Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Awareness

Cyber security related awareness

Safeguarding Data through Proper Device Disposal

Proper disposal of unused devices is crucial for safeguarding data privacy. Unused devices often store sensitive information, and merely deleting files or performing a factory reset might not completely erase the data, leaving it vulnerable to unauthorized access. Responsible disposal ensures data is thoroughly wiped and irretrievable, preventing potential privacy breaches and identity theft. Additionally, complying with data protection laws is essential to avoid legal consequences, while...


July 18, 2023 00:40 (on 7/18/23) |  0 | 1 minute read
Difference of Spam Email vs Phishing Email

It is important to know the differences between spam emails and phishing emails because they represent distinct types of malicious online activities, each with its own risks and consequences.



July 12, 2023 20:24 (on 7/13/23) |  0 | 1 minute read
Tips on How to Secure Cryptocurrency

A cryptocurrency is a digital form of money that uses cryptography for security. It's a virtual or online currency that exists only in the digital world. Instead of being issued by a government or bank, cryptocurrencies operate on decentralized networks called blockchains. These blockchains keep track of all transactions and ensure their security. They can be used for various purposes like buying goods and services, investing, or sending money to others. They offer benefits like fast and...


July 5, 2023 20:26 (on 7/6/23) |  0 | 1 minute read
What Exactly Is Ransomware?

Ransomware presents numerous risks that individuals, organizations, and even societies should be aware of. It's malicious software that encrypts files on a victim's computer or network, essentially holding them hostage until a ransom is paid. The dangers include substantial financial losses due to ransom payments, severe disruptions to business operations, potential loss of critical data, and lasting harm to one's reputation. Moreover, ransomware attacks can affect essential services like...


June 29, 2023 17:57 (on 6/30/23) |  0 | 1 minute read
What is a Digital Footprint?

A digital footprint is the record of one's online activities, and to secure it, individuals should be mindful of their privacy settings, use strong passwords, avoid sharing sensitive information, and regularly monitor and manage their online presence.



June 23, 2023 01:12 (on 6/23/23) |  0 | 1 minute read
Beware of Phishing

Employees should be keenly aware of the dangers of phishing due to its potential impact on both their personal and professional lives. Phishing is a deceitful practice employed by cybercriminals to trick individuals into revealing sensitive information, such as login credentials, financial data, or personal details. By being vigilant, employees can protect themselves and their organizations from devastating consequences. It is crucial for employees to stay informed about the latest...


June 15, 2023 23:01 (on 6/16/23) |  0 | 1 minute read
Traits of Social Engineering Attacks

The ability to spot these characteristics in social engineering attacks equips individuals to be on the lookout for suspicious or odd requests and to exercise critical thinking and the required caution. You may do a better job of preventing yourself from falling prey to these deceptive techniques by staying aware and exercising skepticism.

June 6, 2023 19:59 (on 6/7/23) |  0 | 1 minute read

Practice Good Password Management

Practicing good password management is crucial because it enhances online security, protects personal information, and reduces the risk of unauthorized access to our accounts. By using strong and unique passwords, regularly updating them, and avoiding password reuse, we minimize the potential damage of data breaches and safeguard our digital identities.

June 1, 2023 18:07 (on 6/2/23) |  0 | 1 minute read

LOOK: Unveiling the Brutal Truth: The Time it Takes to Crack Your Password

Knowing how vulnerable our passwords are is essential in a world where digital interactions predominate and online security is becoming more and more of a priority. This excellent infographic developed by Hive Systems highlights the stunning truth of how rapidly brute force techniques can be used by hackers to break various types of passwords. It illustrates the varying degrees of security offered by different combinations of letters, numbers, and symbols as we delve into the realm of...


May 24, 2023 17:25 (on 5/25/23) |  0 | 1 minute read
Beware of Spyware

People should beware of spyware because it stealthily infiltrates devices, compromising privacy, stealing sensitive information, and potentially enabling unauthorized surveillance or criminal activities.


May 18, 2023 08:57 (on 5/18/23) |  0 | 1 minute read
  • First
  • «
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • »
  • Last


  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi