99% of Texas Voter Records Exposed: The Election security was again called into questions after the millions of Texas voter records that were left exposed. A file which was discovered by Flash Gordon, a New Zealand-based data breach hunter, which was left on an unsecured server without even a password, according to the TechCrunch. Of the 15.2 million total registered Taxes voters, 14.8 million records which were left exposed on a single file.
The data in that file was compiled by the conservative-focused data firm, The Data Trust, and which contained the personal information such as the voter’s name, address, gender, and several years’ worth of voting history, which includes the primaries and presidential elections.
“The data also included gauges on voter’s views regarding immigration, abortion and the Second Amendment. The file also held data assessing if voters trusted Hillary Clinton,” The Hill reported.
This news was out when the trust data protection and the privacy with regard to voting is low. Confirmation of Russian meddling has set off alarms across the aisle as candidates move toward midterm elections. That of 14.8 million personal records of Texas voters were found on an unprotected server, without even a basic security or without even a single password protection to that file, does little to boost the confidence in election systems, said Bill Evans, a vice president at One Identity.
“The idea of having a database like this setting with no password is such an incredible lapse in judgment today. While we all known that keeping up with password best practices can be somewhat annoying – forgetting and resetting them in a broken cycle – it is inexcusable and may be illegal to leave that contains personal information like this completely unprotected,” Evans said.
“it is a good reminder, however, and call to action for any organization that is storing sensitive data, that it is their responsibility to ensure security, as well as authentication to access it. There are four basic security measures that should be part and parcel of doing business today. Those include end-user education, multi-factor authentication, privileged –access management, and access governance to ensure only the right people have the right access to the right things at the right time.”