Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Awareness

Cyber security related awareness

Watch Out for Fake Security Alerts!

Beware of those Bogus Security Alerts!

Imagine that you suddenly get a pop-up or an email with information that your computer is in danger and that you should click on a link to "fix the problem." It looks very official, even urgent—but it is a scam to trick you into downloading malware or giving away your personal information.

What are Fake Security Alerts?
Fake security alerts are a form of fraudulent warning that may come in...


September 2, 2024 16:29 (on 9/2/24) |  0 | QR Ready | 2 minutes read
Files Everywhere, Recover anytime

Data loss can result from hardware failures, cyber-attacks, or accidental deletions. To safeguard important files, follow these strategies:

  • Automate Backups: Enable automatic backups for consistency.
  • Reliable...
    August 27, 2024 18:07 (on 8/28/24) |  0 | QR Ready | 1 minute read
Our Devices, Our Haven

Devices hold personal photos, messages, financial data, and sensitive documents. To avoid breaches:

  • Use a PIN, password, or biometric lock for security.
  • Keep your device in a locked drawer or bag when not in use.
  • Be wary of public...
    August 20, 2024 17:12 (on 8/21/24) |  0 | QR Ready | 1 minute read
Identity Pretty Sharp

Protecting your online identity is crucial in today's digital age.

• Monitor Your Digital Footprint: Regularly check your name online and adjust social media privacy settings.

• Beware of Phishing Scams: Avoid clicking...


July 30, 2024 17:20 (on 7/31/24) |  0 | QR Ready | 1 minute read
Think before you share!

Are you an avid social media user? While sharing moments of your life can be fun, it's crucial to consider the potential risks, especially regarding work-related information.  

To prevent being targeted by hackers, do this instead: 

  • Restrict sharing of job-related details on social media platforms. 
  • Exercise caution regarding the data you...
    April 25, 2024 21:36 (on 4/26/24) |  0 | QR Ready | 1 minute read
Keeping passwords unique

A cyber attack is where an attacker attempts to gain unauthorized access to a system, network, or account by trying various methods to guess or crack the password. To mitigate these, employ these useful advice: 

  1. Use Strong, Unique Passwords: Use a long and unique password, with a mix of upper and lower case letters, numbers, and special characters to make it difficult for the hackers to crack. Because hackers use brute force and...
    April 18, 2024 18:38 (on 4/19/24) |  0 | QR Ready | 2 minutes read
Password managers as defense against keyloggers; here’s why:

Password managers as defense against keyloggers; here’s why:

  1. Encrypted Storage: Password managers securely store your passwords in an encrypted format. This means even if a keylogger captures your keystrokes, it won't be able to decipher your passwords. 
  2. Autofill Functionality: You don't have to manually type your passwords. The password manager fills in the login credentials for you. Since you're not typing your passwords,...
    April 10, 2024 16:26 (on 4/10/24) |  0 | QR Ready | 1 minute read
Never Get Wiped: Avoid Getting Wiper Malware

Wiper Malware is malicious software that can cause severe damage to your computer. It is a type of malware that can delete or corrupt data, rendering it useless. Unlike ransomware, Wiper Malware does not encrypt your files and demand a ransom to decrypt them. Instead, it destroys the key to unlock the files, making it impossible to recover the data. It can also modify the data on your computer by changing the contents to 1's and 0's, making it unreadable. As a...


April 3, 2024 23:42 (on 4/4/24) |  1 | QR Ready | 2 minutes read
How to Avoid Scareware Traps

Have you ever encountered a pop-up ad or a fake alert while browsing the internet? Well, beware! These can be scareware, designed to deceive you into downloading malware or viruses that can harm your computer. 

Tips to remember:

  1. Stay calm when encountering a scareware pop-up.
  2. Disregard pop-up ads that claim your computer is...
    March 27, 2024 19:14 (on 3/28/24) |  0 | QR Ready | 1 minute read
Sweet Talks are for the Weak

Honeytrap is a threat that tricks people by pretending to be attractive online. The person befriends their targets and fakes an online relationship with them. The criminal then takes advantage of this relationship to extract their victims’ details, borrow money from them, or make them install malware into their computers. This cyber threat is also part of Social Engineering attacks as it directly communicates and manipulates the victim to obtain...


March 21, 2024 18:10 (on 3/22/24) |  0 | QR Ready | 2 minutes read
  • First
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • »
  • Last


  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi