Washington County Sheriff - Current Articles

The Washington County Sheriff's Office offers articles on safety, current events, traffic violations, public safety and more. Look for timely information and tips on this & what's happening at the Sheriff's Office.  Check out our Archived Articles.

Receive up-to-the-minute news about our Office: Sign up for our e-bulletins


Community Information


Protect Your Privacy Online

Protect your privacy and avoid identity theft.
Cyber security, phishing, worms, firewalls, Trojan horses, hackers, and viruses seem to be in the news every day. Plus warnings to update your virus protection, watch out for online scams, protect your privacy, and watch what you click on are everywhere. But what does it all mean? And what can you do to safeguard access to your computer and to protect yourself and your family? What is this all about?

The first step in protecting yourself is to recognize the risks and become familiar with some of the terminology associated with cyber security. The Department of Homeland Security created this list of terms: Hacker, attacker, or intruder - These terms are applied to the people who seek to exploit weaknesses in software and computer systems for their own gain. Although their intentions are sometimes fairly benign and motivated solely by curiosity, their actions are typically in violation of the intended use of the systems they are exploiting. The results can range from mere mischief (creating a virus with no intentionally negative impact) to malicious (stealing or altering information).
Malicious code includes code such as viruses, worms, and Trojan horses. Although some people use these terms interchangeably, they have unique characteristics:

Minimize the Access Other People Have to Your Information

It is probably easy for you to identify people who could gain physical access to your computer—family members, roommates, co-workers, members of a cleaning crew, and maybe some others. But identifying the people who could gain remote access to your computer becomes much more difficult. As long as you have a computer and connect it to a network or the internet, you are vulnerable to someone or something else accessing or corrupting your information. Luckily, you can develop habits that make it more difficult.

Do You Think You are a Victim?

Article by USA.gov
http://www.usa.gov/topics/family/privacy-protection/online.shtml

 

Back to Top

 


Severe Weather Preparedness Tips

Did you know that hundreds of people die each year in the United States due to weather related incidents?  Additionally, thousands of people are injured by these weather events each year. Don’t let it happen to you.

Tornadoes

Tornadoes can produce winds greater than 300 mph, and can travel across the ground at up to 60 mph.  They can develop any time of day, any month of the year, but are most common in the afternoon and evening, and in the spring and fall.  Tornadoes are most common across the Great Plains and Gulf States regions of the US.  More tornadoes occur in the United States than any other country in the world, and more tornadoes occur in Texas than any other state.

Below-ground shelters, and reinforced "safe rooms" provide the best protection against tornadic winds. 

Other options include:

In homes or small buildings, go to the northeast corner of a basement.  If a basement is not available, go to the smallest, most-interior room on the lowest floor, such as a closet or bathroom. Cover yourself to protect your body from flying debris.

In schools, hospitals, factories or shopping centers, go to the smallest, most-interior rooms and hallways on the lowest floor. Stay away from glass enclosed places or areas with wide-span roofs such as auditoriums and warehouses. Crouch down and cover your head.

In high rise buildings, go to the smallest, most-interior rooms or hallways. Stay away from exterior walls and windows.

In cars or mobile homes, abandon them immediately!! Cars and mobile homes provide no protection from tornadic winds. If you are in either of those locations, leave them and go to a substantial structure or designated tornado shelter. Do not attempt to seek shelter beneath an overpass or bridge.  They provide little or no shelter and have proved to be deadly options.

If caught in the open, lie flat in a culvert, ditch or depression and cover your head.

Lightning

Lightning is a threat anywhere thunderstorms occur.  If you hear thunder, it is time to take shelter.

When inside:

- Avoid using the telephone, or other electrical appliances.
- Do not take a bath or shower, or stand near plumbing.

If caught outdoors:

- Seek shelter in a sturdy building.  A hard-top automobile can also offer protection.
- If you are boating or swimming, get out of the water and move to a safe shelter on land.
- If you are in a wooded area, seek shelter under a thick growth of relatively small trees.
- If you feel your hair standing on end, squat with your head between your knees. Do not lie flat!
- Avoid isolated trees or other tall objects, water, fences, convertible cars, tractors and motorcycles.

Flash Floods

Flash Floods develop quickly.  They can occur anywhere, along rivers or creeks, in low water crossings or in a dry stream bed. They can occur during any month and at any time during the day. In fact, flash floods often occur at night when it is difficult to find an escape route.  Flash floods can be deceptive. Flood waters are likely deeper and moving faster than you think.

When driving:

- Avoid low water crossings.
- Use alternate routes to avoid flood prone areas.
- Leave your vehicle immediately if it stalls in flood waters.
- Move to higher ground if you can do so safely.
- Most cars and light trucks will begin to float in as little as 12" of water.
- Act quickly, rising waters make vehicle doors difficult to open.

If you are outside:

- Stay away from flooded creeks, streams or drainage ditches.
- Swiftly flowing water can sweep away even the strongest swimmers.
- Soggy banks can collapse, dumping you into flood waters.

 

Article by Texas Severe Storm Association
http://www.tessa.org/safety_tips.html

 

Back to Top

 


Email and Web Scams

When you read email or surf the Internet, you should be wary of scams that try to steal your personal information (identity theft), your money or both. Many of these scams are known as "phishing scams" because they "fish" for your information.

How to recognize scams
New scams seem to appear every day. You can learn to recognize a scam by familiarizing yourself with some of the telltale signs.

Scams can contain the following:

Popular scams

Here are some popular scams that you should be aware of:

Scams that use the Microsoft name or names of other well-known companies. These scams include fake email messages or websites that use the Microsoft name. The email message might claim that you have won a Microsoft contest, that Microsoft needs your logon information or password, or that a Microsoft representative is contacting you to help you with your computer. (These fake tech-support scams are often delivered by phone.)

Lottery scams. You might receive messages that claim that you have won the Microsoft lottery or sweepstakes. These messages might even look like they come from a Microsoft executive. There is no Microsoft Lottery. Delete the message.

Rogue security software scams. Rogue security software, also known as "scareware," is software that appears to be beneficial from a security perspective but provides limited or no security, generates erroneous or misleading alerts, or attempts to lure you into participating in fraudulent transactions. These scams can appear in email, online advertisements, your social networking site, search engine results, or even in pop-up windows on your computer that might appear to be part of your operating system, but are not.

How to report a scam

You can use Microsoft tools to report a suspected scam.

 What to do if you think you have been a victim of a scam

If you suspect that you've responded to a phishing scam with personal or financial information, take these steps to minimize any damage.

Tools to help you avoid scams

Microsoft offers several tools to help you avoid phishing scams when you browse the Web or read your email.

Back to Top

 


 

Can't find the article you were looking for? Check out the Archive Link below for more articles:

Archived Articles List

Back to Top

 


Information and recommendations are compiled from sources believed to be reliable. The Sheriff’s Office  makes no guarantee as to and assumes no responsibility for the correctness, sufficiency or completeness of such information or recommendations. Other or additional safety measures may be required under particular circumstances.