Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Awareness

Cyber security related awareness

No Scam Scare in Holiday's Air

Planning a worry-free vacation? Ensure a scam-free holiday experience with these top tips and precautions.

When eagerly anticipating a well-deserved vacation, the last thing you want is to be marred by scams and fraudulent activities. While traveling should be about relaxation and adventure, it's crucial to stay vigilant and take necessary precautions to avoid falling victim to travel scams. This guide will help you enjoy your holidays with peace of mind, ensuring there's no scam...


November 15, 2023 16:35 (on 11/16/23) |  0 | QR Ready | 1 minute read
Ensure Secure Bookings

When it comes to booking vacations online, it's important to prioritize your safety and security. With so many travel websites and apps available, it can be challenging to distinguish between legitimate and fraudulent ones. To ensure you have a worry-free experience, it's recommended to use reputable and secure travel websites or apps.

One way to identify a secure website is by looking for the padlock symbol in the address bar. This symbol indicates that the website is using a secure...


November 7, 2023 20:11 (on 11/8/23) |  0 | QR Ready | 1 minute read
Home Network Warding

If you're working remotely, it's important to secure your home network to ensure your online safety. One of the first steps you can take is to change the default password on your router. Hackers often target default passwords as they are easily accessible online. 

Another important step is to enable WPA3 encryption on your router. This provides a more secure way of protecting your network compared to the older WPA2 encryption which can be more easily breached. 

It's...


November 1, 2023 20:40 (on 11/2/23) |  2 | QR Ready | 1 minute read
Cloudstaff Cybersecurity Training

Cloudstaff's Data Security Team is dedicated to delivering top-tier cybersecurity education to our employees. Here's their routine to bolster Cloudstaff's data security:

  • Awareness: Ensure employees are well-informed about cybersecurity threats and understand the potential impacts on our organization.
  • Phishing Simulation: Conduct simulated phishing attacks to evaluate employees' capacity to recognize and counter phishing attempts,...
    November 1, 2023 19:01 (on 11/2/23) |  1 | QR Ready | 1 minute read
Mobile Device Security

As part of our daily lives, we need to ensure that our handy connection to the digital world remains secure. Follow these tips on how to properly secure your mobile devices:

  1. Device Lock:
  • Security Lock: Use PIN, pattern, fingerprint, or facial recognition to secure your device. Always lock it when not in use.

2. App Permissions:

  • Permission Review: Review and restrict app permissions to safeguard your data.
  • Best...
    October 18, 2023 17:30 (on 10/19/23) |  0 | QR Ready | 1 minute read
Safe Browsing Habits

Safe Browsing Habits emphasizes the importance of adopting secure online practices to protect personal and sensitive information from various cybersecurity threats. The list below enumerates some of the most effective browsing habits that you can employ as an individual. 

  1. HTTPS:
  • Importance: It ensures that the data exchanged between your browser and the website remains confidential and cannot be easily intercepted by malicious...
    October 11, 2023 16:28 (on 10/11/23) |  0 | 2 minutes read
Understanding Common Cybersecurity Threats

In today's world, cybersecurity threats are a reality, and the need to stay safe online has become more critical than ever before. Phishing, malware, and password vulnerabilities are some of the most common threats that can have severe consequences. However, the good news is that there are many ways to mitigate these risks. By being aware of these threats and taking proactive measures, you can protect yourself and your organization from cyber-attacks. So, let's take a closer look at each...


October 4, 2023 16:59 (on 10/4/23) |  0 | 2 minutes read
You are Hidden, I am Concealed

The security of GPS data is of paramount importance for several reasons, and it necessitates careful attention and proactive measures to mitigate potential risks. This sensitivity arises from the fact that GPS data, which provides precise information about an individual's or device's location, has the potential to impact personal privacy, physical safety, and various applications in significant ways. To safeguard against these threats, several security measures should be...


September 27, 2023 01:47 (on 9/27/23) |  0 | 1 minute read
Know a Trick or Two!

In the realm of cybersecurity, one insidious method that malicious actors use to obtain sensitive data is pre-texting. Pre-texting involves the creation of deceptive scenarios or false identities to trick individuals into divulging confidential information. To safeguard your personal and sensitive data, it is crucial to understand this tactic and adopt countermeasures. Here's an in-depth exploration of how to protect yourself and your information from pre-texting...


September 19, 2023 23:10 (on 9/20/23) |  0 | 2 minutes read
Preparation is in the Bag!

In today's digital age, the importance of staying alert and cautious in the realm of cybersecurity cannot be overstated. With the constant evolution of technology, hackers are perpetually honing their skills and seeking opportunities to exploit vulnerabilities, divert your attention, and employ deceitful tactics to gain unauthorized access to your sensitive information. To safeguard your digital assets and personal data, it is imperative to maintain a heightened level of awareness in...


September 13, 2023 22:36 (on 9/14/23) |  0 | 2 minutes read
  • First
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • »
  • Last


  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi