Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Cybersecurity: Everyone's Job
 

Small mistakes—like clicking phishing links or using weak passwords—can put company and personal data at risk. Stay alert, follow best practices, and report anything suspicious. Cybersecurity is everyone’s responsibility.

Quick Tips:

  1. Verify senders before clicking links or attachments
  2. Use strong, unique passwords + 2FA
  3. Keep devices and software updated
  4. Avoid unsecured Wi-Fi for work
  5. Report suspicious activity to IT/security

"Your actions protect the company"

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.


March 31, 2026 23:19 (3 days, 14 hours ago) |  0 | QR Ready | 1 minute read
Stay in Control
 

Scammers often rely on urgency to push you into reacting quickly, so always pause before clicking links, replying, or sharing personal information. Taking a few seconds to verify the sender, check the message for inconsistencies, and think about whether the situation makes sense can help you spot red flags. If a message feels urgent or pressuring, treat it as suspicious and confirm it through official apps or trusted contact channels first.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.


March 31, 2026 17:16 (3 days, 20 hours ago) |  0 | QR Ready | 1 minute read
Keep Secrets Secret
 

When using AI tools, never share sensitive information such as passwords, personal data, or financial details. Treat AI platforms as public spaces since your inputs may be stored or reviewed. Always verify AI-generated responses, especially when they include links. Use anonymized or placeholder data whenever possible to protect your privacy. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


March 30, 2026 16:59 (4 days, 20 hours ago) |  0 | QR Ready | 1 minute read
Caution Over Comfort
 

Be cautious when interacting with files, links, or messages, even if they come from coworkers or internal accounts, because compromised accounts or infected devices can spread harmful content without the sender’s knowledge. Always verify unexpected or unusual items through a separate channel, especially if the request seems urgent or out of context. When in doubt, report it to the data security team and avoid opening, clicking, or interacting with it until it has been confirmed as safe.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.


March 29, 2026 17:27 (5 days, 19 hours ago) |  0 | QR Ready | 1 minute read
Plug with Care
 

Avoid connecting work devices to public charging stations, as they may be compromised to steal data. Cybercriminals can use “juice jacking” techniques to access sensitive information through USB connections. Always use your own charger and plug into a trusted power outlet instead. Keeping your devices secure helps protect both personal and company data. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


March 26, 2026 17:43 (1 week, 1 day ago) |  0 | QR Ready | 1 minute read
Microsoft 365 Phishing Scam Spreads Across Five Countries
 

Cybersecurity experts are warning of a widespread email scam targeting Microsoft 365 accounts across more than 340 organizations in the U.S., Canada, Australia, New Zealand, and Germany. First spotted on February 19, 2026, the campaign has been rapidly spreading.

How it works:

  • Attackers send convincing fake emails to trick users.
  • Victims are directed to pages that appear to be official Microsoft login screens, where they are asked to enter a code.
  • Once entered, these codes give the attackers ongoing access to accounts—even if passwords are changed.

Industries affected include construction, healthcare, legal services, finance, real estate, and government.

Experts say the scam is particularly dangerous because it uses real Microsoft login systems, making it hard to spot. Organizations and individuals are advised to take precautions.

How to...


March 25, 2026 23:37 (1 week, 2 days ago) |  0 | 2 minutes read
Private Zone
 

Never share your device password with anyone—including friends, family members, or colleagues—as it protects your personal data, accounts, and identity from unauthorized access. Even people you trust can accidentally misuse your device, access sensitive information, or expose your data to others without your knowledge. To stay secure, always keep your password private, unlock your device yourself when granting access, and use safer alternatives such as supervising use or enabling guest features when needed.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


March 25, 2026 17:11 (1 week, 2 days ago) |  0 | QR Ready | 1 minute read
Your Device, Your Responsibility
 

Your company device is a gateway to sensitive data—keep it secure with simple habits:

  • Lock it when unattended,
  • Update software regularly,
  • Use strong passwords,
  • And avoid risky networks.

Things to Do and Things to Avoid:

Do:
• Lock your device when away
• Use strong passwords + 2FA
• Keep software updated
• Store device securely
• Report loss or suspicious activity immediately

Avoid:
× Leaving it unattended in public
× Using unsecured Wi-Fi
× Sharing passwords or access
× Installing unverified apps
× Ignoring security updates

"Protect your device, protect your...


March 24, 2026 16:53 (1 week, 4 days ago) |  0 | QR Ready | 1 minute read
Be Web Wise
 

Be careful about what you search for and download on the internet. Some links and files may contain hidden threats that can harm your device or steal your data. Always check if the source is trustworthy before proceeding. Staying cautious helps keep your information and system safe. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


March 24, 2026 17:03 (1 week, 3 days ago) |  0 | QR Ready | 1 minute read
Keep It Minimal
 

Keep your digital files organized by grouping them into clear folders and storing important information in one secure place so they are easier to manage and monitor. Regularly review your data and delete files, apps, or accounts you no longer need to reduce the amount of sensitive information exposed. By keeping only what is necessary, you lower the risk of data misuse in case your device or account is compromised.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


March 23, 2026 18:08 (1 week, 4 days ago) |  0 | QR Ready | 1 minute read
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi