Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Awareness

Cyber security related awareness

Loose Lips Sink Security!

Avoid discussing sensitive work details with friends, family, or anyone outside your workplace—casual chats can lead to leaks or scams.

Tips:
• Only discuss sensitive topics in secure settings
• Use encrypted messaging or...


April 15, 2025 17:05 (on 4/16/25) |  1 | QR Ready | 1 minute read
Trust No One, Verify Everything!

In today’s digital world, adopt a zero-trust mindset. Treat every user and device as a potential threat and always verify access before sharing sensitive info. Use secure logins, MFA, and trusted tools.

Tips for Implementing...


April 8, 2025 17:31 (on 4/9/25) |  0 | QR Ready | 1 minute read
Avoid Over-Sharing: Secure Your App Connections!

Before linking apps to your accounts, protect your data by granting minimal permissions, avoiding oversharing, and reviewing access regularly.

Key Actions:

  1. Grant Only Necessary Permissions: Share just...
    April 1, 2025 17:32 (on 4/2/25) |  0 | QR Ready | 1 minute read
Sign Here for Safety: Spot the Phish

To prevent phishing, always verify email signatures before responding to sensitive or financial requests.

DO:

  • Cross-check signatures with known contacts or official websites.
  • Ensure correct spelling, job titles,...
    March 25, 2025 17:23 (on 3/26/25) |  0 | QR Ready | 1 minute read
Be a Fact Finder, not a Rumor Spreader!



In a fast-paced world, misinformation can damage your organization's reputation. Always verify before sharing.

DO:

  • Check the Source: Use reputable websites or...
    March 18, 2025 19:15 (on 3/19/25) |  0 | QR Ready | 1 minute read
It's More Valuable than You Think!

Every detail you share online can be used against you in a social engineering attack. Even small things, like your pet's name, can create risks. Be cautious and protect your privacy by sharing only what's necessary.

Tips to Protect Your...


March 11, 2025 16:45 (on 3/11/25) |  0 | QR Ready | 1 minute read
Get Notified, Stay Safe!

Enable security alerts on all accounts to monitor suspicious activity in real-time, such as unknown logins or unauthorized changes. This lets you act quickly to prevent fraud.

Why You Need Security Alerts:

  • Instant notifications of...
    March 4, 2025 15:33 (on 3/4/25) |  0 | QR Ready | 1 minute read
Text or Trap? Spot the Scam Before It Strikes!

Treat text messages like emails, especially from e-wallet companies, as scammers may impersonate trusted services. Always verify the sender and avoid clicking suspicious links or sharing sensitive info.

Do's:

  • Verify the...
    February 25, 2025 18:10 (on 2/26/25) |  0 | QR Ready | 1 minute read
Stay Secure by Tracking End-of-Life Dates for Software and Systems

Why It Matters:
Software and systems eventually reach their End-of-Life (EOL), after which they no longer receive security updates, exposing your systems to vulnerabilities and cyberattacks.

Key...


February 18, 2025 16:43 (on 2/19/25) |  0 | QR Ready | 1 minute read
Evading the Caller Con

Vishing involves attackers using phone calls to trick individuals into revealing personal or financial information, often by impersonating legitimate organizations.

Simple Tips to Avoid Vishing:

  • Verify the Caller:...
    January 14, 2025 17:21 (on 1/15/25) |  0 | QR Ready | 1 minute read
  • First
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • »
  • Last


  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi