Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Pause Auto-Play, Play It Safe!
 

Turn off auto-play for videos and ads in your browser and apps. This prevents malicious ads from automatically playing and potentially infecting your device with harmful software. It also gives you more control over what content you see online.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


October 13, 2024 16:42 (on 10/13/24) |  0 | QR Ready | 1 minute read
Be a Novel, Never an Open Diary
 

Be cautious about the personal information you share online. Even seemingly harmless details can be exploited for social engineering attacks. Protect your data by sharing only what’s necessary and keeping your privacy in mind.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


October 10, 2024 18:55 (on 10/11/24) |  0 | QR Ready | 1 minute read
New Google Initiative to Automatically Block Unsafe Android Apps in India
 

Google is launching a new pilot program in India to automatically block the sideloading of potentially harmful Android apps from third-party sources, following similar tests in Singapore, Thailand, and Brazil. The feature aims to protect users from apps that request sensitive permissions often exploited for financial fraud, such as accessing SMS messages or using accessibility services for malicious activities.

The initiative will start next month and will be gradually rolled out across all Android devices with Google Play services in India. Google has already blocked nearly 900,000 high-risk app installations in Singapore since the program's launch earlier this year.

Eugene Liderman, Google's Director of Mobile Security Strategy, said the feature will automatically prevent risky installations by analyzing app permissions in real-time. Developers are advised to review their app permissions to ensure compliance with the new rules.

This comes nearly a year after...


October 9, 2024 16:43 (on 10/9/24) |  0 | 1 minute read
Detecting the Voice Trick
 

Verify the caller's identity before sharing personal information. If suspicious, hang up and call back using a trusted number. Beware of pressure tactics or urgent requests. Trust your instincts to protect yourself from vishing scams. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.


October 9, 2024 16:37 (on 10/9/24) |  0 | QR Ready | 1 minute read
Not all info must be shared
 

Are you an active social media user? While sharing life moments can be fun, be aware of the risks, especially regarding work-related information.

To protect yourself from hackers:

  • Be cautious about what you share; avoid sensitive job details.
  • Limit job-related posts.
  • Review your privacy settings to safeguard your organization.

By thinking carefully about your online posts, you can protect your job and reputation.


October 8, 2024 18:34 (on 10/9/24) |  0 | QR Ready | 1 minute read
Don’t Be a Spread-er
 

Always scrutinize the sources of information shared online to prevent spreading misinformation that could harm your organization. Verify facts and check credibility before sharing to maintain integrity and trust.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


October 8, 2024 16:26 (on 10/8/24) |  0 | QR Ready | 1 minute read
Shielding Against the Info Bandit
 

Verify identities before discussing sensitive information, even with colleagues. Keep documents secure and out of sight. Avoid leaving sensitive information unattended in public spaces. By assuming potential threats, you can reduce the risk of data breaches.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


October 7, 2024 18:45 (on 10/8/24) |  0 | QR Ready | 1 minute read
Avoid Spilling the Tea
 

Be cautious with online quizzes and surveys that request personal information. Sharing details like your name, email, or even more sensitive data can lead to identity theft or unwanted spam. Always prioritize your privacy and think before you share. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


October 6, 2024 16:53 (on 10/6/24) |  0 | QR Ready | 1 minute read
Catch the Digital Sneak
 

Regularly review your account activity logs for any unusual access patterns or unauthorized login attempts. This practice helps you catch potential security breaches early and protects your information from unauthorized access 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


October 3, 2024 18:15 (on 10/4/24) |  0 | QR Ready | 1 minute read
Fraud Alert: Phony Trading Apps Prey on Victims Worldwide
 

A large fraud scheme has been uncovered, involving fake trading apps on the Apple App Store and Google Play Store, along with phishing websites. This was reported by Group-IB.

This scam is part of a consumer investment fraud scheme known as "pig butchering." In this scheme, scammers trick people into investing in cryptocurrency or other financial products after gaining their trust, often pretending to be romantic partners or investment advisors.

These deceptive tactics usually lead to victims losing their money. In some cases, the scammers even ask for more money through various fees and payments.

Group-IB, a company based in Singapore, noted that this scam has affected people worldwide, with victims in Asia-Pacific, Europe, the Middle East, and Africa. The fake apps, made with a tool called UniApp Framework, are referred to as UniShadowTrade.

Source: Fake Trading Apps Target...


October 2, 2024 16:39 (on 10/2/24) |  0 | 1 minute read
  • First
  • «
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi