Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Phishing Without Passwords: New Scam Turns App Permissions Into Entry Points
 

A new phishing operation called EvilTokens has compromised more than 340 Microsoft 365 organizations across five countries just weeks after launching in February 2026, raising concerns over a new style of cyberattack that can bypass traditional security measures.

Unlike common phishing scams that steal passwords, the attack tricks users into approving access themselves. Victims received messages asking them to enter a code on Microsoft’s legitimate login page and complete their normal multi-factor authentication (MFA). Everything appeared routine, but by approving the request, users unknowingly gave attackers long-term access to emails, files, calendars, and contacts.

Cybersecurity experts say this method is especially dangerous because no password is stolen and no suspicious login is triggered. Since users complete the login process themselves, security systems often see the activity as legitimate.

Researchers warn that people have become too...


May 20, 2026 17:38 (14 hours, 30 minutes ago) |  0 | 2 minutes read
Clean Your Trail
 

Regularly clean up your digital footprint by deleting old accounts, removing unused apps, and reviewing what personal information you share online. Forgotten accounts and outdated services can become easy targets for hackers, especially if they contain old passwords or sensitive details. Keeping only the accounts and apps you actively use helps reduce your online exposure and lowers the risk of unauthorized access to your data.

Do you have a question? Submit a ticket at [PB-8324] Tech QuickSupport Request.


May 20, 2026 17:15 (14 hours, 53 minutes ago) |  0 | QR Ready | 1 minute read
Secure the You at Work
 

Your digital identity at work includes your login credentials, email, devices, and online activity, and it’s a major target for cybercriminals. A weak password, careless click, or unprotected device can lead to data breaches, identity theft, or business disruption.

What to protect:

  • Work email and usernames
  • Passwords and authentication methods
  • Company devices, apps, and systems access

How to protect it:

  • Use strong, unique passwords
  • Enable multi-factor authentication (MFA)
  • Lock your screen when away
  • Be careful with emails, links, and attachments
  • Keep software and devices updated

“Protect...


May 19, 2026 18:53 (1 day, 13 hours ago) |  0 | QR Ready | 1 minute read
Clean Space, Safe Place
 

Keep your workspace secure by following a clean desk policy, which means removing or properly storing any sensitive information when you are not actively using it. Avoid leaving passwords on sticky notes or in plain sight, and instead use secure tools like password managers or multi-factor authentication to protect your accounts. Always lock away confidential documents in secure drawers or cabinets to prevent unauthorized access and reduce the risk of data breaches.

Do you have a question? Submit a ticket at [PB-8324] Tech QuickSupport Request.


May 19, 2026 17:23 (1 day, 14 hours ago) |  0 | QR Ready | 1 minute read
Safe by Default
 

Make online safety part of your daily routine by using strong and unique passwords, enabling two-factor authentication, and keeping your devices and apps updated regularly. Always think carefully before clicking links, opening attachments, or sharing personal information online, as many cyberattacks rely on fake messages and human error to succeed. Practicing small but consistent security habits can greatly reduce the risk of hacking, scams, identity theft, and data loss while helping you maintain a safer digital experience.

Do you have a question? Submit a ticket at [PB-8324] Tech QuickSupport Request.


May 18, 2026 17:04 (2 days, 15 hours ago) |  0 | QR Ready | 1 minute read
Every Account Matters
 

Many people think they are not important enough to be hacked, but cybercriminals target both individuals and companies through weak passwords, fake messages, and careless online habits. A single compromised account can expose personal data, financial information, or even sensitive corporate systems and files. Simple actions like using strong passwords, enabling two-step verification, and avoiding suspicious links can greatly improve cybersecurity for everyone.

Do you have a question? Submit a ticket at [PB-8324] Tech QuickSupport Request


May 17, 2026 17:38 (3 days, 14 hours ago) |  0 | QR Ready | 1 minute read
Your Posts Talk
 

Cybercriminals often study social media profiles to gather personal details they can use in targeted scams. Oversharing information such as birthdays, locations, workplaces, or travel plans can make phishing messages appear more convincing. Adjust your privacy settings and be selective about what you post publicly online. Always verify unexpected messages or requests, even if they seem to come from someone familiar. 

Do you have a question? Submit a ticket at [PB-8324] Tech QuickSupport Request.


May 14, 2026 16:46 (6 days, 15 hours ago) |  0 | QR Ready | 1 minute read
Android Enhances Security with Intrusion Logging Feature
 

Google has introduced a new Android feature called Intrusion Logging to help detect advanced spyware attacks. The feature is part of Advanced Protection Mode and records device activities such as app usage, network connections, USB transfers, and device lock activity. It was developed with Amnesty International and Reporters Without Borders to support people at higher risk of surveillance, like journalists and activists.

The logs are encrypted and securely stored on Google servers, and only the device owner can access them. Even Google cannot view the data. The logs are kept for 12 months before being automatically deleted, although users can download them if needed. The feature can also record network activity during Chrome Incognito browsing, but it does not show exact pages visited.

Google also announced new Android security updates, including protection against banking scams, stronger malware detection, scam alerts for messages, better phone recovery tools, and...


May 13, 2026 18:28 (1 week ago) |  0 | 1 minute read
Snap Smart
 

Avoid saving photos of credit cards, IDs, passwords, or recovery codes in your phone gallery because they can be exposed if your device is stolen, hacked, or synced to the cloud. Regular photo galleries are designed for convenience, not security, making sensitive images easier to access and misuse. Instead, store important information in secure notes apps, password managers, or locked folders for better protection. 

Do you have a question? Submit a ticket at [PB-8324] Tech QuickSupport Request.


May 13, 2026 16:52 (1 week, 1 day ago) |  0 | QR Ready | 1 minute read
Inbox Alert: Handle with Care
 

Not every email deserves a reply. Suspicious messages with urgent requests, unknown senders, or strange attachments may contain phishing, malware, or scams. Instead of replying, report them to your IT security team to help protect your account, coworkers, and organization.

Know the Difference

Replying Can:
• Confirm your email is active
• Trigger more scam emails
• Lead to stolen data or malware

Reporting Helps:
• Alert security teams
• Block threats for others
• Improve phishing detection

Red Flags:
• Urgent or threatening language
• Unexpected links or attachments
• Misspelled sender names or...


May 12, 2026 17:09 (1 week, 1 day ago) |  0 | QR Ready | 1 minute read
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi