TV

Data Security 02-01-2016

Cybersecurity Concerns During an Election Year

Sara Drury

that the "2016 Presidential Election year will launch a slew of new lures and malware intended to defraud and deceive contributors, candidates, and campaign methods." In both and elections, hackers targeted presidential candidates via campaign computers and databases with the intention to steal data and policy information.

The 2016 primaries are just around the corner, and the online activity revolving around the election this year is expected to be a promising target for cybercriminals. A look at past elections have helped security experts determine where voters should beware of cyber-attacks.

Databases Containing Sensitive Information

has already reported on two database errors that divulged confidential information about millions of voters. Some records disclosed target demographic and personal information beyond public record that voters would not otherwise share publicly. When databases like these are not protected properly, CSO warns that, “Information could be used to construct a targeted phishing campaign. [During an election year,] a targeted list based on politics might have a higher level of success.”

Phishing Emails

, and as cybercriminals refine emails over time, voters become easy “phish” to catch through an election scam. In 2008, phishing emails contained malware primarily in headlines. In 2012, scams went beyond the headlines and took a place as malicious links inside an email. of receiving an email. Campaign email blasts about events or encouraging activism can make users vulnerable to this type of attack.In 2016, voters should be aware that even the most professional-looking emails may be malicious and trying to harvest sensitive information.

Untrustworthy Websites and Social Media Networks

Campaign websites and social media networks are two of the most lucrative targets for cybercriminals because they are used as a primary resource for election news. Cybersecurity experts warn against the possibility of stolen money and credentials through campaign websites because . Only use websites secured by a SSL Certificate to ensure your information is encrypted during transit. A visible padlock icon will be displayed in the browser address bar when the site you are visiting uses a SSL Certificate.

Large Events

According to Sandra Jontz at , attackers frequently see to launch cyber-attacks on a curious population. A hypothetical scenario: About 24 to 48 hours before a Primary, a hacker could spread fake news about a candidate by hacking into their Twitter account and reporting something like he/she hasdropped out of the election. Before the news gets out that it was a hoax, voters have already been to the polls to vote for someone else. Large events for this year’s election begin at the Iowa Caucus on February 1, 2016 and continue sporadically until Election Day on November 8, 2016. Large events include: primaries and caucuses, party conventions, presidential debates, and, of course, Election Day.

There has been a since 2010. Hackers are growing more confident and creative, wreaking havoc on targeted companies and individuals. Using secure online techniques is crucial particularly during an election year and its corresponding events.

UP NEXT
PKI

3 Surprising Uses of PKI in Big Companies and How to Ensure They Are all Secure

5 Min

Featured Stories

07-03-2024

What is a CA’s Role in delivering digital trust?

11-27-2024

6 actionable ways to secure the IIoT at every stage

Tracking the progress toward post-quantum cryptography

The state of PQC since the publication of FIPS 203, 204 and 205