• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security, News

Cybersecurity Remains Inadequate Following 2016 Election

Despite the fact that scandals relating to cybersecurity and privacy policy riddled headlines following the presidential election, there has been little federal reform in those realms.

June 18, 2019 Sam Harton 1 Comment

Proofpoint CISO, CISOs cyberattack
Gorodenkoff/stock.adobe.com

The Russia investigation has been a point of political contention and controversy as well as a common buzzword in social media posts and mainstream news headlines. Robert Mueller’s investigation was primarily an investigation into the allegations the the president had obstructed justice and colluded with with Russia in order to win the 2016 election. The Special Counsel’s politicized investigation revealed, dissected, and abstracted many things, but the report also revealed that the election did little to raise concerns about the importance of political cybersecurity, according to CNBC.

One of the biggest scandals of the election was the Cambridge Analytica incident, in which Facebook’s inadequate cybersecurity and privacy policies that extracted data without people’s consent and allowed Russian operatives to influence the 2016 election in Donald Trump’s favor. Mueller’s report, however, did not dive extensively into this matter, having only said this:

“…a private Russian entity engaged in a social media operation where Russian citizens posed as Americans in order to influence an election.”

So while the report did recognize that foreign exploitation of social media did have a role in skewing the election, it did not do much to call on any sort of widespread cybersecurity reform.

But the federal government should be concerned about the need for better cybersecurity, and not just in the way of social media. Political operatives who fail to correctly secure their various password protected accounts leave sensitive information vulnerable to foreign entities.

Many who worked at the DNC headquarters kept easily deciphered passwords and bypassed many opportunities to more tightly secure information, allowing foreign hackers to access information that they used to influence the election. The left was not the only group affected, as many people close to Trump associated with fake social media accounts that a basic security screening service would have blocked.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cyber Security

Related Content:

  • Yealink MeetingBoard Pro Yealink Launches MeetingBoard Pro to Elevate Meeting Equity…
  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Comments

  1. Thomas says

    June 28, 2019 at 8:33 am

    Very informative post. Cybersecurity has been the issue in all over the world. As computer field is growing so fastly in the same way its risk and security issues are also increasing. The world is becoming a computerized globe because almost everything is depending on computers so that is why cybersecurity is also becoming one of the worst nightmare of people.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.