Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Hover before clicking
 

Receive emails with buttons? Hover over to check the URL. If suspicious, don't click. Not everything is trustworthy. Learn and apply tips like this to avoid phishing.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


March 14, 2024 01:00 (on 3/14/24) |  0 | QR Ready | 1 minute read
Install Adblockers
 

Are you tired of intrusive ads while browsing? Adblockers are the solution. They eliminate annoying ads and safeguard against potential viruses or scams. Simply install one as a browser extension like Ghostery, uBlock Origin, or Adblock.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


March 15, 2024 00:39 (on 3/15/24) |  0 | QR Ready | 1 minute read
Google Chrome Introduces V8 Sandbox to Bolster Security
 

Google has unveiled support for the V8 Sandbox in its Chrome web browser, aiming to combat memory corruption issues. According to Samuel Groß, the V8 Security technical lead, the sandbox prevents the spread of memory corruption within the host process. 

Described as a lightweight, in-process sandbox for the JavaScript and WebAssembly engine, the V8 Sandbox mitigates common vulnerabilities. It restricts V8 code execution to a subset of the process's virtual address space, isolating it from the rest of the process to limit vulnerability impact. These vulnerabilities have comprised a significant portion of Google's addressed zero-day vulnerabilities, with up to 16 security flaws discovered between 2021 and 2023. 

The sandbox assumes attackers can arbitrarily modify memory inside the sandbox address space and aims to protect...


April 8, 2024 17:26 (on 4/9/24) |  0 | 2 minutes read
Always bring your RFID
 

It is important to have an RFID card to enter the premises of the company. Keeping your RFID card on you at all times prevents tailgating by individuals who may not possess an RFID card and prevents unauthorized persons from entering the premises. It is our responsibility to keep it safe and be aware of the risks associated with tailgating or losing our RFID tag. 

If your RFID has been lost, you need to immediately notify the authorities for them to take security measures.

Got any queries? Submit a ticket at [PB8324.3] Data Security Support

For RFID concerns, please file a ticket at [PB0718] Door Access and CCTV System Concerns.


March 11, 2024 01:07 (on 3/11/24) |  0 | QR Ready | 1 minute read
Keep it Private!
 

Is someone peeking at your phone or laptop while you work or when it public? Consider using privacy screen protectors on your devices to prevent visual eavesdropping on your sensitive information, especially if it includes company data. This is also a way to safeguard it from unauthorized viewing in public places.

Got inquiries? Submit a ticket at [PB8324.3] Data Security Support.


March 26, 2024 20:15 (on 3/27/24) |  0 | QR Ready | 1 minute read
Never Get Wiped: Avoid Getting Wiper Malware
 

Wiper Malware is malicious software that can cause severe damage to your computer. It is a type of malware that can delete or corrupt data, rendering it useless. Unlike ransomware, Wiper Malware does not encrypt your files and demand a ransom to decrypt them. Instead, it destroys the key to unlock the files, making it impossible to recover the data. It can also modify the data on your computer by changing the contents to 1's and 0's, making it unreadable. As a result, this can cause permanent damage to your system and can lead to the loss of important data.

It is important to take precautions to avoid getting infected with Wiper Malware. Firstly, never click on any unsafe links, especially those sent from unknown sources. These links could lead you to malicious websites or automatically download the malware.

Secondly, be cautious when opening email attachments, especially if they are...


April 3, 2024 23:42 (on 4/4/24) |  1 | QR Ready | 2 minutes read
Avoid Personal USBs on Company Devices
 

Having portable external storage devices is a convenient way to transfer data between devices. However, they can sometimes be infected with viruses, causing problems. Make sure not to make it a habit to insert such devices into any company devices, as it may harm the company and your device.
 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support"


April 3, 2024 19:57 (on 4/4/24) |  0 | QR Ready | 1 minute read
Proper Parcel Label Disposal
 

Online shopping has become convenient for us. However, do you remove your parcel shipping label before disposing it? Or do you just dispose of it in the trash without removing the shipping label? If you do so, you can be a victim of identity theft as it contains your information from name, address, and contact number. Always properly dispose of any documents containing personal information to protect yourselves. Be responsible, and avoid being vulnerable.

Got any queries? Submit a ticket at [PB8324.3] Data Security Support


March 11, 2024 00:38 (on 3/11/24) |  0 | QR Ready | 1 minute read
Safeguarding your e-signature
 

Electronic signature fraud jeopardizes data integrity and authentication in online transactions, risking the legal validity and integrity of documents. This can result in financial losses and reputational damage. Employing digital signatures, reliable e-signature systems with audit trails and encryption, and educating users on detecting tampering are crucial for preventing document forgeries and maintaining document authenticity.

Do you have any queries? Submit a ticket at [PB8324.3] Data Security Support


March 26, 2024 20:15 (on 3/27/24) |  0 | QR Ready | 1 minute read
Mac Users Beware: Malicious Ads Unleash Stealer Malware Assault
 

Malicious advertisements and counterfeit websites have become conduits for disseminating two distinct types of stealer malware, notably Atomic Stealer, targeting users of Apple's macOS operating system. Jamf Threat Labs has released a report highlighting ongoing attacks aimed at extracting sensitive data from macOS users. The attackers behind these campaigns employ diverse methods to compromise victims' Macs, stealing valuable information.

One attack vector involves redirecting users searching for Arc Browser to deceptive websites such as "airci[.]net" via fraudulent ads. Interestingly, these malicious websites cannot be directly accessed and instead require users to click on sponsored links, likely as a tactic to avoid detection. Once on these sites, users are prompted to download a disk image file named "ArcSetup.dmg," which contains the Atomic Stealer malware. This malware employs...


April 1, 2024 18:39 (on 4/2/24) |  0 | 2 minutes read
  • First
  • «
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi