Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Too Much Access?
 

Before installing any app, carefully review the permissions it requests. Be cautious about granting access to sensitive features like your camera, microphone, or location unless absolutely necessary. Limiting app permissions helps protect your privacy and reduces the risk of unauthorized data access or surveillance. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


November 21, 2024 15:40 (on 11/21/24) |  0 | QR Ready | 1 minute read
Ghost Tap Attack: How Hackers Are Using NFC to Steal Money Through Mobile Payments
 

Cybercriminals are using a new method called Ghost Tap to steal money from victims' accounts on a large scale. This technique relies on near-field communication (NFC) technology and allows thieves to steal funds from stolen credit cards linked to mobile payment services like Google Pay and Apple Pay.

ThreatFabric, a Dutch security company, explained to The Hacker News that criminals can use Google Pay or Apple Pay to transmit payment information anywhere in the world within seconds. This means that even if the victim doesn't have their physical card or phone, attackers can still make payments from their account.

These attacks usually start by tricking victims into downloading mobile banking malware. This malware can capture banking credentials and one-time passwords through methods like overlay attacks or keyloggers. In some cases, attackers may also use voice phishing to deceive the victim.

Source: November 20, 2024 16:24 (on 11/21/24) |  0 | 1 minute read

A Tidy Desk is a Safe Desk
 

In the workplace, staying organized is key to protecting sensitive information. Avoid leaving your computer unattended with important information visible, and make sure to securely store documents and devices when not in use. Regularly tidy your workspace to minimize the risk of data loss or unauthorized access.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


November 20, 2024 16:20 (on 11/21/24) |  0 | QR Ready | 1 minute read
Signed, Sealed, Delivered: Spot the Fakes!
 

Phishing scams are everywhere. Always verify email signatures, especially for sensitive requests, to avoid fraud.

How to Verify Email Signatures:

  • Check Authenticity: Look for official email addresses and consistent branding.
  • Use a Second Channel: Call or message the sender through a known contact method.
  • Spot Red Flags: Watch for odd language or unusual requests.
  • Trust Your Gut: If something feels off, double-check!

A quick check can save you from major headaches!


November 19, 2024 16:25 (on 11/20/24) |  1 | QR Ready | 1 minute read
Is That Really You?
 

Attackers can easily spoof legitimate email addresses to make phishing attempts look authentic. Always double-check the "From" field to verify that the sender is who they claim to be—especially when the email involves sensitive requests, such as account changes or financial transactions. If in doubt, contact the sender through a known, trusted communication channel to confirm the message's legitimacy. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


November 19, 2024 16:09 (on 11/20/24) |  1 | QR Ready | 1 minute read
Avoid Delay, Update Today
 

When you get a notification about software updates or security patches, apply them right away. Postponing updates can leave your system exposed to known vulnerabilities. Regularly updating your software is one of the simplest and most effective ways to safeguard against cyber threats. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


November 18, 2024 15:34 (on 11/18/24) |  0 | QR Ready | 1 minute read
Ho-Ho-Hold Off on Too-Good Deals!
 

Since it's Christmas season, scammers create fake online stores or offer big discounts to lure shoppers. Always shop from trusted websites and be wary of deals that seem too good to be true, as they may be scams. If you're unsure, check reviews or do a quick online search before making a purchase.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


November 17, 2024 16:47 (on 11/18/24) |  0 | QR Ready | 1 minute read
Steer Clear of the Hype
 

Stay informed about emerging technologies and their security implications. Understanding how these tools can be taken advantage of will help you make informed decisions and better protect your data and systems from potential threats.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


November 14, 2024 16:03 (on 11/15/24) |  0 | QR Ready | 1 minute read
New Phishing Threat: GoIssue Targets GitHub Users with Mass Email Scams
 

A new phishing tool called GoIssue is being used to target GitHub users with fake emails designed to steal login details. The tool, created by a hacker known as cyberdluffy, collects email addresses from public GitHub profiles and sends mass emails that look legitimate, tricking users into sharing their personal information or giving access to their code. Priced as low as $150, GoIssue allows attackers to reach many people at once, increasing the chances of success.

In some cases, these fake emails ask developers to approve dangerous requests that could steal their code or lock them out, demanding a ransom. This attack is part of a growing trend where scammers use trusted platforms to fool people. Experts recommend GitHub users stay cautious, use strong security features like two-factor authentication, and avoid clicking on unfamiliar links or approving unknown requests.

Source: November 13, 2024 19:09 (on 11/14/24) |  0 | 1 minute read

Tiny Charges, Big Risks
 

Regularly monitor your bank and credit card transactions, paying attention to even small, unfamiliar charges, as cybercriminals often test stolen card details with low-value transactions. Set up transaction alerts with your financial institution to get notified of any activity in real time. Catching these suspicious charges early can help prevent larger financial losses and protect your accounts from further fraud.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


November 13, 2024 16:01 (on 11/14/24) |  0 | QR Ready | 1 minute read
  • First
  • «
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi