Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Trust No Voice
 

Voice phishing, or "vishing," is a scam in which attackers impersonate trusted sources over the phone to steal personal information. Scammers may fake caller IDs to appear as banks, e-wallet providers, government agencies, or tech support. Never trust a call asking for immediate action, never click on links sent via SMS by the caller, and never provide personal information. Always hang up and call the official number directly if you’re unsure. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.


August 25, 2025 17:21 (19 hours, 9 minutes ago) |  0 | QR Ready | 1 minute read
Stay Wallet-Wise
 

As e-wallets and digital banking become a part of everyday life for many of us, it's important to take steps to protect our personal and financial information. Use strong, unique passwords and enable multi-factor authentication to keep your accounts secure. Watch out for phishing scams by avoiding suspicious links, never sharing sensitive information through emails, messages, or calls, and only downloading apps from official sources. Also, avoid using public Wi-Fi when accessing your financial accounts to reduce the risk of cyberattacks.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support

 


August 24, 2025 20:37 (1 day, 15 hours ago) |  0 | QR Ready | 1 minute read
Verify Before You Reply
 

Be cautious of unsolicited phone calls requesting personal or financial information, even if the caller claims to be from a trusted organization. Scammers can make it look like they’re calling from a real company or local number to trick you, and they often use urgent language to pressure you into revealing sensitive details. If you’re unsure, hang up and call the company back using a verified phone number from their official website.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


August 21, 2025 17:33 (4 days, 18 hours ago) |  0 | QR Ready | 1 minute read
Surge in Android Malware Exploiting Device Features for Financial Theft
 

A new Android malicious software called PhantomCard is targeting bank customers in Brazil by stealing credit and debit card data using NFC (near-field communication). The malware copies card info from a victim’s phone and sends it to criminals, who can then make fake payments.

PhantomCard spreads through fake Google Play pages offering a “card protection” app called Proteção Cartões, tricking users with fake positive reviews. When users install it and place their card near the phone, the app steals card details and PINs and sends them to attackers.

This malware allows criminals to use the victim’s card remotely, making transactions at nearby payment terminals or ATMs. It’s linked to a Chinese group selling similar malware services on Telegram.

Similar NFC-based fraud is growing in other countries, including the Philippines and India, where fake banking apps and malware spread through WhatsApp and phishing sites....


August 20, 2025 19:45 (5 days, 16 hours ago) |  0 | 2 minutes read
Stay Wary, Not Sorry
 

Always be cautious—it's a smart habit. A healthy level of suspicion can help you notice red flags before they become real threats. Don’t automatically trust emails, links, attachments, or anyone claiming to be from your company, even if they appear to come from someone you know. Taking a moment to double-check can prevent costly mistakes. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


August 20, 2025 19:39 (5 days, 16 hours ago) |  0 | QR Ready | 1 minute read
Not Every File Is Your Friend
 

Some files hide malware—especially .exe, .scr, and .vbs. Always verify the source. It's easier to prevent damage than fix it.

Do:

  • Pause before opening unknown files
  • Check unfamiliar extensions
  • Confirm with the sender
  • Scan with antivirus/security tools

Avoid:

  • Trusting files from unknown sources
  • Assuming a file is safe based on appearance
  • Skipping antivirus updates

“Files can lie—trust your gut, not the icon.”

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


August 19, 2025 17:26 (6 days, 19 hours ago) |  0 | QR Ready | 1 minute read
Tricks in Disguise
 

Avoid clicking on ads, even if they seem trustworthy—they’re often used to spread malicious software. Cybercriminals can disguise harmful content behind professional-looking advertisements. These malicious ads may redirect you to fake sites or automatically download harmful software. Just one wrong click can compromise your device or steal your personal information. For better security, always go directly to a website rather than clicking on ads. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


August 19, 2025 17:02 (6 days, 19 hours ago) |  0 | QR Ready | 1 minute read
Zip It Secure
 

Avoid storing or sending sensitive information, such as passwords or personal data, in plain text. Without encryption, this information can be easily intercepted or accessed by attackers, putting your accounts and privacy at risk. To stay protected, always use secure communication channels like HTTPS or VPNs, and store data using strong encryption methods.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


August 18, 2025 16:35 (1 week, 1 day ago) |  0 | QR Ready | 1 minute read
Trust Official, Not Caller
 

If you receive an unexpected call from someone claiming to be from the government or tech support asking you to install an app, it's likely a scam. These attackers often create a false sense of urgency or offer "help" to avoid in-person processes, then guide you to install malware disguised as a legitimate tool. No official agency or company will ever ask you to download an app through a call or email link. Always hang up and verify the request through trusted, official contact channels. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


August 17, 2025 17:13 (1 week, 1 day ago) |  0 | QR Ready | 1 minute read
Trust Less, Verify More
 

Effective cybersecurity follows the Zero Trust principle: never automatically trust any device or person, even if they’re inside your organization. Always verify requests, use strong, unique passwords, and enable multi-factor authentication (MFA) to protect your accounts. Make sure to access sensitive information only through secure, approved devices and applications, and stay cautious to keep your data safe.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


August 14, 2025 17:13 (1 week, 4 days ago) |  0 | QR Ready | 1 minute read
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi