Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


News

Cyber Security Related News

Smartphone Security Shattered: BrutePrint Attack Unleashes Fingerprint Brute-Force to Unlock Devices

Researchers have uncovered an inexpensive method that enables the forceful cracking of smartphone fingerprints, enabling unauthorized access and control of the devices. This technique, known as BrutePrint, exploits two previously unknown vulnerabilities in the smartphone fingerprint authentication (SFA) framework to circumvent safeguards against failed biometric authentication attempts.

The...


May 30, 2023 17:15 (on 5/31/23) |  0 | 1 minute read
Samsung Devices Face Unprecedented Cyber Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding the ongoing exploitation of a medium-severity vulnerability that affects Samsung devices running Android versions 11, 12, and 13.

Samsung has identified the issue as an information disclosure vulnerability that could potentially be abused by an attacker with elevated privileges to bypass the...


May 23, 2023 18:22 (on 5/24/23) |  0 | 2 minutes read
How Phishing-as-a-Service is Making It Easier for Cybercriminals to Attack

Since approximately mid-2022, cybercriminals have been utilizing a recently developed platform called ‘Greatness’, which operates as a phishing-as-a-service (PhaaS or PaaS) solution. This platform specifically focuses on targeting business users who utilize the Microsoft 365 cloud service. Its introduction has significantly reduced the difficulty of conducting phishing attacks.

Greatness...


May 14, 2023 19:45 (on 5/15/23) |  0 | 2 minutes read
Google Fortifies Cyber Defenses with Latest Security Updates

At its yearly developer conference, Google I/O, the tech company today introduced a myriad of new privacy, safety, and security features. The latest efforts are designed to safeguard its users from cyber threats, such as phishing attacks and malicious websites while giving them greater authority and visibility over their personal data.

Below is an overview of the recently introduced...


May 10, 2023 18:38 (on 5/11/23) |  0 | 1 minute read
Unlocking the Future: Google Releases Passkeys to Replace Passwords

Google has partnered with FIDO Alliance, Apple, and Microsoft to develop passkeys as a simpler and more secure alternative to passwords. Today, passkeys will be available as an additional sign-in option alongside passwords and 2-Step Verification (2SV).

Passkeys are a convenient and secure alternative to passwords, eliminating the need for weak and easily guessable phrases. Users can access...


May 3, 2023 15:41 (on 5/3/23) |  0 | 1 minute read
Major Social Media Account Takeover: Sim Swapping Attack Compromises High-Profile User

According to an anonymous hacker who claims to have compromised the Twitter account of a right-wing political commentator, the attack was carried out using a SIM-swapping technique.

The attack typically involves hackers tricking a cellular provider into switching a victim's phone number to a SIM card controlled by the hackers rather than the one in the victim's phone. The hacker, using the alias "Doomed," claims that the phone was compromised with the assistance of...


April 19, 2023 19:35 (on 4/20/23) |  0 | 1 minute read
Taiwanese Tech Giant MSI Falls Victim to Ransomware Attack

MSI (Micro-Star International), the Taiwanese company renowned for gaming laptops and PC components, has confirmed that it was the victim of a ransomware attack.

“Upon detecting network anomalies, the information department promptly activated relevant defense mechanisms and carried out recovery measures, and reported the incident to government...


April 12, 2023 13:42 (on 4/12/23) |  0 | 1 minute read
  • First
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • »


  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi