Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

Florida Prepares for Possible 2020 Election Security Breaches

voting
July 23, 2019

Local elections offices in Florida received funds on July 8 to be used for 2020 election security improvements, according to a news report. 

The report says the awards vary from about $450 to more than $500,000 and that the funds distributed at the beginning of July included:

  • $46,096 to Lake County 
  • $12,140 to Marion County
  • $16,741 to Sumter County 

Marion County's Supervisor of Elections Wesley Wilcox says, "We are the largest swing state in the U.S. That is a huge prize. I really feel the 2020 general election in November will be the biggest turnout election that we’ve ever had. We have more people than ever before, but I think interest is also going to be at an all-time high.” In 2018, Lake County received about $242,000, Marion County received $268,000 and Sumter County received $119,000 to go toward election security.

Susan Greenhalgh, programs vice president at National Election Defense Coalition, says problems in election security are difficult because of the combination of computer use and anonymity of the voting process. “We have a secret ballot,” Greenhalgh said, “which is very, very important to the integrity of our elections, but it also creates a security issue. If machinery is somehow corrupted, you won’t know because there’s no way to go back and check like with other transactions. If you go to a bank, you get a receipt. That’s not how voting works.” Greenhalgh adds that if votes were taken by raising a hand, it would be easy to verify how many votes were cast for each option, and problems could be fixed if someone saw their vote was missed in a count. 

Aubrey Jewett, a political science professor at the University of Central Florida,  says people focus on computer hacking as the primary source of misrepresentation in elections, but that paper ballots are no less susceptible to mistakes, notes the report. 

“Sometimes baskets of ballots appear,” he said. “Sometimes things get misplaced. The potential for old-fashioned election tampering – in the sense of paper ballots – is there.” Jewett says two keys to preventing security breaches in elections are in recognizing that security needs to be maintained “from the very start of the process to the very end” and that security efforts continue to get funding, says the report. Jewett says computer hacking is one of the larger security threats facing U.S. elections. “As anyone who has dealt with computers and software knows, viruses and security threats evolve over time,” he said. “You have to be constantly vigilant to stay on top of those threats and to make sure you’re not vulnerable.”

Jewett says Florida has some systems in place to stop obvious stealing. “It doesn’t mean we can rest on our laurels by any means ’cause hackers are always hacking,” he added. “Even though the tabulating machines are not connected to the internet, there’s the worry that people can hack in and change the vote totals at the (Supervisor of Elections) Office.”

The report notes election hacks could include people filling in absentee ballots for dead family members or registering to vote in two states, which is a huge issue for Florida due to the large population of voters who live in other states, says the report. 

KEYWORDS: cybersecurity election fraud Presidential election

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • elizabeth warren

    Elizabeth Warren Plans to Increase Security for the 2020 Election

    See More
  • cyber 1 feat

    Japan Holds Cyber Attack Drill, Prepares for 2020 Olympics

    See More
  • election

    Black Hat research predicts significant changes to security operations post COVID-19 and exploit concerns for 2020 U.S. Election

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing