Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Daily News Flash

Daily News Flash

Trust No Voice

Voice phishing, or "vishing," is a scam in which attackers impersonate trusted sources over the phone to steal personal information. Scammers may fake caller IDs to appear as banks, e-wallet providers, government agencies, or tech support. Never trust a call asking for immediate action, never click on links sent via SMS by the caller, and never provide personal information. Always hang up and call the official number directly if you’re unsure. 

August 25, 2025 17:21 (23 hours, 16 minutes ago) |  0 | QR Ready | 1 minute read
Stay Wallet-Wise

As e-wallets and digital banking become a part of everyday life for many of us, it's important to take steps to protect our personal and financial information. Use strong, unique passwords and enable multi-factor authentication to keep your accounts secure. Watch out for phishing scams by avoiding suspicious links, never sharing sensitive information through emails, messages, or calls, and only downloading apps from official sources. Also, avoid using public Wi-Fi when accessing your...


August 24, 2025 20:37 (1 day, 20 hours ago) |  0 | QR Ready | 1 minute read
Verify Before You Reply

Be cautious of unsolicited phone calls requesting personal or financial information, even if the caller claims to be from a trusted organization. Scammers can make it look like they’re calling from a real company or local number to trick you, and they often use urgent language to pressure you into revealing sensitive details. If you’re unsure, hang up and call the company back using a verified phone number from their official website.

Do you have a question? Submit a ticket at...


August 21, 2025 17:33 (4 days, 23 hours ago) |  0 | QR Ready | 1 minute read
Stay Wary, Not Sorry

Always be cautious—it's a smart habit. A healthy level of suspicion can help you notice red flags before they become real threats. Don’t automatically trust emails, links, attachments, or anyone claiming to be from your company, even if they appear to come from someone you know. Taking a moment to double-check can prevent costly mistakes. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


August 20, 2025 19:39 (5 days, 20 hours ago) |  0 | QR Ready | 1 minute read
Tricks in Disguise

Avoid clicking on ads, even if they seem trustworthy—they’re often used to spread malicious software. Cybercriminals can disguise harmful content behind professional-looking advertisements. These malicious ads may redirect you to fake sites or automatically download harmful software. Just one wrong click can compromise your device or steal your personal information. For better security, always go directly to a website rather than clicking on ads. 

August 19, 2025 17:02 (6 days, 23 hours ago) |  0 | QR Ready | 1 minute read
Zip It Secure

Avoid storing or sending sensitive information, such as passwords or personal data, in plain text. Without encryption, this information can be easily intercepted or accessed by attackers, putting your accounts and privacy at risk. To stay protected, always use secure communication channels like HTTPS or VPNs, and store data using strong encryption methods.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


August 18, 2025 16:35 (1 week, 1 day ago) |  0 | QR Ready | 1 minute read
Trust Official, Not Caller

If you receive an unexpected call from someone claiming to be from the government or tech support asking you to install an app, it's likely a scam. These attackers often create a false sense of urgency or offer "help" to avoid in-person processes, then guide you to install malware disguised as a legitimate tool. No official agency or company will ever ask you to download an app through a call or email link. Always hang up and verify the request through trusted,...


August 17, 2025 17:13 (1 week, 1 day ago) |  0 | QR Ready | 1 minute read
Trust Less, Verify More

Effective cybersecurity follows the Zero Trust principle: never automatically trust any device or person, even if they’re inside your organization. Always verify requests, use strong, unique passwords, and enable multi-factor authentication (MFA) to protect your accounts. Make sure to access sensitive information only through secure, approved devices and applications, and stay cautious to keep your data safe.

Do you have a question? Submit a ticket at [PB8324.3] Data Security...


August 14, 2025 17:13 (1 week, 4 days ago) |  0 | QR Ready | 1 minute read
Trust Apps, Not Texts

Be cautious of SMS messages claiming you've received money and prompting you to click a link to check your balance. These messages are often phishing scams designed to steal your personal information. Never click on suspicious links or enter your login details outside the official wallet app or website. Always verify transactions directly through the official app — never through links in messages. 

Do you have a question?...


August 13, 2025 17:04 (1 week, 5 days ago) |  0 | QR Ready | 1 minute read
One Key, Many Doors

Linking your accounts can be convenient, but it’s like stacking dominoes—if one falls, the others can quickly follow. If someone gets into one linked account, they could also access your personal information, financial data, or other connected platforms. To reduce this risk, use trusted services, turn on two-factor authentication, and regularly remove access for apps or sites you no longer use. These simple steps can help prevent one weak link from putting your entire digital life at risk...


August 12, 2025 17:57 (1 week, 6 days ago) |  0 | QR Ready | 1 minute read
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • »
  • Last


  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi