Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Erase the Trace, Shield Your Digital Space
 

Clearing the cache and browsing history is an important step in keeping your online information safe. When you use the internet, your browser saves things such as your favorite websites, login details, and the websites you visit. If someone gains access to this information, they could potentially use it to harm you. By regularly clearing your cache and browsing history, you delete this sensitive data, making it more difficult for others to access your personal information. It's a simple way to protect your privacy and stay safe from cyber threats.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 30, 2023 21:03 (on 5/31/23) |  0 | QR Ready | 1 minute read
Prioritize Security at Printing and Photocopy Shops
 

ID printing and photocopy shops offer services such as printing identification cards and making copies of valuable documents. However, they also pose a security threat. Therefore, when visiting such shops, it is important to prioritize security. Only share the documents that are necessary and be vigilant while doing so. Additionally, take steps to protect your belongings. Avoid discussing sensitive information in public, ensure safe handling practices, securely store copies, and properly dispose of unused copies.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 30, 2023 20:25 (on 5/31/23) |  0 | QR Ready | 1 minute read
Research Device Security
 

The Internet of Things (IoT) refers to a network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and connectivity capabilities that enable them to connect and exchange data over the Internet. Before purchasing one of these devices, research the manufacturer's reputation for security. Choose devices from reputable companies that prioritize security and regularly provide updates and patches. Read reviews and look for any reported security incidents or vulnerabilities.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 17, 2023 20:47 (on 5/18/23) |  0 | QR Ready | 1 minute read
Practice Good Password Management
 

Practicing good password management is crucial because it enhances online security, protects personal information, and reduces the risk of unauthorized access to our accounts. By using strong and unique passwords, regularly updating them, and avoiding password reuse, we minimize the potential damage of data breaches and safeguard our digital identities.


June 1, 2023 18:07 (on 6/2/23) |  0 | 1 minute read
Be Wary of Public Wi-Fi Networks
 

Avoid making credit card or online banking payments when connected to public Wi-Fi networks, as they can be susceptible to eavesdropping and hacking attempts. Instead, use a secure and private network, such as your home Wi-Fi or a trusted virtual private network (VPN).

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 17, 2023 20:41 (on 5/18/23) |  0 | QR Ready | 1 minute read
Enable Transaction Alerts
 

Activate transaction alerts for your credit card and online banking accounts. These alerts can notify you via email or text message whenever a transaction is made above a certain threshold or if any changes occur in your account information. This will help you quickly identify and report any unauthorized activity to your bank

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 17, 2023 20:26 (on 5/18/23) |  0 | QR Ready | 1 minute read
Control Screen Sharing Options
 

Configure your meeting settings to allow screen sharing only for the host or designated meeting presenters. This prevents unexpected or malicious content from being shared during the meeting, reducing the risk of disruptions or exposure to inappropriate material.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 17, 2023 20:24 (on 5/18/23) |  0 | QR Ready | 1 minute read
Smartphone Security Shattered: BrutePrint Attack Unleashes Fingerprint Brute-Force to Unlock Devices
 

Researchers have uncovered an inexpensive method that enables the forceful cracking of smartphone fingerprints, enabling unauthorized access and control of the devices. This technique, known as BrutePrint, exploits two previously unknown vulnerabilities in the smartphone fingerprint authentication (SFA) framework to circumvent safeguards against failed biometric authentication attempts.

The vulnerabilities, called Cancel-After-Match-Fail (CAMF) and Match-After-Lock (MAL), exploit logical flaws in the authentication framework. These flaws arise due to inadequate protection of fingerprint data on the Serial Peripheral Interface (SPI) of fingerprint sensors.

According to the researchers, BrutePrint functions as an intermediary between the fingerprint sensor and the Trusted Execution Environment (TEE), effectively executing a...


May 30, 2023 17:15 (on 5/31/23) |  0 | 1 minute read
Be Mindful of Meeting Recording and Storage
 

If recording the meeting is necessary, inform all participants in advance and comply with relevant privacy regulations. Store recorded meetings securely and limit access to authorized individuals to maintain confidentiality. This ensures that all topics discussed within the meeting stay within the intended participants.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 17, 2023 20:13 (on 5/18/23) |  1 | QR Ready | 1 minute read
Regularly Monitor Your Accounts
 

Frequently review your bank and credit card statements to identify any unauthorized transactions. If you notice any suspicious activity, report it to your financial institution immediately. This practice ensures the integrity of your bank statements and helps prevent financial distress.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 17, 2023 20:11 (on 5/18/23) |  0 | QR Ready | 1 minute read
  • First
  • «
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi