Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Beware of Fraudulent Social Media Job Ads
 

Fake job ads can install malware, leading to data theft.

Mitigation Steps:

  • Verify Job Ads: Ensure they're from legitimate companies.
  • Avoid Downloads: Don't download files from suspicious sources.
  • Use Security Software: Keep antivirus updated.
  • Enable Two-Factor Authentication: Add extra security to accounts.
  • Report Suspicious Ads: Notify the platform immediately.

Stay cautious and protect your data.


November 12, 2024 18:09 (on 11/13/24) |  0 | QR Ready | 1 minute read
Keep Your E-Wallet Tight
 

To secure your e-wallet, enable Two-Factor Authentication (2FA) and use a strong, unique password. Regularly monitor transactions for unusual activity, be wary of phishing attempts, and keep your app updated. Always log out after use, especially on shared devices, and consider changing your MPIN periodically. Remember, e-wallets don’t offer the same security as banks, so avoid storing large amounts of money in your account. Taking these steps will help protect your digital funds. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


November 12, 2024 17:08 (on 11/13/24) |  0 | QR Ready | 1 minute read
See It, Doubt It, Verify It
 

Be cautious with videos, images and audio online, as they can be fake or manipulated. Do not immediately believe what you see or hear, always fact-check sensitive content, especially when it involves money or important decisions. Don’t act without confirmation, use trusted sources or tools to verify what you see and hear before taking action.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


November 11, 2024 16:10 (on 11/12/24) |  0 | QR Ready | 1 minute read
Text with a Twist
 

Treat text messages with the same caution as emails, especially those related to e-wallet companies. Scammers often impersonate trusted services to steal your information. Always verify the sender and avoid clicking on links or sharing personal details. Stay vigilant against phishing and fraud, even in messages that appear to be from familiar sources. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


November 10, 2024 15:35 (on 11/10/24) |  0 | QR Ready | 1 minute read
Websites That Lie
 

Cybercriminals use fake websites and scams to steal usernames and passwords, often selling them online. To protect yourself, always verify the website is secure, look for https:// and a padlock symbol, use a password manager for strong, unique passwords, and enable two-factor authentication (2FA) to add an extra layer of security.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


November 7, 2024 16:46 (on 11/8/24) |  0 | QR Ready | 1 minute read
New Android Threat 'ToxicPanda' Bypasses Bank Security for Fraudulent Transfers
 

A new strain of Android banking malware called ToxicPanda has infected over 1,500 Android devices, enabling cybercriminals to carry out fraudulent banking transactions.

According to researchers Michele Roviello, Alessandro Strino, and Federico Valentini from Cleafy, the main goal of ToxicPanda is to steal money by taking over bank accounts on compromised devices. This is done using a method known as on-device fraud (ODF), where the malware bypasses security measures banks use to verify users' identities and detect suspicious activities.

The researchers believe ToxicPanda is likely created by a Chinese-speaking hacker group. The malware shares similarities with another Android malware called TgToxic, which was discovered by Trend Micro in early 2023. TgToxic can steal credentials and funds from cryptocurrency wallets, showing a similar pattern of attack.

Source: November 6, 2024 16:32 (on 11/7/24) |  0 | 1 minute read

Goodbye, Old Friend
 

Keep track of end-of-life dates for your software and systems, as they will no longer receive security updates after that point. Transitioning to supported versions ensures you maintain robust security against vulnerabilities. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.


November 6, 2024 16:24 (on 11/7/24) |  0 | QR Ready | 1 minute read
Video or Virus? Spot the Difference!
 

Video files can hide serious risks. Cybercriminals may embed malicious code or links, leading to harmful downloads or suspicious apps that compromise your device’s security.

Do's:

  • Download from trusted sites.
  • Scan files with antivirus software.
  • Keep OS and apps updated.
  • Be cautious of unusual formats or large files.

Avoid:

  • Ignoring security warnings.
  • Clicking on unsolicited links.
  • Installing apps from unknown sources.
  • Opening files from unknown senders without checking.

November 5, 2024 16:35 (on 11/6/24) |  0 | QR Ready | 1 minute read
Access Denied
 

Restrict access to shared drives to only those who need it. This practice minimizes the risk of unauthorized data exposure and helps protect sensitive information from potential breaches and unauthorized access. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


November 5, 2024 15:43 (on 11/5/24) |  0 | QR Ready | 1 minute read
Notifications On, Hacks Off!
 

Enable security alerts on all your accounts to monitor for unusual activity, such as logins from new devices or changes to your settings. These notifications help you stay aware of potential security threats in real-time. By responding quickly, you can take action to protect your account before any damage is done.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.


November 4, 2024 15:54 (on 11/4/24) |  0 | QR Ready | 1 minute read
  • First
  • «
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi