Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Double Up on Security!
 

To further enhance the security of your devices, combine biometric authentication (like fingerprint or facial recognition) with a strong backup screen lock (such as a PIN or password). Your device remains protected by the secondary lock if the biometric scan fails or is bypassed, ensuring unauthorized access is blocked. This dual-layer protection adds an extra level of security, keeping your device safe.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


February 25, 2025 18:08 (on 2/26/25) |  0 | QR Ready | 1 minute read
Not Who You Think
 

Beware of email impersonation, where attackers pose as someone you know or a trusted organization. Their goal is to trick you into clicking malicious links, sharing sensitive information, or taking harmful actions. Always verify the sender's name or email address before responding to any email. If something seems off, take extra steps to confirm their identity. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


February 24, 2025 16:13 (on 2/25/25) |  0 | QR Ready | 1 minute read
Fake It to Save It!
 

For non-critical sign-ups like quizzes, newsletters, or free trials, use fake details like a random name or temporary email. This protects your privacy, reduces spam, and minimizes the risk of your data being misused or exposed in a breach. Share only what's necessary to protect your sensitive information.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


February 23, 2025 17:59 (on 2/24/25) |  0 | QR Ready | 1 minute read
Deny the Unnecessary
 

Be cautious when granting app permissions. Some applications may request excessive or unnecessary access, putting your data and privacy at risk. Always review the permissions an app asks for before allowing them. Only grant permissions essential for the app's function and deny access to anything that seems irrelevant or excessive. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


February 20, 2025 15:53 (on 2/20/25) |  0 | QR Ready | 1 minute read
Data Privacy Concerns Lead South Korea to Pause DeepSeek AI Downloads
 

South Korea has suspended new downloads of the Chinese AI chatbot DeepSeek, effective February 15, 2025, due to concerns over its compliance with the country’s data protection laws. The Personal Information Protection Commission (PIPC) cited issues with the app's communication functions and its handling of personal data, particularly in relation to third-party services.

While the app remains accessible via the web, existing users have been warned not to input personal information until necessary changes are made. DeepSeek acknowledged its failure to fully consider South Korea's privacy laws upon launch and agreed to make adjustments to meet the country’s data protection standards.

The National Intelligence Service (NIS) has also raised concerns over DeepSeek's excessive data collection, including vulnerabilities in the Android and iOS versions that transmit unencrypted data. The PIPC will continue to monitor the situation to ensure compliance, and the suspension will...


February 19, 2025 16:02 (on 2/20/25) |  0 | 1 minute read
What’s Hiding in your Share?
 

Be mindful when screen-sharing during video calls, whether in meetings or casual conversations, as it can unintentionally expose sensitive company data or personal information. Before sharing your screen, double-check that no confidential details are visible. To minimize risks, always opt to share only specific windows or applications rather than your entire desktop. This helps protect both personal and business-sensitive information during virtual meetings. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


February 19, 2025 15:42 (on 2/19/25) |  0 | QR Ready | 1 minute read
Stay Secure by Tracking End-of-Life Dates for Software and Systems
 

Why It Matters:
Software and systems eventually reach their End-of-Life (EOL), after which they no longer receive security updates, exposing your systems to vulnerabilities and cyberattacks.

Key Actions:

  • Track EOL Dates: Keep a record of when each software/system will reach EOL.
  • Plan for Upgrades: Transition to supported versions before EOL for continued protection.

Benefits of Upgrading:

  • Ongoing Security Updates: Receive timely patches and improvements.
  • Better Protection: Minimize the risk of breaches and data loss.

Stay ahead of potential threats. Track,...


February 18, 2025 16:43 (on 2/19/25) |  0 | QR Ready | 1 minute read
Securely You
 

Traditional passwords can be easily cracked or stolen. To enhance your security, consider using biometric methods such as fingerprint or facial recognition. These methods provide an extra layer of protection. By setting up biometric login on your devices, you reduce reliance on passwords. This makes it harder for unauthorized users to access your information. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


February 18, 2025 15:59 (on 2/18/25) |  0 | QR Ready | 1 minute read
Memorable, Not Guessable
 

If you use security questions for your accounts, avoid reusing answers across sites. It’s safer to use a variety of questions and create random, memorable answers that only you know, rather than using easily guessable information like pet names or family details. This makes it harder for attackers to access your accounts and helps protect your personal information.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


February 17, 2025 16:35 (on 2/18/25) |  0 | QR Ready | 1 minute read
Send with Care
 

Before forwarding emails, be mindful of any sensitive information or attachments included. Accidentally sending these to the wrong recipient can expose confidential data. Always review the email carefully to ensure you’re not unintentionally sharing anything private. A quick check can prevent potential security risks and protect sensitive information. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


February 16, 2025 17:19 (on 2/17/25) |  0 | QR Ready | 1 minute read
  • First
  • «
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi