Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Boundaries Matter
 

Always keep your personal and work lives separate online. Avoid using your work email or accounts to sign up for personal or potentially risky websites. Likewise, don’t use personal accounts to access work-related tools or data. This separation helps protect both your personal privacy and your organization’s security. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


September 15, 2025 17:03 (5 hours, 47 minutes ago) |  0 | QR Ready | 1 minute read
Ask IT First
 

Before installing or using any new software at work, always get approval from your IT department. Using unapproved tools can bypass security controls and potentially expose sensitive company data to cyber threats. Sticking to approved applications helps keep systems secure and ensures compliance with company policies.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


September 14, 2025 17:18 (1 day, 5 hours ago) |  0 | QR Ready | 1 minute read
Clip It Carefully
 

Be careful when copying and pasting text, especially from documents or emails. Sensitive information like passwords, personal details, or confidential data can accidentally be shared or stored in clipboard history. Always double-check what you’ve copied before pasting it into chats, browsers, or other applications. Staying mindful helps protect your data and your organization’s security. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


September 11, 2025 17:13 (4 days, 5 hours ago) |  0 | QR Ready | 1 minute read
Advanced Malware Threats Found Across Multiple Operating Systems
 

Cybersecurity experts have found two new malicious software threats: CHILLYHELL and ZynorRAT. CHILLYHELL targets macOS and is designed to secretly control infected devices. It can steal data, crack passwords, and run hidden commands. It connects to a remote server and stays hidden using multiple tricks. This malware was notarized by Apple in 2021, which made it harder to detect, but its certificate has now been revoked. It's believed to be linked to a hacking group active since 2022.

ZynorRAT targets Windows and Linux systems and is controlled through a Telegram bot. It can steal files, take screenshots, run commands, and stay active on the device. It first appeared in July 2025 and may still be under development. It spreads through file-sharing sites and may have been tested by its own creator, possibly a lone hacker.

Simple Safety...


September 10, 2025 17:47 (5 days, 5 hours ago) |  0 | 2 minutes read
Fit and Protected
 

Fitness trackers are great tools for monitoring your health, but because they connect to the internet and handle sensitive personal data, it’s important to prioritize security. Protect your device by using strong, unique passwords, keeping its software and apps up to date, and only connecting to trusted networks. Additionally, regularly review your privacy settings and be cautious about sharing personal health and location information to minimize the risk of unauthorized access or data breaches.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


September 10, 2025 17:01 (5 days, 5 hours ago) |  0 | QR Ready | 1 minute read
OTP? Definitely Not for Sharing!
 

OTPs secure your accounts and should never be shared. Scammers may pose as tech support or send urgent messages to trick you. If asked for your OTP, refuse and disconnect immediately.

Best Practices:

  • Never share OTPs—even with banks or tech support
  • Be cautious of urgent or suspicious messages
  • Trust your instincts—if it feels wrong, it probably is
  • Use app-based authentication over SMS
  • Don’t reuse phone numbers or emails for sensitive accounts

“Code it. Use it. Lose it. Never share it.”

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


September 9, 2025 16:23 (6 days, 6 hours ago) |  0 | QR Ready | 1 minute read
Look Twice, Think Twice
 

Be cautious about what you see and hear—deepfakes are real. Scammers use AI to create fake videos and voice recordings that look and sound convincing. If a message or media seems unusual or out of character, take the time to verify it through trusted channels. Staying skeptical can help you spot deception before it causes harm. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


September 9, 2025 16:46 (6 days, 6 hours ago) |  0 | QR Ready | 1 minute read
Secure Your Surf
 

Malicious software can silently infect your device simply by visiting a malicious website, especially if your browser or plugins are outdated. To protect yourself, always keep your browser and plugins updated, use trusted antivirus software, and avoid suspicious or unknown websites. Following these steps helps safeguard your device from hidden threats and cyberattacks.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


September 8, 2025 17:22 (1 week ago) |  0 | QR Ready | 1 minute read
Think Before You Link
 

Think twice before posting about your job, projects, or workplace on social media or public forums. Cybercriminals can use this information for social engineering or targeted attacks. Even small details can help them build a convincing scam. Protect your organization by keeping sensitive work information private. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


September 7, 2025 17:20 (1 week, 1 day ago) |  0 | QR Ready | 1 minute read
Secure Site Only
 

Before entering any personal information or passwords, always look for the padlock icon in the address bar and make sure the website uses HTTPS. Be cautious of suspicious links, pop-ups, or unexpected emails, as they may lead to phishing scams. Keeping your browser and operating system up to date helps protect you from the latest online threats.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


September 4, 2025 17:30 (1 week, 4 days ago) |  0 | QR Ready | 1 minute read
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi