Skip to main content

Thurston County, Washington

The content on the Thurston County website is currently provided in English. We are providing the “Translation” for approximately 10 languages. The goal of the translation is to provide visitors with limited English proficiency to access information on the website in other languages. The translations do not translate all types of documents, and it may not give you an exact translation all the time. The translations are made through an automated process, which may not result in accurate or precise translations, particularly of technical and legal terminology.

Auditor

Welcome to the Thurston County Auditor’s Office! We are honored to serve you. 

The Auditor’s Office provide a range of important services, including:

In 2017, the Department of Homeland Security designated elections systems as one of 18 critical infrastructure sectors in the U.S. This designation—the result of increased risk of cyberattacks on election systems—makes additional cybersecurity resources available to election administrators. 

As the office that runs federal, state, and local elections in Thurston County, we take election security, including cybersecurity, very seriously. Our office maintains voting equipment and software integrity, ensures our election administrators receive required training and certification, and keeps county voter registration lists updated within the statewide voter registration database.

We’re proud that our office has adopted cybersecurity as a top priority and has led efforts at the county to prepare for attacks. Some of our achievements in cybersecurity include:

  • Spearheading the creation of a Thurston County Cybersecurity Task Force
  • Participating in a number of cybersecurity trainings, including a two-day cybersecurity training provided by FEMA
  • Joining national cybersecurity membership organizations like the Center for Internet Security (EI-ISAC, MS-ISAC)
  • Partnering with the Department of Homeland Security to improve our cyber posture

In addition to the cybersecurity measures we’ve taken, we also use elections best practices for security, including air-gapped ballot tabulators (vote counting equipment not connected to internet) and paper ballots, among others.

For more cybersecurity resources—both personal and professional—you can visit: