Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Monitor Your Footprints in the Web
 

A digital footprint refers to a record of your online behavior, including social media posts, online transactions, and website visits. Cybercriminals can exploit this information to track your activities, steal your personal data, and even impersonate you on the internet. To protect your digital footprint, it is essential to regularly review your online presence and remove any sensitive information that could be used against you. This entails deleting outdated social media accounts, using secure and unique passwords, and being cautious when sharing personal information publicly.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 3, 2023 16:19 (on 5/3/23) |  0 | QR Ready | 1 minute read
Avoid Accepting All Cookies
 

Cookies are small text files that store information about your online activities, such as your browsing history and login details. While cookies can enhance your browsing experience, they can also be exploited by hackers to track your online activity, steal your personal information, and compromise your security. To safeguard yourself from the risks associated with cookies, you can modify your browser settings to reject third-party cookies and only accept cookies from trusted websites. Furthermore, it is important to regularly clear your browser's cookie cache to eliminate any stored information that could be used against you.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 3, 2023 16:08 (on 5/3/23) |  0 | QR Ready | 1 minute read
Free Streaming is a Costly Risk
 

While it may seem appealing to use free online streaming services to watch movies and TV shows for free, they frequently come with hidden risks such as malware infections, data theft, and privacy violations. Always choose legal, paid streaming services that have built-in security mechanisms to guard against cyber threats in order to avoid the hazards associated with unlicensed streaming services.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 3, 2023 16:04 (on 5/3/23) |  0 | QR Ready | 1 minute read
How Phishing-as-a-Service is Making It Easier for Cybercriminals to Attack
 

Since approximately mid-2022, cybercriminals have been utilizing a recently developed platform called ‘Greatness’, which operates as a phishing-as-a-service (PhaaS or PaaS) solution. This platform specifically focuses on targeting business users who utilize the Microsoft 365 cloud service. Its introduction has significantly reduced the difficulty of conducting phishing attacks.

Greatness encompasses functionalities found in highly advanced PaaS solutions, including but not limited to MFA bypass, IP filtering, and seamless integration with Telegram bots.

In addition, Greatness provides its affiliates with an attachment and link builder, which enables them to construct convincing decoy and login pages with remarkable accuracy. The platform's unique features include pre-filling the victim's email address and displaying their...


May 14, 2023 19:45 (on 5/15/23) |  0 | 2 minutes read
Episode 7: Safe Social Media Posting
 

May 15, 2023 22:55 (on 5/16/23) |  0 | 0 minutes read
Watch Out for Pop-up Traps
 

Attackers regularly use pop-up advertising to deceive people into downloading malware, giving personal information, or visiting harmful websites. To avoid falling victim to these schemes, individuals should use a pop-up blocker to prevent them from appearing on their computers. Furthermore, use caution when clicking, as they are frequently disguised as legitimate advertisements. Never click on pop-ups that offer free downloads or prize giveaways, and never provide personal or payment information to pop-ups.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 3, 2023 16:00 (on 5/3/23) |  0 | QR Ready | 1 minute read
Keep the Door to Yourself
 

Tailgating is a security breach where an unauthorized person enters a restricted area by following an authorized person without proper verification. It can result in theft or damage of sensitive information. To prevent tailgating, individuals should be aware of their surroundings, avoid holding doors open for strangers, and use proper access control methods such as electronic access cards or biometric identification.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 3, 2023 15:57 (on 5/3/23) |  0 | QR Ready | 1 minute read
Securi-Trivia: Weekly Quiz (May 2023 - Week 2)
 

Hello and welcome to this week's Securi-Trivia! This quiz is designed to test your knowledge and reinforce the cybersecurity tips we send out every day. Each week, we'll ask you 10 multiple-choice questions based on the daily tips and awareness we've sent out during the week. The questions will cover a range of topics, including password security, email phishing, data protection, and more. To pass the quiz and receive DREAMPOINTS, you'll need to get at least 8 out of 10 questions correct. 

Remember, staying safe online is a shared responsibility. Answer the questions to test your knowledge. Don't worry if you don't get them all right on the first try - you can retake the quiz as many times as you like! 

To take the quiz, click here. 


May 11, 2023 22:43 (on 5/12/23) |  0 | 1 minute read
Never Download Apps from Untrusted Sources
 

Your device and personal information are significantly at risk when you download apps from unknown sources. These sources often distribute malware disguised as trustworthy apps. They may also include hidden features that can hijack your smartphone's resources, resulting in poor performance, high battery consumption, or total device failure. Additionally, these sources avoid the rigorous security checks carried out by legitimate app stores, which increases the risk of encountering phony or fake programs that trick users into unknowingly giving away their personal information. To protect your privacy and ensure the security of your device, it is crucial to only download apps from trusted and reputable sources, such as official app stores, where stringent measures are in place to verify the authenticity and safety of the applications.

May 10, 2023 19:08 (on 5/11/23) |  0 | QR Ready | 1 minute read

Be Wary of Watering Hole Attacks
 

Watering hole attacks are a type of cyberattack in which attackers compromise a website that their intended victims are likely to visit. The attackers then implant malware onto the website, which infects each computer that views it. To defend yourself against watering hole attacks, keep your software up to date and utilize security tools that can identify and prevent malware infections. Furthermore, exercise caution when visiting unfamiliar or suspicious websites, and avoid clicking on links or downloading attachments from unknown or untrustworthy sources.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 3, 2023 15:53 (on 5/3/23) |  0 | QR Ready | 1 minute read
  • First
  • «
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi