Tulane expert describes the biggest cybersecurity target to voting in person in 2020 election

Sep 8, 2020

2 min

William "Bill" Rials

Voting is the staple of democracy and has been done in person in the United States since the nation’s founding. While the controversy over the integrity of mail-in voting continues, never in our country’s history has voting in person been more fraught with potential security risks that could alter the outcome.


William “Bill” Rials, an expert and associate director in the Tulane University School of Professional Advancement Information Technology Program, is available to speak about how cybersecurity attacks can disrupt electronic voting and why local governments should be acting now to prevent these attacks.


For interviews, contact pr@tulane.edu or Roger Dunaway at 504-452-2906.



According to Rials:

“From a cybersecurity perspective, the biggest risk to elections is all the ancillary elements associated with the election process. Most voting machines today, from the well-known market leaders, are ‘reasonably’ secure from cyberattacks because the terminals are typically air-gapped from any connected network during the individual voting process. Any vote cast is usually stored locally and not transferred over a network until after the polls close and the tabulation occurs. One strategy of cybersecurity is limiting the attack surface and exposure to potential cyber threats. Nefarious actors have limited access during the actual casting of votes.”


“One primary example is the availability and integrity of the voter registration databases on election day. These voter registration databases are typically stored and maintained by county clerks and election commissioners. These databases are susceptible to cyber threats, just like any other database.”


“Unfortunately, many local governments are still struggling to increase their cyber defense capabilities and are easy targets. Cybercriminals wishing to disrupt the election process are likely targeting these voter registration databases months and even years leading up to election day. Incorrect or modified voter data could have an impact on the election process. Local governments responsible for the cyber protection of these databases should be working now to improve the cybersecurity posture associated with the voter databases.”


Connect with:
William "Bill" Rials

William "Bill" Rials

Associate Director, Professor of Practice, Information Technology

Bill is a nationally recognized subject matter expert on information technology.

You might also like...

Check out some other posts from Tulane University

1 min

Expert: Historic password breach creates public urgency for better password protection

Cybercriminals recently executed a significant breach, stealing the world’s most extensive collection of passwords. These stolen credentials, a staggering 10 billion unique passwords, have been uploaded to the notorious RockYou2024 database, a hub for cybercriminal activity. Tulane University cybersecurity expert Demetrice Rogers says the stolen passwords are a significant vulnerability for most users and underscore the need for strong password management. With malicious actors now armed with an extensive database of nearly 10 billion unique passwords, the risk of successful hacks on unsuspecting users is significantly higher. "The massive growth of the RockYou2024 password list shows just how tough it’s getting to keep our accounts safe. Hackers will love this list, making it a go-to tool for breaking into accounts. We need strong, unique passwords and multi-factor authentication to stay one step ahead. Think of it like locking your doors and setting the alarm—essential steps to keep the cybercriminals out." Rogers can cover: • How users can check to see if their information and passwords are included in the leak. • The importance of creating strong, unique passwords for each account and using reputable password managers to generate and store them securely. (Many users use the same password across multiple websites, making an attacker’s job much easier.) • Why adopting multi-factor authentication is increasingly important to ensure account security.

2 min

Are soaring home insurance rates in Gulf Coast states coming for the rest of the country?

The Gulf Coast faces an expected active 'above-normal' hurricane season, with many insurance carriers withdrawing from the market. Homeowners are left with skyrocketing rates and dwindling coverage options. Louisiana bore the brunt with four major hurricanes in 2020 and 2021, causing $75 billion in combined damage. The state passed a series of insurance reforms to attract more insurance companies, following in the footsteps of Florida. Insurance woes for homeowners aren’t just a coastal issue. Homeowners in the Midwest are struggling with insurance carriers because of damage from the record amount of tornadoes. Wildfires in the US are also a growing threat to insurance carriers, accounting for an annual total cost between $394 billion and $893 billion. Christopher Otten, an insurance and legal expert at Tulane University’s A. B. Freeman School of Business, is available to speak about the impact of new hurricane insurance regulations in several states, the challenges of holding insurance carriers accountable from state to state and the difficulties property owners face in finding hurricane insurance. Christopher can also discuss: • Why insurance markets differ among the states in the Gulf Coast region. • The Fortified Roof incentive programs • Affordability and the need for more carriers to improve competition and pricing risk. Christopher Otten Quote: “The Gulf States are the canaries in the coal mine right now for insurance markets,” Otten said. “It’s probably going to get worse before it gets better. A quiet hurricane season, as unlikely as that is, will help things some – but that doesn’t mean rates will not go up or down. They may increase less than they otherwise would have. With these new laws, particularly in Louisiana, it will take a hurricane for us to know how the new regulations are shaping out.” Contact Roger Dunaway, assistant director of media relations, for interviews at roger@tulane.edu.

2 min

Vulnerability exposed: Car dealerships grapple with fallout from cybersecurity attacks

Nearly 15,000 car dealerships across North America are still struggling to operate after a massive cyberattack has crippled their software systems. As more vehicles become connected to the Internet and reliant on digital systems, cyberattacks pose a serious risk to businesses and consumers. Tulane University cybersecurity expert Demetrice Rogers is available to discuss the next steps in auto industry recovery efforts and what other industries can learn from the incident to avoid repeat attacks. Professor Rogers can speak about: 1. The implications for data security and privacy and the possible compromise of sensitive customer data, including personal information and financial details. 2. Specific cybersecurity weaknesses within the automotive industry that made these car dealerships targets for the cyberattack. 3. Offer insights into effective cybersecurity measures and best practices that car dealerships can implement to strengthen their defenses against future cyber threats. Quote from Demetrice Rogers: “The preliminary reports indicate that the attack on CDK Global was a ransomware incident. Their systems will essentially be held hostage until specific demands, likely monetary, are fulfilled. Initial reports indicate CDK plans to pay the ransom, which could be tens of millions of dollars, to the attackers. I would expect systems to slowly come back online, with some data and processes unavailable until they have fully recovered.” “This situation highlights the critical need for an effective backup and disaster recovery program. Organizations should routinely test their recovery capabilities to ensure preparedness for such incidents. Additionally, it is generally recommended not to comply with hackers' demands or pay the ransom. While it is true that some companies opt to pay (though this is rarely publicized), it is usually more prudent to activate a well-prepared disaster recovery plan.” Contact Roger Dunaway, assistant director of media relations, for interviews at roger@tulane.edu.

View all posts