Have some tips? Write it down and share it to your friends!
Click Login Now button to start!
March 6, 2023 20:24 (on 3/7/23) | 0 | 0 minutes read
February 19, 2023 20:14 (on 2/20/23) | 0 | 1 minute read
Many individuals are unaware that all criminals need to target you, your loved ones, and your belongings—both online and offline—is personal information from social media posts. This information serves as the basis for attacks carried out by online criminals. We must avoid sharing sensitive information, which includes full names, postal addresses, birthdays, information about children, holidays, and locations.
Got questions? Submit a ticket at [PB8324.3] Data Security Support.
February 26, 2023 21:37 (on 2/27/23) | 0 | QR Ready | 1 minute read
Your mobile device may be using default permissions that you were unaware of having granted or having suspicious apps operating in the background. They have the ability to collect your personal data without your awareness. In order to remove rights that you don't need or aren't using, follow the “rule of least privilege.” According to the principle of least privilege, apps and other system components should only have the access rights required for them to operate properly. For instance, a device's microphone or contacts list shouldn't be made available to an app that simply requires access to the camera.
Got questions? Submit a ticket at [PB8324.3] Data Security Support.
February 26, 2023 21:45 (on 2/27/23) | 0 | QR Ready | 1 minute read
Let's test your cybersecurity awareness this month! Take this March 2023 Cybersecurity Quiz on Playerone to assess your overall awareness of your security posture.
This quiz is timed and consists of 10 questions. After achieving a passing rate of 90%, you will receive a badge and 100 DREAMPOINTS.
Take it now on PlayerOne: https://playerone.cloudstaff.com/Quizzes/fced3641bdae4c3d90fde6ab4c592fd5
March 1, 2023 00:11 (on 3/1/23) | 0 | 1 minute read
You may want to consider limiting access to all other directories and creating a special directory solely for file sharing. Restrict access to your files by sharing them only with those who genuinely need them and whom you know and trust. Also, remember to remove files you no longer need to reduce the risk of unwanted access. Regularly clean up your file-sharing account and delete any files you no longer require.
Got questions? Submit a ticket at [PB8324.3] Data Security Support.
February 26, 2023 22:23 (on 2/27/23) | 0 | QR Ready | 1 minute read
Links must be checked to ensure they are operational and pointing to the proper destination.
To make sure links are legitimate, hover over them. Ensure that URLs begin with "https". This shows that encryption is activated to safeguard your data. Always remember to be aware of "lookalike" sites like "Cloudst4aff.com".
Got questions? Submit a ticket at [PB8324.3] Data Security Support.
February 26, 2023 22:01 (on 2/27/23) | 0 | QR Ready | 1 minute read
It's important to protect your passwords. If you suspect that your password has been compromised, change it immediately. Your password may be compromised if you experience multiple sign-in failures on your account, if someone else accesses another account that uses the same or a similar password, or if you notice any unusual activity on your account. If your password has been compromised, all the data associated with it may also be compromised. It's crucial to change your password if you believe that someone else has accessed your account. Make sure that your new password is completely unique.
If you have any questions, please submit a ticket at [PB8324.3] Data Security Support.
February 16, 2023 00:30 (on 2/16/23) | 0 | QR Ready | 1 minute read
Proceed with caution when accessing email attachments, especially password-protected ZIP files. Malicious software or malware may be contained in email attachments. Since a virus scanner may not be able to automatically scan the ZIP file's contents, it's important to take precautions. Before opening any email attachment, make sure you know and trust the sender to protect yourself. Never activate macros in email attachments. The macro, not the email attachment, may pose a real danger.
Got questions? Submit a ticket at [PB8324.3] Data Security Support.
February 16, 2023 00:20 (on 2/16/23) | 0 | QR Ready | 1 minute read
Any information assets you find—like USB drives—should be surrendered immediately. Never plug them into your workstation. These allegedly "lost" files and devices might contain false information or harmful software that could infect your computer and the network with spyware, which would allow for network eavesdropping or other forms of malware.
Got questions? Submit a ticket at [PB8324.3] Data Security Support.
February 16, 2023 00:17 (on 2/16/23) | 1 | QR Ready | 1 minute read