Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Verified? Verify Again!
 

Emails claiming to offer social media verification or a blue badge are common phishing traps. If a message feels suspicious, trust your instincts. Scammers want you to act quickly, so slow down, verify where links actually lead, watch for errors in email addresses, and don’t be fooled by official-looking logos—appearances can be deceiving. When in doubt, go directly to the platform instead of clicking on links. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


July 16, 2025 16:44 (1 week, 4 days ago) |  0 | QR Ready | 1 minute read
Cookie Crumbs & Cache Clutter
 

Why You Should Clear Them?

Over time, cookies and cache can store personal data, slow down your browser, and compromise your privacy.

Benefits of Clearing Cache & Cookies:

  • Protect Privacy: Stop sites from storing and tracking your info.
  • Boost Security: Lower the risk of data leaks and fingerprinting.
  • Speed Up Browsing: Remove outdated files that slow you down.
  • Stay in Control: Minimize your digital footprint.

Quick Tips:

  • Block third-party cookies in settings.
  • Clear cache after updates or private sessions.
  • Always clear data after sensitive...
    July 15, 2025 16:52 (1 week, 5 days ago) |  0 | QR Ready | 1 minute read
Safe & Simple
 

Enhance your cybersecurity by reducing your digital footprint—keep only the apps, accounts, and services that are truly necessary. Be cautious about the personal information you share online, and routinely review your privacy settings and app permissions. Using technology more carefully and with purpose makes it easier to protect your data and stay safe online.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


July 15, 2025 16:56 (1 week, 5 days ago) |  0 | QR Ready | 1 minute read
Free Isn’t Always Free
 

Be cautious when using free online tools. While they may seem convenient, many collect personal data behind the scenes. This data can be shared, sold, or misused without your knowledge or consent. Always take the time to review their privacy policies and terms of service. For better security, use tools only from trusted and reputable sources. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


July 14, 2025 16:46 (1 week, 6 days ago) |  0 | QR Ready | 1 minute read
Seal It Up
 

Be careful not to save or send passwords, credit card numbers, or personal information in ways that others can easily access. For example, avoid writing passwords in emails or storing them in unprotected notes on your phone. Instead, use a trusted password manager to keep your passwords secure, and always choose services that offer end-to-end encryption when sharing sensitive information. Taking a few simple steps can go a long way in protecting your personal information.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


July 13, 2025 17:54 (1 week, 6 days ago) |  0 | QR Ready | 1 minute read
Be Alert, Not a Target
 

Most security issues occur due to human error, not system failures, which makes your awareness critical. Simple actions like clicking a malicious link or using a weak password can lead to serious risks. Stay secure by learning about common threats and safe practices through articles, tips, or quick training sessions; the more alert and informed you are, the stronger your defense against potential attacks.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


July 10, 2025 17:43 (2 weeks, 2 days ago) |  0 | QR Ready | 1 minute read
Cybercriminals Use PDFs to Launch Callback Phishing Scams Impersonating Major Brands
 

Cybersecurity experts warn about a growing scam called TOAD (Telephone-Oriented Attack Delivery). Attackers send fake emails that appear to be from trusted brands like Microsoft, DocuSign, PayPal, or Norton. These emails often contain PDFs with QR codes or phone numbers.

Victims are tricked into calling these numbers, where scammers pose as support agents to steal personal information or install malware.

Scammers make these attacks convincing by:

  • Using brand logos and realistic email templates
  • Spoofing caller IDs and playing hold music
  • Reusing anonymous VoIP numbers

Some attackers use Microsoft 365's Direct Send to make emails appear internal. Others use QR codes and fake login pages to steal login credentials. Criminals also manipulate AI chatbots and search engines to spread fake login links through services...


July 9, 2025 17:22 (2 weeks, 3 days ago) |  0 | 2 minutes read
Avoid Passing the Phish
 

Never forward suspicious emails to others unless it is necessary for an investigation. Avoid replying to them, as this can confirm your contact information to attackers. Instead, report suspicious emails directly to the data security team before deleting them, as they may contain important information needed for investigations. Reporting these emails ensures they are handled safely and effectively. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


July 9, 2025 16:56 (2 weeks, 4 days ago) |  0 | QR Ready | 1 minute read
Less is More: Shrink Your Digital Footprint
 

Your digital trail is bigger than you think—but you can shrink it. Be mindful of what you post, sign up for, or share. Use privacy tools and limit personal info on public platforms.

Dos:

  • Manage Your Presence: Share only what's necessary and keep profiles clean.
  • Use Disposable Emails: Protect your main account with aliases or temp emails.
  • Delete Unused Accounts: Reduce your data footprint.
  • Adjust Privacy Settings: Make profiles private and control visibility.

Avoid:

  • Overshare Personal Info
  • Ignore Privacy Settings
  • Use One Email for...
    July 8, 2025 17:39 (2 weeks, 4 days ago) |  0 | QR Ready | 1 minute read
Question the Request
 

Be cautious of emails that appear to come from trusted individuals like your boss, a coworker, or a well-known company—scammers often pretend to be them to trick you. Always check the sender’s full email address, be suspicious of unexpected requests (especially those involving payments or account changes), and take a moment to verify by calling or messaging the person directly. Staying alert and taking time to double-check can go a long way in keeping you and the organization safe.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


July 8, 2025 17:12 (2 weeks, 4 days ago) |  0 | QR Ready | 1 minute read
  • First
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi