Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
The Growing Security Challenges of Remote Work: Are Employees Matching the Pace?

The exploration into the security challenges of remote work commences with the narrative of an employee referred to as "Bob." Bob serves as a DevOps engineer at a major technology company and, like countless others in the post-pandemic era, carries out his tasks remotely from various locations, primarily his home. Around August 2022, he began noticing unusual behavior on his personal computer, including intermittent keystroke delays and sluggish browser performance. Notably, Bob is an actual employee at LastPass, a significant player in the password management sector, entrusted with safeguarding the passwords of more than 33 million users.

During this timeframe, Bob unintentionally downloaded third-party media software onto his home computer. This seemingly innocuous action triggered an automated execution of remote code, implanting a rudimentary yet effective keylogger malware. This malicious software stealthily recorded every keystroke made by Bob, laying bare critical credentials and passwords. The ensuing security breach was not an abrupt occurrence; rather, it was the result of a persistent hacker who infiltrated LastPass' system. This intricate breach unfolded over the course of several months, involving successive attacks. The full extent of the breach, which imperiled the sensitive data of all 33 million users, only came to light in May 2023 following an extensive investigation by LastPass.

Bob's experience serves as a poignant example of the potential repercussions stemming from security vulnerabilities in remote work setups. Significantly, his case is not an isolated occurrence but rather indicative of broader security challenges in the realm of remote work.

Hackers are progressively directing their efforts toward remote workers. For instance, in January 2023, The Guardian fell victim to a ransomware attack that was likely initiated through a phishing attempt. Similarly, in December 2022, Activision, a prominent video game developer known for Call of Duty, encountered a breach when a hacker accessed an employee system and obtained data from the entire workforce. Additionally, in January 2023, Norton Life Lock was compromised by a criminal who employed stolen passwords in a "stuffing" attack.

The list of attacks that exploit stolen credentials to target remote and hybrid workers seems endless. The Center for Strategic and International Studies (CSIS) underscores that cybercriminals, criminal groups, and even nation-state entities are targeting diverse sectors, spanning private, public, health, energy, government, and even defense and military domains.

According to Fortinet's 2023 Work-From-Anywhere Global Study, a significant two-thirds of surveyed companies have encountered data breaches in the past 2 to 3 years due to vulnerabilities associated with employees engaged in remote work scenarios, often referred to as "Work From Anywhere (WFA)" vulnerabilities.


Source: https://moonlock.com/remote-work-security 


Caitlin Joyce (CaitlinG) Galanza | News
Created: August 08 2023 | Updated: on 8/8/23
Comments


  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi