Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Hackers Don’t Have Holidays!
 

As the holiday season approaches, it's important to take extra precautions to ensure your safety on social media. Avoid sharing your travel plans or personal information, and consider posting less frequently to minimize the amount of sensitive data available online. Remember to be respectful of different beliefs and opinions, and think about the potential long-term consequences of your online activity. Additionally, take the time to adjust your privacy settings to ensure that you're only sharing information with people you trust.

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


November 1, 2023 20:20 (on 11/2/23) |  0 | QR Ready | 1 minute read
Don’t Run the Untrusted
 

In today's digital age, it's crucial to prioritize online safety to avoid putting your data at risk. Steer clear of suspicious programs and files. Only download software from trusted sources, and be cautious when opening email attachments or responding to requests for personal information. Additionally, it's important to stay vigilant when faced with antivirus deactivation prompts, as they can often be a tactic used by cybercriminals to gain access to your sensitive data. 

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


November 1, 2023 20:19 (on 11/2/23) |  0 | QR Ready | 1 minute read
Enhanced FCC Measures Safeguard Customers from SIM Swapping Threats
 

The U.S. Federal Communications Commission (FCC) is taking decisive action to counteract the rising threat of SIM-swapping attacks and port-out fraud within cell phone account scams. These fraudulent activities expose consumers to risks such as unauthorized access to personal data and the compromise of sensitive information.

The new rules, initially proposed in July 2023, mandate wireless providers to implement robust authentication measures before allowing the redirection of a customer's phone number to a new device or service provider. This proactive approach is aimed at preventing malicious actors from covertly swapping SIM cards or transferring phone numbers to different carriers without the legitimate user's knowledge or consent.

One critical component of the FCC's initiative is the requirement for immediate and real-time...


November 20, 2023 16:42 (on 11/21/23) |  0 | 2 minutes read
Data's Rainbow Spectrum
 

When dealing with data, it is crucial to classify it according to its sensitivity level, which may range from public to confidential and highly sensitive. This classification allows for the implementation of specific security measures and controls to effectively protect the data based on its importance and level of risk.

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


November 1, 2023 19:48 (on 11/2/23) |  0 | QR Ready | 1 minute read
Securi-Trivia: Weekly Quiz (November 2023 - Week 2)
 

Hello and welcome to this week's Securi-Trivia! This quiz is designed to test your knowledge and reinforce the cybersecurity tips we send out every day. Each week, we'll ask you 10 multiple-choice questions based on the daily tips and awareness we've sent out during the week. The questions will cover a range of topics, including understanding data security and more. To pass the quiz and receive dreampoints, you'll need to get at least an 80% passing score.

Remember, staying safe online is a shared responsibility. Answer the questions to test your knowledge. Don't worry if you don't get them all right on the first try - you can retake the quiz as many times as you like! 

Click this link to take the quiz: https://securitytips.cloudstaff.com/quizzes/view/102 


November 16, 2023 20:10 (on 11/17/23) |  0 | 1 minute read
Exit Protocols for Guardians of Data
 

It is crucial to promptly revoke an employee's access to sensitive data as soon as they leave the company. Therefore, conducting an exit interview is necessary to collect any company-owned devices and to revoke access rights. This ensures that no employee retains unauthorized access to sensitive data, protecting the company from potential security breaches.

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


November 1, 2023 19:47 (on 11/2/23) |  0 | QR Ready | 1 minute read
Protecting Sacred Grounds
 

It is crucial to restrict physical access to spaces where sensitive data is stored to prevent unauthorized individuals from gaining entry. To achieve this, access control systems, surveillance cameras, and visitor logs should be put in place to monitor and track the movement of anyone who enters these areas. These measures can help ensure that only authorized personnel are granted access to the sensitive data and that any breach attempts are detected and prevented.

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


November 1, 2023 19:47 (on 11/2/23) |  0 | QR Ready | 1 minute read
No Scam Scare in Holiday's Air
 

Planning a worry-free vacation? Ensure a scam-free holiday experience with these top tips and precautions.

When eagerly anticipating a well-deserved vacation, the last thing you want is to be marred by scams and fraudulent activities. While traveling should be about relaxation and adventure, it's crucial to stay vigilant and take necessary precautions to avoid falling victim to travel scams. This guide will help you enjoy your holidays with peace of mind, ensuring there's no scam scare in the air.


November 15, 2023 16:35 (on 11/16/23) |  0 | QR Ready | 1 minute read
Beware: Counterfeit Skills Assessment Platforms Exploiting IT Job Hunters, Microsoft Alerts
 

A faction within the well-known Lazarus Group, identified as Sapphire Sleet (also known as APT38, BlueNoroff, CageyChameleon, and CryptoCore), has recently established deceptive infrastructure mimicking skills assessment portals. Microsoft, which detected this activity, notes it as a notable shift in the persistent actor's tactics. 

Sapphire Sleet has a history of orchestrating cryptocurrency theft through social engineering. The group often targets individuals on platforms like LinkedIn using skills assessment-related lures, subsequently transitioning successful communications to other platforms. 

Microsoft reveals that the hackers previously relied on tactics such as sending malicious attachments or embedding links in legitimate websites like GitHub. However, the prompt identification and removal of these payloads may...


November 14, 2023 23:55 (on 11/15/23) |  0 | 1 minute read
Thriving Beyond the Office
 

In today's world, where remote work is becoming more common, it is essential to prioritize the security of your devices and connections. It is crucial to equip all your devices with the latest security software for secure connections. Additionally, it is equally important to educate and train all employees about the potential risks of working outside the office environment and how to protect themselves and their devices from security threats. By adopting these measures, you can ensure that your remote work environment is secure, and your data is protected.

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


November 1, 2023 19:46 (on 11/2/23) |  0 | QR Ready | 1 minute read
  • First
  • «
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi