Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Safe Charging Practices
 

When our phones get low on battery or drained, we often rush to public charging ports, but sharing cords could post security risks. Hackers can sneakily install spyware on your device, letting them secretly access your personal info and track where you go without you knowing. You can avoid this by bringing your cable, charger, or power bank for safer charging.

Got inquiries? Submit a ticket at [PB8324.3] Data Security Support.


March 11, 2024 00:25 (on 3/11/24) |  0 | QR Ready | 1 minute read
Avoid the “secure enough” mentality
 

It's important to remember that just because you haven't experienced any attacks does not mean you are fully secure. Even the most protected organizations can be targeted and attacked, so adopting a zero-trust mindset is necessary. Prioritize protecting yourself and your devices to ensure maximum security.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


March 20, 2024 16:50 (on 3/20/24) |  0 | QR Ready | 1 minute read
Beware of Social Engineering
 

Social engineering is a kind of cyberattack that involves manipulative tactics to trick individuals into revealing or sharing sensitive information and using it for their own gain.

Preventive tips for this attack:

  • Stay cautious about the information you share with someone, whether it's your friend or not.
  • Verify URLs before clicking, and avoid visiting illegal websites.
  • Educate yourself and others.
  • Report and monitor for any malicious activity in your account.

Being vigilant against social engineering helps prevent falling victim to scams or cyberattacks.

Got inquiries? Submit a ticket at [PB8324.3] Data Security Support.


March 15, 2024 00:35 (on 3/15/24) |  0 | QR Ready | 1 minute read
Sweet Talks are for the Weak
 

Honeytrap is a threat that tricks people by pretending to be attractive online. The person befriends their targets and fakes an online relationship with them. The criminal then takes advantage of this relationship to extract their victims’ details, borrow money from them, or make them install malware into their computers. This cyber threat is also part of Social Engineering attacks as it directly communicates and manipulates the victim to obtain confidential information.

Do’s

  1. Exercise Caution Online: When communicating with strangers on the internet, be cautious, particularly on dating or social networking sites where honeytraps are prevalent. 
  2. Verify Identities: If you're developing a relationship with someone online, verify their identity through multiple channels, such as video calls, social media profiles, or mutual connections to see...
    March 21, 2024 18:10 (on 3/22/24) |  0 | QR Ready | 2 minutes read
Phishing Reminder Again?
 

Of course, we won’t stop reminding you. An email or message containing poor grammar, incorrect spelling, and unfamiliar links or attachments could be indicative of a phishing attempt. It's crucial to exercise caution and refrain from engaging with such messages to mitigate potential security threats or scams

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


March 11, 2024 23:24 (on 3/12/24) |  0 | QR Ready | 1 minute read
Watch Against Digital Lies 
 

Keep your eyes open for fake messages asking you to register your SIM card. Scammers pretend to be your bank or phone company to trick you into sharing your details on fake websites. Stay attentive to prevent yourself from falling for it. 

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


March 11, 2024 23:22 (on 3/12/24) |  0 | QR Ready | 1 minute read
Focus Mode: On!
 

Watch out for a trick where you get a random text message that looks like someone sent you prepaid phone credits. Then, the scammer will say it was sent to you by mistake and ask you to give it back. But here's the catch: you never got any credits in the first place! They're just trying to get you to give up your own credits. Be careful and don't fall for this sneaky scheme meant to take advantage of you and your money.

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


March 11, 2024 23:22 (on 3/12/24) |  0 | QR Ready | 1 minute read
Potential Risks of Third-Party ChatGPT Extensions: Account Takeover Concerns
 

Cybersecurity researchers have identified critical vulnerabilities within the third-party plugin ecosystem for OpenAI ChatGPT, shedding light on potential avenues for threat actors to exploit and gain unauthorized access to sensitive data. Recent findings from Salt Labs highlight security flaws within the ChatGPT platform itself and its accompanying plugin infrastructure, posing significant risks to user privacy and data integrity.

The research underscores that while third-party plugins are intended to augment ChatGPT's capabilities, they also introduce new attack surfaces that malicious actors could leverage. By exploiting these vulnerabilities, attackers could clandestinely install harmful plugins without user consent, opening the door to account takeovers and unauthorized data access on platforms like GitHub and other third-party websites.

March 18, 2024 19:17 (on 3/19/24) |  0 | 2 minutes read

Surveil without Fail
 

Make it a habit to regularly check the activity logs in your important business accounts. Doing so promptly helps maintain the security and privacy of your account. Additionally, staff members should routinely review their personal accounts to ensure comprehensive security.

Got inquiries? Submit a ticket at [PB8324.3] Data Security Support.


March 7, 2024 23:22 (on 3/8/24) |  0 | QR Ready | 1 minute read
I Sent It With Confidentiality
 

Whether you're sharing files with colleagues or clients, ensuring that data remains confidential is paramount. Here are some practical steps to take when sending sensitive files:

1. Verify the Recipient's Identity: Before sending any sensitive files, take a moment to verify the recipient's identity. Double-check their name or email address to ensure that you're sending the files to the right person. This simple step can help prevent accidental data leaks.

2. Stay Attentive Throughout the Process: Pay close attention when verifying the recipient's identity. It's easy to make mistakes, especially when dealing with multiple files or recipients. You can avoid sharing confidential information with the wrong person by staying vigilant.

Following these best practices can ensure that your sensitive data remains secure during the file-sharing process. Remember, a little caution now can prevent many headaches later on.

March 14, 2024 19:39 (on 3/15/24) |  0 | QR Ready | 1 minute read

  • First
  • «
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi