Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Shhh… Your Assistant’s Listening
 

To protect your privacy, turn off the "always listening" feature on your voice assistant when not in use. Assistants like Siri, Alexa, and Google Assistant can pick up unintended conversations. Disable this feature or mute the microphone to reduce the risk of sensitive information being overheard.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


February 13, 2025 17:15 (on 2/14/25) |  0 | QR Ready | 1 minute read
Caught in a Job Scam: North Korean Hackers Spread FERRET Malware on macOS
 

North Korean hackers are behind the Contagious Interview campaign, which targets victims with fake job interviews. The hackers send a link that causes an error, prompting users to install fake software (like VCam or CameraAccess) for the interview. This leads to the installation of malware called BeaverTail, which steals sensitive data and can install a backdoor named InvisibleFerret.

Discovered in late 2023, the campaign uses fake video-conferencing apps and npm packages to spread malware. In late 2024, new tactics emerged, including tricking macOS users into running harmful commands via the Terminal app to fix camera or microphone issues. The malware can also persist on the system through a LaunchAgent.

The hackers have expanded their targets to include developers by posting fake issues on GitHub and distributing malicious npm packages like postcss-optimizer. They’ve also been linked to phishing attacks spreading the RokRAT malware via malicious...


February 12, 2025 16:38 (on 2/13/25) |  0 | 2 minutes read
App-ly Caution
 

Avoid downloading apps or software from untrusted sources, as they may contain malicious software or compromise your data. Stick to verified sources like official app stores or company-approved platforms. Always check reviews and verify the source before installing to protect your devices and personal information. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


February 12, 2025 15:55 (on 2/12/25) |  0 | QR Ready | 1 minute read
Your Eyes Matter
 

Security is a shared responsibility, and everyone in the organization plays a crucial role. Stay vigilant by constantly being aware of potential threats, both online and offline. Proactively identify risks, and if you notice something suspicious, report it immediately to help prevent potential breaches. Together, we can create a stronger, more secure workplace for everyone. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.


February 11, 2025 16:51 (on 2/12/25) |  0 | QR Ready | 1 minute read
Share with Care
 

Always think carefully before sharing any information, whether it’s online, through email, or in person. Take a moment to consider the potential consequences of disclosing personal details. Be mindful of who may have access to your information and how it might be used. Protecting your privacy begins with being cautious about what you choose to share. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


February 10, 2025 16:30 (on 2/11/25) |  0 | QR Ready | 1 minute read
Protect What’s Private
 

Be careful where you store sensitive information like passwords, PINs, or credit card details on your phone or computer. Avoid saving them in plain text or easy-to-access notes, as they could be exposed if your device is lost or hacked. Instead, use a secure password manager or encryption apps to keep your private details safe, even if something happens to your device.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


February 9, 2025 16:46 (on 2/10/25) |  0 | QR Ready | 1 minute read
Let No Strangers In
 

Turn off Bluetooth when you're not actively using it to prevent unauthorized access. Be cautious about accepting connection requests from unfamiliar devices, as they could compromise your security. Only pair with devices you trust to ensure your data remains protected. Regularly check your paired devices list to avoid connections to unknown or outdated devices. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


February 6, 2025 16:00 (on 2/7/25) |  0 | QR Ready | 1 minute read
158,000 Risky Android Developer Accounts Banned by Google in 2024
 

In 2024, Google blocked over 2.36 million Android apps that violated its policies from being published on the Google Play Store. Additionally, more than 158,000 developer accounts attempting to submit harmful apps were banned. Google also worked with third-party app developers to prevent 1.3 million apps from accessing unnecessary or excessive user data, improving security.

Google Play Protect, a built-in security feature on Android devices, detected 13 million new malicious apps outside the official Google Play Store. As a result of collaborating with developers, more than 91% of apps installed from the Play Store now use the latest Android security protections, such as Android 13 or newer.

Compared to previous years, Google made significant improvements. In 2022, it blocked 1.43 million risky apps, and in 2023, it blocked 2.28 million. Furthermore, the company reported an 80% decrease in the use of unverified sources for app installations with the Play Integrity...


February 5, 2025 16:52 (on 2/6/25) |  0 | 1 minute read
Don’t Let Cyberstorms Hit Your Cloud!
 

Storing sensitive files in cloud services like Google Drive or iCloud is convenient, but without proper security, they can be vulnerable. To protect your files, always encrypt them before uploading. Use strong, unique passwords for your cloud accounts, and enable two-factor authentication for an added layer of security. Taking these steps ensures your documents stay safe from cyber threats.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


February 5, 2025 16:50 (on 2/6/25) |  0 | QR Ready | 1 minute read
The Phish that Thinks
 

Phishing attacks are getting smarter with AI, making it harder to spot fake emails. If an email pressures you to act quickly or asks for sensitive details, take a step back. Always double-check the sender’s address and think twice before clicking on any links or downloading attachments. Trust your instincts—if it feels off, it probably is. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


February 4, 2025 16:10 (on 2/5/25) |  0 | QR Ready | 1 minute read
  • First
  • «
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi