Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Daily News Flash

Daily News Flash

Clean Space, Safe Place

Keep your workspace secure by following a clean desk policy, which means removing or properly storing any sensitive information when you are not actively using it. Avoid leaving passwords on sticky notes or in plain sight, and instead use secure tools like password managers or multi-factor authentication to protect your accounts. Always lock away confidential documents in secure drawers or cabinets to prevent unauthorized access and reduce the risk of data breaches.

Do you have a...


May 19, 2026 17:23 (4 hours, 58 minutes ago) |  0 | QR Ready | 1 minute read
Safe by Default

Make online safety part of your daily routine by using strong and unique passwords, enabling two-factor authentication, and keeping your devices and apps updated regularly. Always think carefully before clicking links, opening attachments, or sharing personal information online, as many cyberattacks rely on fake messages and human error to succeed. Practicing small but consistent security habits can greatly reduce the risk of hacking, scams, identity theft, and data loss while helping you...


May 18, 2026 17:04 (1 day, 5 hours ago) |  0 | QR Ready | 1 minute read
Every Account Matters

Many people think they are not important enough to be hacked, but cybercriminals target both individuals and companies through weak passwords, fake messages, and careless online habits. A single compromised account can expose personal data, financial information, or even sensitive corporate systems and files. Simple actions like using strong passwords, enabling two-step verification, and avoiding suspicious links can greatly improve cybersecurity for everyone.

Do you have a question?...


May 17, 2026 17:38 (2 days, 4 hours ago) |  0 | QR Ready | 1 minute read
Your Posts Talk

Cybercriminals often study social media profiles to gather personal details they can use in targeted scams. Oversharing information such as birthdays, locations, workplaces, or travel plans can make phishing messages appear more convincing. Adjust your privacy settings and be selective about what you post publicly online. Always verify unexpected messages or requests, even if they seem to come from someone familiar. 

Do you...


May 14, 2026 16:46 (5 days, 5 hours ago) |  0 | QR Ready | 1 minute read
Snap Smart

Avoid saving photos of credit cards, IDs, passwords, or recovery codes in your phone gallery because they can be exposed if your device is stolen, hacked, or synced to the cloud. Regular photo galleries are designed for convenience, not security, making sensitive images easier to access and misuse. Instead, store important information in secure notes apps, password managers, or locked folders for better protection. 

Do you have a question? Submit a ticket at [PB-8324] Tech...


May 13, 2026 16:52 (6 days, 5 hours ago) |  0 | QR Ready | 1 minute read
Keep Apps in Check

Too many app permissions can expose your personal data to unnecessary risks. Always review the permissions an app requests before installing or updating it. Grant only the access that is truly needed for the app to function properly. Regularly checking and managing app permissions can help protect your privacy and improve your device security. 

Do you have a question? Submit a ticket at [PB-8324] Tech QuickSupport...


May 12, 2026 16:56 (1 week, 1 day ago) |  0 | QR Ready | 1 minute read
Fraud in Disguise

Be cautious of messages that appear to come from executives, IT staff, or government agencies, especially if they create urgency or ask for sensitive information, money, passwords, or immediate action. Cybercriminals often impersonate authority figures to pressure people into bypassing normal security procedures without questioning the request. Always verify suspicious requests through an official communication channel before responding, clicking links, or sharing confidential...


May 11, 2026 17:39 (1 week, 1 day ago) |  0 | QR Ready | 1 minute read
Be Cautious, Not Curious

Cybersecurity starts with awareness and careful online behavior. Being alert to unusual messages, links, or requests can help you avoid common cyber threats. You do not need to be highly technical to keep your accounts and information secure. Simple habits like thinking before clicking and verifying sources can make a big difference. 

Do you have a question? Submit a ticket at [PB-8324] Tech QuickSupport Request.


May 10, 2026 16:53 (1 week, 3 days ago) |  0 | QR Ready | 1 minute read
Not Your Login

Never approve login notifications that you did not initiate. Cybercriminals often use fake or repeated prompts to gain unauthorized access to accounts. Take a moment to confirm that the login request matches your actual activity before approving it. If you receive an unexpected login notification, deny the request immediately and secure your account right away. 

Do you have a question? Submit a ticket at [PB-8324] Tech...


May 7, 2026 16:34 (1 week, 6 days ago) |  0 | QR Ready | 1 minute read
Prompt with Caution

Think twice before entering company information into AI tools. Sensitive data such as employee records, customer information, and internal documents should never be shared on AI platforms without proper authorization. Unapproved or unsecured AI tools may expose confidential information and increase the risk of data leaks. Even when using company-approved AI applications, always follow company policies and avoid submitting confidential information. Staying...


May 6, 2026 16:44 (2 weeks ago) |  0 | QR Ready | 1 minute read
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • »
  • Last


  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi