Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Mobile Device Security
 

As part of our daily lives, we need to ensure that our handy connection to the digital world remains secure. Follow these tips on how to properly secure your mobile devices:

  1. Device Lock:
  • Security Lock: Use PIN, pattern, fingerprint, or facial recognition to secure your device. Always lock it when not in use.

2. App Permissions:

  • Permission Review: Review and restrict app permissions to safeguard your data.
  • Best Practice: Only grant essential permissions to apps to minimize potential risks.

3. Remote Wipe:

  • Data Erasure: Enable remote wipe features to erase data in case of loss or theft.
  • Best Practice: Familiarize yourself with the remote wipe options on your device for swift response.

4. App Updates:

  • Regular Updates: Keep your apps updated to fix security vulnerabilities.
  • Best Practice: Enable automatic app updates...
    October 18, 2023 17:30 (on 10/19/23) |  0 | QR Ready | 1 minute read
Shoulder Surfing Blockade
 

Avoid becoming a victim of prying eyes by thwarting shoulder surfers. Position your body and hands with care to shield against potential eavesdroppers in public areas and safeguard your PINs, passwords, and private information. To further complicate any attempts to view your screen from angles other than directly in front of you, consider applying a privacy screen protector to your devices.

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


August 20, 2023 17:39 (on 8/21/23) |  0 | QR Ready | 1 minute read
Episode 3 - Sweeping Away Digital Footprints
 

This third episode of our Cybersecurity Awareness Month videos will tackle how you can be in control and effectively manage your digital footprint. 

Your browser stores a treasure trove of info. But, remember, it's a risk too! Regularly clear your cache & history to keep sensitive data away from prying eyes.


October 15, 2023 16:56 (on 10/15/23) |  0 | QR Ready | 1 minute read
Vishing Vigilance
 

Tune into your inner cyber detective when receiving phone calls requesting sensitive information. Instead of divulging details, hang up and independently verify the caller's legitimacy by dialing official contact numbers. Avoid giving away your phone number to strangers, especially online, to minimize unwanted vishing calls.

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


August 20, 2023 17:38 (on 8/21/23) |  0 | QR Ready | 1 minute read
Android Espionage Alert: Unmasking SpyNote, the Covert Audio Recording Trojan
 

The Android banking trojan, SpyNote, has been thoroughly examined to uncover its multifaceted data-gathering capabilities. Typically distributed through SMS phishing campaigns, this spyware tricks potential victims into installing it by luring them to click on embedded links. Once installed, SpyNote seeks invasive permissions to access call logs, the camera, SMS messages, and external storage. It excels at concealing its presence on the Android device, making it challenging to detect.

Notably, SpyNote can be initiated through an external trigger, and once activated, it obtains accessibility permissions. It then leverages these permissions to record audio, and phone calls, log keystrokes, and capture screenshots via the MediaProjection API. The malware incorporates diehard services to resist termination attempts, automatically restarting when about to be shut down. Additionally, it...


October 16, 2023 17:16 (on 10/17/23) |  0 | 2 minutes read
It’s Everyone’s Responsibility
 

To ensure the utmost protection of our company's data on personal devices, it is crucial to follow these steps with absolute determination: thoroughly understand the rules, regularly update and secure devices, keep work and personal activities separate, actively participate in cybersecurity training and awareness, and exercise caution when using work-related apps. By adhering to these steps, we can guarantee the safety of our data and confidently use personal devices at work.

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


October 1, 2023 18:46 (on 10/2/23) |  1 | QR Ready | 1 minute read
Securi-Trivia: Weekly Quiz (October 2023 - Week 2)
 

Hello and welcome to this week's Securi-Trivia! This quiz is designed to test your knowledge and reinforce the cybersecurity tips we send out every day. Each week, we'll ask you 10 multiple-choice questions based on the daily tips and awareness we've sent out during the week. The questions will cover a range of topics, including understanding data security and more. To pass the quiz and receive dreampoints, you'll need to get at least an 80% passing score.

Remember, staying safe online is a shared responsibility. Answer the questions to test your knowledge. Don't worry if you don't get them all right on the first try - you can retake the quiz as many times as you like!

Click this link to take the quiz: https://securitytips.cloudstaff.com/quizzes/view/93 


October 12, 2023 19:17 (on 10/13/23) |  0 | 1 minute read
Clean Desk, Safe Space
 

Enforcing a 'clean-desk' policy and ensuring that documents, computers, and passwords are never left unattended in your office or home are essential measures for protecting sensitive information. By doing so, you can significantly reduce the risk of unauthorized access or duplication and feel more confident in the safety of your information.

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


October 1, 2023 18:45 (on 10/2/23) |  1 | QR Ready | 1 minute read
Personal Information Must be Secretly Secured
 

It's crucial to be vigilant about the information you share on social media. Avoid revealing personal details such as your favorite car, your spouse's name, or your kids' birthdates, as this makes it easier for cybercriminals to hack into your accounts and steal your sensitive data. Remember, online privacy is not just your responsibility but also your duty as a responsible digital citizen. So, think twice before sharing anything online, and never trust strangers on the internet!

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


October 1, 2023 18:44 (on 10/2/23) |  1 | QR Ready | 1 minute read
Safe Browsing Habits
 

Safe Browsing Habits emphasizes the importance of adopting secure online practices to protect personal and sensitive information from various cybersecurity threats. The list below enumerates some of the most effective browsing habits that you can employ as an individual. 

  1. HTTPS:
  • Importance: It ensures that the data exchanged between your browser and the website remains confidential and cannot be easily intercepted by malicious actors.
  • Look for "https://": Always check for the "https://" prefix in website URLs, especially when you're about to enter sensitive information like passwords, credit card details, or personal data
  • Avoid entering sensitive information on websites that do not have HTTPS.

2. Public Wi-Fi

  • Using public Wi-Fi without precautions can expose your sensitive information to eavesdropping and interception.
  • Use a...
    October 11, 2023 16:28 (on 10/11/23) |  0 | 2 minutes read
  • First
  • «
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi