Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Verify Before You Apply
 

As the typhoon affects many areas, be cautious of calamity loan scams offering quick financial aid through fake links or messages. Always confirm loan offers directly with your bank or government agency before giving personal details. Remember, legitimate institutions never ask for passwords, OTPs, or fees via text or social media.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.


November 10, 2025 08:57 (on 11/10/25) |  0 | QR Ready | 1 minute read
Ask IT Out
 

Only download software or apps that have been approved by your IT department. Unapproved programs may contain malicious software or security weaknesses that put company data at risk. Always check with IT before installing anything new on your device. Staying cautious helps keep our systems and information secure. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


November 7, 2025 08:41 (on 11/7/25) |  0 | QR Ready | 1 minute read
Researchers Discover Security Gaps Putting AI Chatbots at Risk
 

Cybersecurity experts at Tenable have found seven security flaws in OpenAI’s GPT-4o and GPT-5 models that could let attackers steal users’ personal data or chat histories. OpenAI has already fixed some of the issues.

These flaws enable prompt injection attacks, where hackers hide malicious instructions that trick ChatGPT into revealing information or performing unintended actions. Examples include:

  • Hidden commands inside websites or web comments.
  • Dangerous links disguised as Bing ads or search results.
  • “One-click” or “zero-click” links that automatically trigger harmful prompts.
  • Bugs that let attackers hide code or corrupt ChatGPT’s memory.

Similar attacks have been reported in other AI tools like Claude, GitHub Copilot, and Microsoft 365 Copilot, showing how AI systems connected to the web are...


November 6, 2025 09:05 (on 11/6/25) |  0 | 2 minutes read
Pass It Right
 

Use strong, unique passwords for every account to keep your personal and financial information safe from hackers. Avoid simple or reused passwords, and mix letters, numbers, and symbols to make them harder to guess. Consider using a password manager to securely store and generate complex passwords, adding an extra layer of protection.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


November 6, 2025 09:04 (on 11/6/25) |  0 | QR Ready | 1 minute read
Think Before You Click: Scams Come Dressed as Gifts
 


 

Unexpected offers promising free prizes or big discounts are often scams. Scammers use excitement or pressure to rush you. If anyone asks for personal info or money upfront, pause and verify before responding.

What to Do:

  • Think before responding to unexpected offers
  • Verify by contacting the company directly
  • Ask for official confirmation
  • Trust your instincts—if it feels off, it probably is

"Stay sharp, check twice—don’t pay the price for a nice surprise!"

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


November 5, 2025 07:35 (on 11/4/25) |  0 | QR Ready | 1 minute read
Protect Your Tech
 

Always keep your devices physically secure to prevent unauthorized access. Never leave your laptop or other devices unattended in public places, even for a short time. At home, store them in a safe spot when not in use to avoid theft or tampering. Remember, physical security is just as important as digital security. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.


November 5, 2025 07:36 (on 11/4/25) |  0 | QR Ready | 1 minute read
Own Your Access
 

Never share your passwords or login credentials with anyone, even trusted friends or family members, as it can compromise your accounts and company security. Allowing others to use your work device can expose sensitive information or introduce malicious software that puts your organization at risk. Always keep your credentials private and your company devices for your use only to maintain data security and compliance.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


November 4, 2025 08:54 (on 11/4/25) |  0 | QR Ready | 1 minute read
Refresh Before They Guess
 

Always update your saved logins when prompted. Outdated credentials can leave your accounts exposed to unauthorized access. Regularly refreshing passwords ensures your information stays secure and aligned with current security standards. Taking a few seconds to update your logins can prevent major security breaches later. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


November 3, 2025 07:52 (on 11/2/25) |  0 | QR Ready | 1 minute read
Alert Beats Regret
 

Be cautious of unexpected phone calls or text messages asking for personal or financial information. Scammers often use vishing (voice phishing) and smishing (SMS phishing) to impersonate trusted organizations and create a sense of urgency to trick you into sharing sensitive data or clicking malicious links. Always verify requests through official contact channels and never provide information or click links from unknown or suspicious sources.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


October 30, 2025 08:31 (on 10/30/25) |  0 | QR Ready | 1 minute read
Assume Nothing. Secure Everything.
 

Protect your data by never assuming trust—even inside your organization. Zero Trust means always verifying every person and device.

Avoid:
× Trusting internal messages automatically
× Weak or repeated passwords
× Skipping multi-factor authentication
× Using personal/public devices for sensitive data
× Clicking suspicious links or attachments
× Ignoring security alerts

Zero Trust isn’t fear—it’s staying one step ahead.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.


October 29, 2025 08:00 (on 10/29/25) |  0 | QR Ready | 1 minute read
  • First
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi