Simply Secure — eWaste Recycling

e-waste

City-TOWN-County

  • North Port
    • Electronic items are referred to as E-Waste and can be recycled.  Please do not place them in your automated garbage container.  To dispose of electronic waste, please call Public Works Customer Service at 941-240-8050 to schedule a pickup. The following E-Waste can be recycled:
      • Computer towers
      • Laptops and tablets
    • Televisions, printers and computer monitors are considered garbage.  If you cannot fit them in your normal garbage tote, please schedule a bulk pick up by calling Customer Service at (941) 240-8050. 
  • Port Charlotte
    • Residents can bring their household hazardous waste to the County’s Mini-Transfer and Recycling Facilities. A select few household hazardous waste items can be picked up by the residential curbside service.
    • Charlotte County only offers these services for residential households, businesses must hire a hazardous hauler.
    • Unwanted electronics, e-waste, can be picked up on your regularly scheduled service day by request only. To schedule an E-Waste pickup with pickup request form or call Waste Management at 941.629.1106 or 941.697.0012 (Englewood area) 2 days prior to your scheduled pickup day.
  • Punta Gorda
    • Residents are allowed to place discarded electronics curbside for collection and proper disposal, including but not limited to
      • Computers, monitors, printers, TV, DVD, and VCR players
    • They will be collected same day as recycling collection but through a separate non-compacting truck
    • If an item cannot be picked up, an exception tag will be issued to notify the resident
  • Sarasota
  • Venice
    • Residential customers may dispose of household waste with hazardous components at times and locations designated by Sarasota County pursuant to the Sarasota County household hazardous waste collection program or pursuant to disposal methods authorized or recommended by the director.

Business – other

Disclaimer: We are not paid or compensated by any vendor for any product(s) or services listed. If you don’t like our recommendation(s), no need to send us your grievances! Paint the sky with rainbows and use whatever meets your needs!

Simply Secure – Internet is Forever

the internet is forever
The Internet is Forever

Without getting into the technical details, you can make certain assumptions about personal data on the internet. Don’t believe me? email me your name…that’s all…just your name…I’ll show you whats available.

  • If you
    • post something on a web page — backed up — retained forever
    • register at a website — backed up — retained forever
    • provide an email address — backed up — retained forever
    • write a blog — backed up — retained forever
    • tweet, insta, tikTok — backed up — retained forever
    • send or receive email — backed up — retained forever
    • post a selfie — backed up — retained forever
    • use a privacy browser, (TOR) — tracked by the NSA — forever
    • use a VPN — tracked by the NSA — forever
    • use a credit card — tracked — backed up — retained forever
    • are pregnant and go online — tracked — backed up — retained forever
    • use online payments — backed up — retained forever
    • pay property taxes to a city or state — backed up — retained forever
    • own and register a company — backed up — retained forever
    • file taxes with the IRS — backed up — retained forever
    • use a cellphone to call, text, etc., — backed up — retained forever
    • have a driver’s license — backed up — retained forever
    • registered to vote — backed up — retained forever
    • use a web browser like Chrome — screwed — backed up — retained forever

The right to ‘be forgotten’ only applies to search engines, (Google, Bing, Yahoo, etc.) — it does not force any providers of services listed above to remove you from their list.

The Internet is forever….

Simply Secure – Social Engineering

social engineering

Disclaimer: We are not paid or compensated by any vendor for any product(s) or services listed. If you don’t like our recommendation(s), no need to send us your grievances! Paint the sky with rainbows and use whatever meets your needs!

Social engineering is a technique hackers use to gain access to information they wouldn’t be able to access otherwise. These hackers manipulate people into giving up confidential information by pretending to be someone trustworthy, such as an HR representative or another employee. They do this by using personal details about you, your colleagues, or the company to get you to give them private information. Social engineering works because most people trust other people— especially those who seem like they belong somewhere. Sadly, social engineering remains one of the most successful hacker attacks. Let’s see why and how you can protect yourself from the scammers.

What Is Social Engineering and How Does it Work?

Social engineering is the use of psychological tricks to manipulate people into giving up confidential information. A scammer might pretend to be from IT and say the company’s network is down to get you to provide login credentials to your computer or the company’s network. Or, a scammer could pose as a vendor who needs you to wire them money for a product or service that doesn’t exist. The scammers use personal details about you, your colleagues, or the company to get you to give them private information. For example, a scammer might call and say she’s an HR representative and ask you to verify a new hire’s information. Or, a scammer might email you and say there’s a problem with your W-2 form and ask you to verify your tax information.

Why is Social Engineering So Successful?

Social engineering is so successful because people are naturally helpful. We want to be the good guy and help out whoever asks for it. Unfortunately, it just so happens that these scammers are experts in taking advantage of people’s kindness. They know how to ask for your help without coming off as creepy or suspicious. While it’s great to be helpful, you need to be careful how you show it. That’s because if you give a scammer confidential information, they can use it to cause real damage to you or other people. For example, if you give a scammer your login credentials, they can use it to log into your computer and access your information.

Don’t Use the Same password for everything

While it’s impossible to remember all of your different passwords, you shouldn’t use the same password for everything. If one of your accounts gets hacked, the hacker could easily access all of your other accounts. Because social engineers can pretend to be from almost any department or company, you can’t assume your normal login and password are enough to protect your account. Say you receive an email from your company’s HR department about your W-2 form. An impostor might send you an email with a link to a fake site where you’re asked for your W-2 information. If you have the same password for both accounts, one hacked account gives the hacker access to all of your accounts.

Be Careful When You Give Out Your Company’s Info

You may think you’re being helpful when you verify an impostor’s information. Unfortunately, you could be giving away confidential information that puts you and your company at risk. For example, the scammers could pretend to be a vendor you’re working with. They could ask you to confirm the company’s name and other details. Once you confirm their details, the scammers now know exactly how your company operates. They can use this information to launch another attack in the future.

Bottom line

The best way to protect yourself from social engineering is to be aware of what’s happening. You can’t prevent scams if you don’t know about them. Plus, it’s easy to avoid falling for a scam if you know what to look for. If you get an email or phone call from someone asking for your confidential information, question it. Don’t give out information unless you’re 100% sure it’s legitimate. If you get a call or email from someone asking for your information, don’t act quickly. Think about how they got your information. If you can’t figure it out, don’t give out any information. For example, a scammer might say he’s from your accounting department and wants to confirm your W-2 form. The scammer might say he accidentally sent it to your email instead of your accounting department. Don’t fall for it. Your accountant would never contact you directly. Plus, they’d know the correct email address.

Simply Secure – Browsers

browser

Disclaimer: We are not paid or compensated by any vendor for any product(s) or services listed. If you don’t like our recommendation(s), no need to send us your grievances! Paint the sky with rainbows and use whatever meets your needs!

  • If you don’t care about privacy
  • If you care a little bit about privacy
  • If privacy is really important to you
    • Tor
      • Please note, use of Tor is typically flagged by the NSA
    • LibreWolf
  • Browser extensions we like
  • Search engines we like
  • Recommended browser configuration settings
    • Enable automatic updates
    • Disable unused add-ons
    • Block 3rd party cookies
    • Uninstall Flash
    • Clear history frequently
    • Clear cookies frequently
    • Disable location tracking
    • Disable sensor tracking
    • Disable camera/microphone access
    • Disable Autofill
    • Disable automatic password save
    • Disable pop-up notification
      • Do NOT click on a pop-up unless you are sure what it is
    • Ask before running Javascript
    • Use Incognito/Private mode