Lincoln County Emergency Management accepts volunteers to work prior, during, and post emergencies. We also accept volunteers that are interested in working on daily projects. If you are interested in volunteering, please fill out this form and email it to or mail it to 250 W College St., Troy MO 63379.

Facebook Posts

DON'T HELP A HACKER: Most of us are "guilty" of it at some point - guilty of posting a seemingly innocent comment or photo on social media that, in reality, gives away clues to our personally identifiable information. Think about it. All those posts about where our children go to school, their teachers, our jobs, our favorite restaurants, our vacation plans, our military service, where and when we went to school, our birthday, our class reunions . . . it's a long list.

If someone was interested in finding out all they could about you and your family, how hard would it be? And how much of what we post has at least some relationship to our login information (at work, at the bank, on social media, etc.)?

Hackers and other cybercriminals are already good at what they do - we don't need to make it any easier for them. A good rule to follow is, "If you wouldn't share the information with a stranger face-to-face, don't share it on social media."
... See MoreSee Less

CYBER-CRIME AWARENESS: It's hard to turn on your computer or TV and not hear about an organization or person that has been the victim of some type of scam, cyber-crime, or cyber-attack. Over the next week or so we'll be posting information about some of the more prevalent scams and scenarios. If this information helps prevent even one person from becoming the victim of a cyber-criminal, that's a win in our book.

Today we'll start with a cyber-attack known as an "email bomb." This type of attack can be just a nuisance, or can be a real denial-of-service attack, and consists of massive amounts of email being sent to one or a few specific addresses. Sometimes this is accomplished through a bot net or "zombie" net - computers that have been taken over by the cybercriminal through malware. Sometimes the targeted addressee has been unknowingly subscribed to numerous email subscription services (and therefore receives almost continuous spam). A new version is a ZIP attack: an email with a compressed attachment consisting of millions or even billions of random characters. Since email servers check attachments for viruses, etc., this type of attack eats up a tremendous amount of time and power.

Email bombs are often used as cover for other, more serious and insidious cyber-attacks. While you're dealing with the very visible effects of the email bomb, worse things may be happening behind the scenes.
... See MoreSee Less