Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Daily News Flash

Daily News Flash

Keep the Doors Closed

For better security, it's important to turn off remote access tools like TeamViewer on your devices when you're not actively using them. Leaving them on unnecessarily can create an opening for unwanted access. Attackers often take advantage of features that remain enabled without being monitored. By disabling remote access, you can significantly reduce the chances of potential threats. Always remember to turn it off when it's not in use to keep your devices...


March 11, 2025 16:35 (on 3/11/25) |  0 | QR Ready | 1 minute read
Make Sure It’s Secure

Before installing any software, it’s important to always review its security features. Take a closer look at the security settings to ensure they provide sufficient protection for your data. Make sure the software offers encryption, secure access, and other essential protections. Understanding how the software safeguards your information is key to making an informed decision. This proactive step can help you avoid potential risks and threats that could...


March 10, 2025 16:53 (on 3/10/25) |  0 | QR Ready | 1 minute read
Segregate to Protect

To keep your home network safe, separate your devices based on their importance or security. For example, place your work laptop and personal devices on one network, and keep smart TVs or home security cameras on a separate one, as they can be more easily targeted by hackers. Using a firewall can help block unwanted traffic between devices, making it harder for threats to spread and ensuring that even if one device is compromised, your sensitive information stays safe.

Do you have a...


March 9, 2025 22:28 (on 3/10/25) |  0 | QR Ready | 1 minute read
Not for Public Consumption

To protect your professional information, never share your work email with unknown or untrusted sources or unnecessary sites. Sharing your email with unfamiliar individuals or websites increases the risk of phishing attempts. By keeping your work email private, you reduce exposure to spam and malicious attacks. This simple practice helps safeguard your personal and company data from potential security threats. 

Do you have...


March 6, 2025 15:58 (on 3/6/25) |  0 | QR Ready | 1 minute read
Trust a Manager, Not a Browser!

While it’s convenient to let your browser auto-save passwords for easy login, this practice poses significant security risks. Browsers often store passwords in a less secure way, making them vulnerable to theft if your browser or device is compromised. Instead, use a dedicated password manager to securely store and autofill your passwords, as these tools offer stronger encryption, two-factor authentication, and more robust protection for your sensitive information across all...


March 5, 2025 16:50 (on 3/6/25) |  0 | QR Ready | 1 minute read
Stay Off Their Radar

Never click on "Unsubscribe" links in suspicious or unsolicited emails, as they may confirm your email address to scammers. This can lead to even more spam or phishing attempts targeting you. Instead of clicking the link, mark the email as spam to block future messages. If unsure, simply delete the email to protect your personal information. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security...


March 4, 2025 16:03 (on 3/5/25) |  0 | QR Ready | 1 minute read
Linking Up or Luring In?

Be cautious when accepting LinkedIn invitations from people you don’t know, as scammers may use fake profiles to gather personal information or spread malicious links. Always verify profiles for red flags and avoid sharing sensitive details or clicking on suspicious links. Stay vigilant and prioritize security to ensure your LinkedIn experience remains safe and professional.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


March 3, 2025 18:58 (on 3/4/25) |  0 | QR Ready | 1 minute read
Extensions with Bad Intentions

Be cautious when encountering file extensions such as .exe, .scr, and .vbs, as they are commonly used in phishing attacks. These types of files can potentially harm your device or steal personal information. Always ensure that files come from a trusted source before opening them. If you are unsure about the legitimacy of a file, it's better to avoid clicking on it. Verifying the file's safety can prevent potential security breaches and protect your device and...


March 2, 2025 16:39 (on 3/3/25) |  0 | QR Ready | 1 minute read
Catch Me If You Can

IMSI catchers can intercept communications and track your location by tricking your phone into connecting to fake cell towers, exposing your IMSI (International Mobile Subscriber Identity). To protect yourself, use secure 4G/5G networks, encrypted messaging apps like  WhatsApp, and a VPN. Also, disable mobile data when not in use and monitor network connections for suspicious activity to safeguard your privacy.

Do you have a question? Submit a ticket at [PB8324.3] Data Security...


February 27, 2025 17:50 (on 2/28/25) |  0 | QR Ready | 1 minute read
URL or U-R-Lying?

Before entering your login details, always double-check the URL to ensure you're on the official website. Phishing sites often use URLs that look like the real ones, tricking you into giving away your credentials. Stay vigilant and make sure the website starts with "https://" and has a padlock icon next to the URL for added security. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


February 26, 2025 16:01 (on 2/27/25) |  0 | QR Ready | 1 minute read
  • First
  • «
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • »
  • Last


  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi