Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Safeguarding your e-signature
 

Electronic signature fraud jeopardizes data integrity and authentication in online transactions, risking the legal validity and integrity of documents. This can result in financial losses and reputational damage. Employing digital signatures, reliable e-signature systems with audit trails and encryption, and educating users on detecting tampering are crucial for preventing document forgeries and maintaining document authenticity.

Do you have any queries? Submit a ticket at [PB8324.3] Data Security Support


March 26, 2024 20:15 (on 3/27/24) |  0 | QR Ready | 1 minute read
Mac Users Beware: Malicious Ads Unleash Stealer Malware Assault
 

Malicious advertisements and counterfeit websites have become conduits for disseminating two distinct types of stealer malware, notably Atomic Stealer, targeting users of Apple's macOS operating system. Jamf Threat Labs has released a report highlighting ongoing attacks aimed at extracting sensitive data from macOS users. The attackers behind these campaigns employ diverse methods to compromise victims' Macs, stealing valuable information.

One attack vector involves redirecting users searching for Arc Browser to deceptive websites such as "airci[.]net" via fraudulent ads. Interestingly, these malicious websites cannot be directly accessed and instead require users to click on sponsored links, likely as a tactic to avoid detection. Once on these sites, users are prompted to download a disk image file named "ArcSetup.dmg," which contains the Atomic Stealer malware. This malware employs...


April 1, 2024 18:39 (on 4/2/24) |  0 | 2 minutes read
April Cybersecurity Awareness Quiz
 

Ready to fortify your physical security know-how? This month, we're focusing on enhancing your understanding of safeguarding physical assets. Achieve a score of 80% or higher on our quiz and gain 500 DREAMPOINTS!

Dive into topics including:

  • Recognizing vulnerabilities in physical environments.
  • Employing robust security measures to protect assets.
  • Case studies of physical breaches and prevention techniques.

Join the quiz this April to enhance your ability to navigate the web safely. Complete the quiz to win PHP200 load – a great opportunity to learn and secure a win!

Click this link to take the quiz: https://securitytips.cloudstaff.com/quizzes/view/126  


March 31, 2024 23:11 (on 4/1/24) |  0 | 1 minute read
A cybersafe family
 

Make sure you and your family are aware of online dangers. Teach them how to stay safe on the internet and spot potential problems. Share tips for being safe online so they can exercise caution when using technology. Explain what cyber threats are, why they occur, and what could potentially go wrong. This will help everyone to be cautious when using computers and phones.

Got inquiries? Submit a ticket at [PB8324.3] Data Security Support.


March 11, 2024 23:28 (on 3/12/24) |  0 | QR Ready | 1 minute read
Avoid Shared Computers
 

Avoid using shared computers, such as those found in internet cafes or libraries for sensitive tasks like online banking or accessing confidential work-related data, as they could be contained in or already contaminated with viruses.

Got inquiries? Submit a ticket at [PB8324.3] Data Security Support.


March 26, 2024 20:17 (on 3/27/24) |  0 | QR Ready | 1 minute read
Shop at your own risk
 

Online shopping has gained popularity due to its convenience of buying from the comfort of your home. However, it involves sharing your shipping information and the website you visit may not be secure, which makes you vulnerable to cyber-attacks. Always verify that the site you visit is secure and handles your information accordingly.
 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


March 21, 2024 18:52 (on 3/22/24) |  1 | QR Ready | 1 minute read
How to Avoid Scareware Traps
 

Have you ever encountered a pop-up ad or a fake alert while browsing the internet? Well, beware! These can be scareware, designed to deceive you into downloading malware or viruses that can harm your computer. 

Tips to remember:

  1. Stay calm when encountering a scareware pop-up.
  2. Disregard pop-up ads that claim your computer is infected.
  3. Obtain software only from reputable and legal sources.
  4. Refrain from providing your personal information if you encounter pop-up ads.
  5. Update your operating system as always, as it will also enhance the security of your system.
  6. Use trusted tools like ad blockers to block scareware, infections, and malware.

It's...


March 27, 2024 19:14 (on 3/28/24) |  0 | QR Ready | 1 minute read
Revamp your devices
 

Keeping your software and devices up-to-date with the latest patches will guarantee you the best features and enhanced security. It can be compared to upgrading to the latest smartphone on the market, offering superior specifications compared to your previous phone. Regular updates will not only bring new improvements but also protect your system against possible attacks. So, never forget to update!

Do you have any questions? Submit a ticket at [PB8324.3] Data Security Support.


March 11, 2024 00:34 (on 3/11/24) |  0 | QR Ready | 1 minute read
Deceptive Microsoft Office Maneuver Unleashes NetSupport RAT in Latest Phishing Scheme
 

A recent phishing campaign targets U.S. organizations, aiming to deploy the NetSupport RAT, a remote access trojan. Tracked by Israeli cybersecurity firm Perception Point as Operation PhantomBlu, this campaign employs a sophisticated method by exploiting Microsoft Office's Object Linking and Embedding (OLE) template manipulation to execute malicious code, avoiding detection. NetSupport RAT, derived from the legitimate tool NetSupport Manager, enables threat actors to conduct various data-gathering actions on compromised devices.

The attack begins with a phishing email themed around salary reports, urging recipients to open a Microsoft Word document attached to the email. Analysis of email headers reveals the use of the legitimate email marketing platform Brevo (formerly Sendinblue). Upon opening the Word document and following instructions to view a salary graph, victims unwittingly...


March 25, 2024 22:49 (on 3/26/24) |  0 | 2 minutes read
Securi-Trivia: Weekly Quiz (March - Week 4)
 

Hello and welcome to this week's Securi-Trivia! This quiz is designed to test your knowledge and reinforce the cybersecurity tips we send out every day. Each week, we'll ask you 10 multiple-choice questions based on the daily tips and awareness we've sent out during the week. The questions will cover a range of topics, including understanding data security and more. To pass the quiz and receive dreampoints, you'll need to get at least an 80% passing score.
Remember, staying safe online is a shared responsibility. Answer the questions to test your knowledge. Don't worry if you don't get them all right on the first try - you can retake the quiz as many times as you like!

Click this link to take the quiz: https://securitytips.cloudstaff.com/quizzes/view/124 


March 24, 2024 19:28 (on 3/25/24) |  0 | 1 minute read
  • First
  • «
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi