Have some tips? Write it down and share it to your friends!
Click Login Now button to start!

Phishing happens when attackers impersonate trusted people or organizations via email or SMS to steal info or cause harm. Verify senders, avoid clicking suspicious links, and report anything unusual.
Quick Tips:
- Check sender addresses carefully
- Hover over links to see the real URL
- Never share passwords or personal info
- Watch for spelling or unusual language
- Report suspicious messages to IT/security
“Spot the fake, protect your data!”
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.
March 17, 2026 17:23 (18 hours, 15 minutes ago) | 0 | QR Ready | 1 minute read
Always keep your web browsers updated to the latest version. Updates often include important security patches that protect against malicious software and data breaches. Using outdated browsers can leave your personal and sensitive data vulnerable. Regularly updating ensures safer browsing and a more secure online experience.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.
March 17, 2026 17:17 (18 hours, 21 minutes ago) | 0 | QR Ready | 1 minute read
Avoid using personal information such as birthdays, names, or favorite things when creating passwords because these details are often easy for others to guess. Many attackers can find this information on social media or other online platforms and use it to try to access your accounts. To improve security, create passwords that do not relate to your personal life and are harder for others to predict.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support
March 16, 2026 16:52 (1 day, 18 hours ago) | 0 | QR Ready | 1 minute read
Never use cracked or unlicensed software on company devices, as it can introduce malicious software or viruses. Only install software that has been reviewed and authorized by your IT department to ensure it meets company security standards. Keep all approved applications and systems regularly updated with the latest patches to protect against threats. If you notice unusual behavior, suspicious files, or potential security issues, report them to IT immediately to prevent data loss or breaches.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.
March 15, 2026 17:08 (2 days, 18 hours ago) | 0 | QR Ready | 1 minute read
Always lock your device whenever you step away from it, even if it is only for a short time. Leaving your phone, tablet, or computer unlocked allows other people to easily access your personal information, messages, or accounts. You should also enable automatic lock so your device locks itself after a short period of inactivity in case you forget to lock it manually.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.
March 12, 2026 16:53 (5 days, 18 hours ago) | 0 | QR Ready | 1 minute read
Tech company Meta has removed more than 150,000 accounts linked to online scam operations in Southeast Asia, as part of a joint effort with authorities from several countries including the Philippines, Thailand, United States, United Kingdom, and Singapore.
The company said the operation also led to 21 arrests by the Royal Thai Police. It follows a previous crackdown in December 2025 that removed around 59,000 accounts, pages, and groups connected to scam networks.
Meta warned that many scams today are run by organized groups operating in countries such as Cambodia, Myanmar, and Laos, often targeting people online through fake job offers, messages, or fraudulent ads.
To help users stay safe, the company is introducing new warning alerts on Facebook and WhatsApp when suspicious activity is detected. It is also expanding scam detection tools on Facebook Messenger to flag potentially harmful...
March 11, 2026 16:51 (6 days, 18 hours ago) | 0 | 1 minute read
Always stay cautious when using company systems. Be mindful of the information you access and share to prevent unauthorized exposure. Avoid installing unapproved software or accessing suspicious links while on company devices. Practicing safe and responsible use helps protect company data and systems from security risks.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.
March 11, 2026 16:50 (6 days, 18 hours ago) | 0 | QR Ready | 1 minute read

Security starts with awareness, and even small habits strengthen your protection. Simple actions—like verifying senders and keeping software updated—add up. Staying mindful of risks helps protect both you and your data every day.
Dos:
- Enable two-factor authentication
- Use strong, unique passwords
- Report suspicious activity
- Backup important files
- Monitor account activity
“Mindful habits make cyber threats vanish!”
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support
March 10, 2026 17:26 (1 week ago) | 0 | QR Ready | 1 minute read
Protect your SIM card and phone number because many online accounts use them to send verification codes and confirm your identity. If someone gains access to your SIM card or takes control of your phone number, they may be able to receive these codes and attempt to access your personal accounts. To stay safe, avoid sharing your phone number publicly and report immediately to your mobile provider if your phone or SIM card is lost or stolen.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support
March 10, 2026 17:24 (1 week ago) | 0 | QR Ready | 1 minute read
Always return any work-issued device such as laptops, desktops, tablets, or mobile phones to the Tech Department when it is no longer in use. Proper handling ensures company data is securely managed before the device is reused or disposed of. Be sure to include all accessories like chargers, cables, and docking stations. Following this process helps protect sensitive information and maintain device accountability.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.
March 9, 2026 16:37 (1 week, 2 days ago) | 0 | QR Ready | 1 minute read