Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


The Cyber Bullying Stops Here!
 

If you're experiencing online harassment on social media, there are ways to customize your settings to limit who can respond to your posts. For instance, you can adjust your preferences so that only individuals you know or mention can reply to your updates. Simply update your settings that allow you to control who can interact with your posts.

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


October 15, 2023 18:48 (on 10/16/23) |  0 | QR Ready | 1 minute read
Insecure Mobile Advertisements
 

It's no secret that mobile ads can often be invasive and disruptive. For example, you may encounter a sudden pop-up ad while a page is loading, claiming that you have won something and redirecting you to another website. It is highly recommended that you do not interact with these types of ads. To avoid such disturbances, using a content blocker on your mobile device can be very helpful. By doing so, you can reduce the number of ads you see while browsing, improving your overall browsing experience and allowing you to concentrate on your search without any interruptions.

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


October 15, 2023 18:48 (on 10/16/23) |  0 | QR Ready | 1 minute read
Treat Virtual Meetings as Confidential 
 

In today's world, online meetings have become an essential part of our lives, especially in educational and professional environments. However, with the convenience of these virtual gatherings comes the risk of misbehavior. Unfortunately, some individuals take advantage of online meetings to cause disruption by sharing inappropriate content. To prevent such incidents, it's highly recommended to adjust your meeting settings so that users require approval before joining. This simple step can help ensure a safe and productive online meeting experience for all attendees. 

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


October 15, 2023 18:47 (on 10/16/23) |  0 | QR Ready | 1 minute read
PIN and Biometric Synergy
 

While biometric data like face or fingerprints is a quick and convenient way to access apps or unlock your phone, it may not always guarantee complete security. There is a possibility of unauthorized access, which could pose a threat to your data. On the other hand, using a PIN may be a slower process, but it is the most secure way to protect your data due to its complexity and resilience against breaches.

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


October 15, 2023 18:46 (on 10/16/23) |  0 | QR Ready | 1 minute read
Treat Business Information as Personal Information
 

In today's world, businesses are generating and exchanging a lot of data and communications that are sensitive and confidential. It is crucial to treat them with utmost protection and privacy just like personal information. To achieve this, it is recommended to use strong and unique passwords for business accounts, implement two-factor authentication(2FA), encrypt sensitive documents and emails, and regularly review and secure your company's digital assets. You will not only enhance security but also safeguard your organization's reputation and the trust of your clients and partners. Cybercriminals often target businesses for valuable information, making this proactive approach crucial for overall cybersecurity.


October 15, 2023 17:42 (on 10/16/23) |  0 | QR Ready | 1 minute read
Disable Auto-Connecting to Wi-Fi Networks
 

Turn off the auto-connect feature on your mobile devices and laptops. This feature can automatically connect your device to open or unsecured Wi-Fi networks, putting your data at risk. By manually selecting and connecting to trusted networks only, you gain more control over your online security and reduce the chances of unintentionally connecting to malicious hotspots. This small adjustment can make a significant difference in protecting your sensitive information while using public Wi-Fi.


October 15, 2023 17:40 (on 10/16/23) |  0 | QR Ready | 1 minute read
Never Leave Your Mobile Devices Unattended
 

It's crucial to never leave your mobile devices, such as smartphones and laptops, unattended in public places. These devices contain a wealth of personal and sensitive information that can be easily accessed if left unguarded. Always keep your devices with you or use secure locking mechanisms like passcodes, biometrics, or screen lock patterns to prevent unauthorized access if they're misplaced or stolen. 


October 15, 2023 17:39 (on 10/16/23) |  0 | 1 minute read
Malvertisers Leverage Google Ads to Target Individuals In Search for Popular Software
 

New information has surfaced regarding a malicious advertising campaign that exploits Google Ads to direct users searching for popular software to fake landing pages and distribute subsequent-stage malware.

Malwarebytes, the organization that uncovered this activity, noted its uniqueness in user fingerprinting and the distribution of time-sensitive payloads. This attack targets individuals searching for software like Notepad++ and PDF converters. It presents deceptive ads in Google search results that, when clicked, identify and eliminate bots and unintended IP addresses, showing a decoy site.

If the visitor is considered interesting to the threat actor, they are redirected to a counterfeit website advertising the software while secretly fingerprinting the user's system to detect if it's running on a virtual machine. Users who...


October 23, 2023 17:00 (on 10/24/23) |  0 | 2 minutes read
Even If It's Obvious, Avoid Sharing Passswords
 

One of the cardinal rules of cybersecurity is to never share your passwords with anyone, regardless of how simple or obvious they may seem. Sharing your password, even with trusted individuals, can lead to unintended breaches or misuse of your accounts. Always maintain the confidentiality of your passwords, and if necessary, consider using a password manager to securely share credentials in a controlled and encrypted manner, without revealing the actual password. This practice ensures that your accounts remain protected and your digital security remains intact.


October 15, 2023 17:38 (on 10/16/23) |  0 | QR Ready | 1 minute read
Securi-Trivia: Weekly Quiz (October 2023 - Week 3)
 

Hello and welcome to this week's Securi-Trivia! This quiz is designed to test your knowledge and reinforce the cybersecurity tips we send out every day. Each week, we'll ask you 10 multiple-choice questions based on the daily tips and awareness we've sent out during the week. The questions will cover a range of topics, including understanding data security and more. To pass the quiz and receive dreampoints, you'll need to get at least an 80% passing score.

Remember, staying safe online is a shared responsibility. Answer the questions to test your knowledge. Don't worry if you don't get them all right on the first try - you can retake the quiz as many times as you like! 

Click this link to take the quiz: https://securitytips.cloudstaff.com/quizzes/view/96 


October 19, 2023 20:28 (on 10/20/23) |  0 | 1 minute read
  • First
  • «
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi