Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Detecting the Voice Trick
 

Verify the caller's identity before sharing personal information. If suspicious, hang up and call back using a trusted number. Beware of pressure tactics or urgent requests. Trust your instincts to protect yourself from vishing scams. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.


October 9, 2024 16:37 (on 10/9/24) |  0 | QR Ready | 1 minute read
Not all info must be shared
 

Are you an active social media user? While sharing life moments can be fun, be aware of the risks, especially regarding work-related information.

To protect yourself from hackers:

  • Be cautious about what you share; avoid sensitive job details.
  • Limit job-related posts.
  • Review your privacy settings to safeguard your organization.

By thinking carefully about your online posts, you can protect your job and reputation.


October 8, 2024 18:34 (on 10/9/24) |  0 | QR Ready | 1 minute read
Don’t Be a Spread-er
 

Always scrutinize the sources of information shared online to prevent spreading misinformation that could harm your organization. Verify facts and check credibility before sharing to maintain integrity and trust.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


October 8, 2024 16:26 (on 10/8/24) |  0 | QR Ready | 1 minute read
Shielding Against the Info Bandit
 

Verify identities before discussing sensitive information, even with colleagues. Keep documents secure and out of sight. Avoid leaving sensitive information unattended in public spaces. By assuming potential threats, you can reduce the risk of data breaches.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


October 7, 2024 18:45 (on 10/8/24) |  0 | QR Ready | 1 minute read
Avoid Spilling the Tea
 

Be cautious with online quizzes and surveys that request personal information. Sharing details like your name, email, or even more sensitive data can lead to identity theft or unwanted spam. Always prioritize your privacy and think before you share. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


October 6, 2024 16:53 (on 10/6/24) |  0 | QR Ready | 1 minute read
Catch the Digital Sneak
 

Regularly review your account activity logs for any unusual access patterns or unauthorized login attempts. This practice helps you catch potential security breaches early and protects your information from unauthorized access 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


October 3, 2024 18:15 (on 10/4/24) |  0 | QR Ready | 1 minute read
Fraud Alert: Phony Trading Apps Prey on Victims Worldwide
 

A large fraud scheme has been uncovered, involving fake trading apps on the Apple App Store and Google Play Store, along with phishing websites. This was reported by Group-IB.

This scam is part of a consumer investment fraud scheme known as "pig butchering." In this scheme, scammers trick people into investing in cryptocurrency or other financial products after gaining their trust, often pretending to be romantic partners or investment advisors.

These deceptive tactics usually lead to victims losing their money. In some cases, the scammers even ask for more money through various fees and payments.

Group-IB, a company based in Singapore, noted that this scam has affected people worldwide, with victims in Asia-Pacific, Europe, the Middle East, and Africa. The fake apps, made with a tool called UniApp Framework, are referred to as UniShadowTrade.

Source: Fake Trading Apps Target...


October 2, 2024 16:39 (on 10/2/24) |  0 | 1 minute read
Away From Keyboard?
 

Set your devices to automatically lock after a short period of inactivity. This step prevents unauthorized access and helps protect your data from prying eyes. Whether stepping away for a moment or leaving your device unattended, an auto-lock feature serves as a crucial line of defense. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


October 2, 2024 16:31 (on 10/2/24) |  0 | QR Ready | 1 minute read
Dodge the Phishing Hook!
 

Phishing is a scam where attackers impersonate trustworthy entities to steal sensitive information.

Do's:

  • Hover over links to check their destination; verify the sender's email for errors or odd domains.
  • Evaluate the email's urgency; beware of fear tactics.
  • Be cautious with requests for personal info, like login or financial details.
  • Look for grammar mistakes and generic greetings.
  • Confirm that linked websites match official domains.

Stay alert and protect yourself from online fraud!


October 1, 2024 16:34 (on 10/1/24) |  0 | QR Ready | 1 minute read
Check that Signature
 

Always verify email signatures to confirm the identity of the sender, especially when dealing with financial or sensitive requests. This extra step helps protect you from phishing and ensures that your information remains secure. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


October 1, 2024 16:34 (on 10/1/24) |  0 | QR Ready | 1 minute read
  • First
  • «
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi