bitcoin ransom to hackers who had locked down the facility’s electronic health records. It’s reasonable to assume that a consumer who needs their car to get to work or drive their children to school may be willing to fork over several hundred dollars to a hacker, especially since trying to fix the car’s computer may cost that much or even more. If a hacker manages to disable a commercial fleet of self-driving vehicles, the affected company may be willing to pay that much per car.

The IoT cybersecurity threat extends to the smart home: Hackers could use ransomware to disable thermostats, security systems, even routers. Healthcare IoT cybersecurity is also a grave concern as pacemakers, insulin pumps, and other lifesaving devices are connected to the internet. Yet despite the gravity of the threats to connected devices, 90% of organizations have no cybersecurity plan to address IoT cybersecurity specifically, and 68% have no testing strategy for IoT devices.

Meanwhile, 58% of consumers report being “very concerned” or “highly concerned” about IoT cybersecurity. Smart device security isn’t just a cybersecurity issue; it’s a safety issue. If consumers do not feel that smart cars, smart thermostats, and other connected devices are safe, they will refuse to buy them or patronize businesses that use them. Manufacturers cannot afford to take a lackadaisical attitude toward IoT cybersecurity. Devices should be subjected to a comprehensive security evaluation and testing process before they are released into the marketplace, and businesses that purchase IoT devices should refuse to buy products that haven’t been proven safe.

The cybersecurity experts at Lazarus Alliance have deep knowledge of the cybersecurity field, are continually monitoring the latest information security threats, and are committed to protecting organizations of all sizes from security breaches. We offer full-service risk assessment services and Continuum GRC software to protect companies from data breaches, ransomware attacks, and other cyber threats.

Lazarus Alliance is proactive cybersecurity®. Call 1-888-896-7580 to discuss your organization’s cybersecurity needs and find out how we can help your organization secure your enterprise IoT devices.