Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Securi-Trivia: Weekly Quiz (May 2023 - Week 2)
 

Hello and welcome to this week's Securi-Trivia! This quiz is designed to test your knowledge and reinforce the cybersecurity tips we send out every day. Each week, we'll ask you 10 multiple-choice questions based on the daily tips and awareness we've sent out during the week. The questions will cover a range of topics, including password security, email phishing, data protection, and more. To pass the quiz and receive DREAMPOINTS, you'll need to get at least 8 out of 10 questions correct. 

Remember, staying safe online is a shared responsibility. Answer the questions to test your knowledge. Don't worry if you don't get them all right on the first try - you can retake the quiz as many times as you like! 

To take the quiz, click here. 


May 11, 2023 22:43 (on 5/12/23) |  0 | 1 minute read
Never Download Apps from Untrusted Sources
 

Your device and personal information are significantly at risk when you download apps from unknown sources. These sources often distribute malware disguised as trustworthy apps. They may also include hidden features that can hijack your smartphone's resources, resulting in poor performance, high battery consumption, or total device failure. Additionally, these sources avoid the rigorous security checks carried out by legitimate app stores, which increases the risk of encountering phony or fake programs that trick users into unknowingly giving away their personal information. To protect your privacy and ensure the security of your device, it is crucial to only download apps from trusted and reputable sources, such as official app stores, where stringent measures are in place to verify the authenticity and safety of the applications.

May 10, 2023 19:08 (on 5/11/23) |  0 | QR Ready | 1 minute read

Be Wary of Watering Hole Attacks
 

Watering hole attacks are a type of cyberattack in which attackers compromise a website that their intended victims are likely to visit. The attackers then implant malware onto the website, which infects each computer that views it. To defend yourself against watering hole attacks, keep your software up to date and utilize security tools that can identify and prevent malware infections. Furthermore, exercise caution when visiting unfamiliar or suspicious websites, and avoid clicking on links or downloading attachments from unknown or untrustworthy sources.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 3, 2023 15:53 (on 5/3/23) |  0 | QR Ready | 1 minute read
Google Fortifies Cyber Defenses with Latest Security Updates
 

At its yearly developer conference, Google I/O, the tech company today introduced a myriad of new privacy, safety, and security features. The latest efforts are designed to safeguard its users from cyber threats, such as phishing attacks and malicious websites while giving them greater authority and visibility over their personal data.

Below is an overview of the recently introduced features:

  • Improved data control and transparency
  • Gmail Dark Web Scan Report
  • Effortlessly Delete Maps Search History
  • AI-Powered Safe Browsing
  • Content Safety API Expansion
  • May 10, 2023 18:38 (on 5/11/23) |  0 | 1 minute read
Be Cautious of Unexpected Calls
 

Scammers and hackers frequently employ social engineering techniques to deceive people into providing personal information or granting access to their devices. If you receive an unexpected call demanding sensitive information, avoid providing any information. Instead, hang up and independently confirm the request's legality by contacting the organization they are claiming to be directly, using a legitimate phone number or email address. By remaining aware and cautious, individuals can protect themselves from potential cyber attacks.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 3, 2023 15:49 (on 5/3/23) |  0 | QR Ready | 1 minute read
Apply Security Patches
 

To guard against known vulnerabilities and security issues, all software programs and security updates on all devices, including servers, workstations, and mobile devices, should be updated regularly. Software providers release updates and patches regularly to fix security vulnerabilities and flaws. Organizations can address these vulnerabilities and reduce the risk of cyber attacks and data breaches by frequently updating software and security patches. Failure to update software and security updates can expose systems to attacks that exploit known vulnerabilities, resulting in data loss, theft, or corruption.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 2, 2023 21:29 (on 5/3/23) |  0 | QR Ready | 1 minute read
Use Secure Data Transfer Methods
 

Protocols that use encryption and other security measures to protect data in transit, such as Secure File Transfer Protocol (SFTP) or Virtual Private Network (VPN), are examples of secure data transfer methods. These protocols ensure that data is encrypted before leaving the sender's system and decrypted only when it arrives at the intended recipient's system. It aids in the prevention of data eavesdropping and interception by hackers or hostile actors. Furthermore, these protocols help to ensure that data remains private even when it is transferred over an unsecured network, such as the Internet.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 2, 2023 21:25 (on 5/3/23) |  0 | QR Ready | 1 minute read
Cyber Security Awareness Situational Quiz for Beginners
 

Test your knowledge of cyber security awareness with this beginner-level situational quiz. Answer questions related to phishing attacks, malware protection, social media security, and more to learn how to stay safe online. Each question presents a real-world scenario and multiple-choice answers, with explanations provided to help you understand why each answer is correct. Whether you're new to cyber security or just need a refresher, this quiz is a great way to improve your awareness and protect yourself against common cyber threats.

Score at least 80% and you'll receive 100 dreampoints! Take the quiz by clicking here. 


May 3, 2023 16:28 (on 5/3/23) |  0 | 1 minute read
Limit Data Access
 

Access to sensitive data should be restricted to employees who need it to execute their job tasks. Limiting access to sensitive data guarantees that only those with a legitimate need for it have access to it, lowering the risk of unauthorized access, theft, or loss of sensitive data. Furthermore, access controls should be reviewed and updated regularly to ensure their effectiveness as the organization's data access requirements change.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 2, 2023 21:21 (on 5/3/23) |  0 | QR Ready | 1 minute read
Do Your Bumper Stickers Reveal Too Much About Your Family?
 

Many proud parents like to advertise their children’s accomplishments with customized bumper stickers on their cars. The problem is those stickers and decals reveal information that could give criminals an edge, like where your children go to school or how many people are in your family.


April 27, 2023 16:22 (on 4/27/23) |  0 | QR Ready | 1 minute read
  • First
  • «
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi