Simply Voting will be closed for the holidays from December 21, 2015 until January 1, 2016. If you require emergency support during that time please fill out the support form on our website, set the priority to “emergency”, and someone will follow up with you shortly. We wish all of […]
Simply Voting just got greener! At Simply Voting, we recognize the importance of managing our environmental impact. We are excited to announce we’re taking a big step to reduce the carbon emissions footprint of our business by choosing 100% green electricity for our company. Bullfrog Power ensures that the same amount […]
Sometimes change is a good thing. While the old version of the Simply Voting website served its purpose well, Simply Voting has grown and matured. Our brand should reflect the fact that our company is an enterprise-level provider of online voting solutions. After months of planning, designing and fine-tuning… we […]
More than ever, electric cooperatives are under pressure to demonstrate that their voting events are fair and impartial. Simply Voting’s technology and expertise provides co-ops with a completely secure and impartial solution that helps the co-op connect with membership and membership connect with the co-op. To help more electric cooperatives […]
Simply Voting will be closed for the holidays from December 22, 2014 until January 4, 2015. If you require emergency support during that time please fill out the support form on our website, set the priority to “emergency”, and someone will follow up with you shortly. We wish all of […]
Simply Voting received the highest CloudTrust Rating from Skyhigh Networks. Skyhigh performs objective and thorough evaluations of cloud services based on a detailed set of criteria developed in conjunction with the Cloud Security Alliance (CSA). Services designated as Skyhigh Enterprise-Ready fully satisfy the most stringent requirements for data protection, identity […]
By now, you may have heard about “Heartbleed” which is a bug impacting the security of websites. Our engineers have confirmed that this security bug has no impact on our systems as they aren’t running the affected versions of OpenSSL (versions 1.0.1 through 1.0.1f). Should you have any questions or concerns, please contact support.