Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Awareness

Cyber security related awareness

Analyze the Technique, Avoid the Hook

To ensure online security, it's crucial to remain vigilant against phishing. Scrutinize sender details, avoid hasty clicks on links, safeguard personal information, and prioritize strong passwords and two-factor authentication. Be wary of urgency and verify sources. Be cautious about money requests and unexpected offers, and report any suspicious emails promptly. With phishing tactics evolving, trust your instincts and stay vigilant to safeguard personal and financial data...


September 7, 2023 18:57 (on 9/8/23) |  0 | 1 minute read
Practice Separation of Information

In the future city of Neotech, all devices will be interconnected. Alex, a software engineer, used his personal gadgets for work. One day, a security breach occurred at his company due to this mix. During an important meeting, his private photos were accidentally displayed, and hackers used personal accounts linked to work systems to steal important data. The company's reputation suffered, and clients were lost.

August 30, 2023 19:00 (on 8/31/23) |  0 | 2 minutes read

Clearing Cache and Browsing History: Protecting Privacy from Targeted Advertising and Tracking

Maintain your privacy and reduce exposure to targeted advertising and tracking by regularly clearing your cache and browser history.  This information is used by researchers and marketers to build comprehensive user profiles and serve relevant advertising. While it might not directly present a threat to security, it degrades privacy and encourages invasive internet tracking.  

August 23, 2023 16:42 (on 8/23/23) |  1 | 1 minute read

Mindful Conversations: Key to Cybersecurity Vigilance

Having presence of mind when talking to strangers is crucial for cybersecurity. It protects personal information, avoids social engineering attacks, recognizes phishing attempts, safeguards online accounts, and preserves personal safety. By practicing cautiousness, being skeptical and alert, you can minimize the risk of revealing sensitive information or falling victim to cyber threats. It also enables you to step back, think, and assess the credibility of who you are speaking with. By...


August 16, 2023 23:10 (on 8/17/23) |  0 | 1 minute read
Fortifying Printers Against Unauthorized Alterations

Printer tampering is a significant security risk that can lead to unauthorized document copying or alterations. Mitigate the risk by regularly inspecting printers, implementing physical security measures, monitoring printer usage, enforcing strict access controls, and using watermarked or tamper-evident paper for sensitive documents. These measures reduce the risk of unauthorized access, detect suspicious activities, and enhance document integrity and confidentiality. 

August 10, 2023 17:41 (on 8/11/23) |  2 | 1 minute read

Unveiling the Secrets of ATM Card Skimming

Card skimming is a prevalent risk, where deceptive devices are attached to ATMs to collect users' card information, including account numbers and PINs.Detecting skimming devices can be challenging since they are crafted to blend seamlessly with the ATM's appearance. To keep yourself safe, attentively inspect machines for any signs of tampering. suspicious attachments, or irregularities that may indicate the presence of an attached skimming device.

August 2, 2023 16:45 (on 8/2/23) |  0 | 1 minute read

Importance of Zero-Trust

Implementing a zero-trust approach in cybersecurity is necessary for every organization. It means that we avoid automatically trusting anyone or any device that tries to access our network, even if they are inside our perimeter. It ensures that trust is never assumed, and we always verify who or what is trying to access our network to keep our data safe.

July 27, 2023 17:10 (on 7/28/23) |  0 | 1 minute read

Safeguarding Data through Proper Device Disposal

Proper disposal of unused devices is crucial for safeguarding data privacy. Unused devices often store sensitive information, and merely deleting files or performing a factory reset might not completely erase the data, leaving it vulnerable to unauthorized access. Responsible disposal ensures data is thoroughly wiped and irretrievable, preventing potential privacy breaches and identity theft. Additionally, complying with data protection laws is essential to avoid legal consequences, while...


July 18, 2023 00:40 (on 7/18/23) |  0 | 1 minute read
Difference of Spam Email vs Phishing Email

It is important to know the differences between spam emails and phishing emails because they represent distinct types of malicious online activities, each with its own risks and consequences.



July 12, 2023 20:24 (on 7/13/23) |  0 | 1 minute read
Tips on How to Secure Cryptocurrency

A cryptocurrency is a digital form of money that uses cryptography for security. It's a virtual or online currency that exists only in the digital world. Instead of being issued by a government or bank, cryptocurrencies operate on decentralized networks called blockchains. These blockchains keep track of all transactions and ensure their security. They can be used for various purposes like buying goods and services, investing, or sending money to others. They offer benefits like fast and...


July 5, 2023 20:26 (on 7/6/23) |  0 | 1 minute read
  • First
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • »
  • Last


  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi