Our office takes cybersecurity seriously and is committed to run safe and secure elections. We work with our local, state, federal, academic and vendor partners to ensure every available defense is used.
We manage physical and technical controls to reduce risk as much as possible. Our tools include intrusion detection systems, physical security standards, multifactor authentication and equipment upgrades. None of our voting machines are online or connected to any phone lines. The voting machines and tabulators are not connected to the internet or to each other. Public tests are conducted prior to every election and are open to the public. We perform post-election voting system cybersecurity sweeps and election results audits.
Our early voting machines will be equipped with a VVPAT (Voter Verifiable Paper Audit Trail) which will allow voters to view their voting decisions on paper before casting their vote. The paper trail will be retained by the election board office in a locked ballot box. After the election, a risk limiting audit can be conducted to compare the machine's tabulation to the paper ballot counts, providing another layer of confidence regarding election results.
We also establish administrative controls including chain of custody and bi-partisan representation. We implement procedures that define roles, responsibilities and functions needed to manage the environment. We encourage all our staff and vendors to take election security seriously. Employees are trained to detect, recognize and report any threats.
There is no such thing as perfect security. Even with all of these steps, there are always new recommendations and best practices. The way we administer elections will continue to evolve as new technology and threats become apparent.