Three-Minute Coach: Protect Your Online Reputation
- 15 November, 2012 13:42
How do I manage my online reputation to support my career?
Always maintain a branded online presence--it's essential in today's world of work. Your online identity could support or torpedo your candidacy for the position you may want next. According to multiple studies noted by Harvard Business Review, more than 75 percent of companies and recruiters review candidate profiles online and 70 percent have decided not to hire a candidate based on what they've found. And some won't hire you if they find little online information about you, so don't try to be invisible either.
Sometimes mix a little personality into your professional image. But be careful and use common sense on exactly what you share. There are some things we just don't need to know. Use the 80-20 rule: 80 percent professional image in public, 20 percent of your personal side. For example, if you are on Twitter, 80 percent of your tweets can be about technology, industry and business topics, while 20 percent are about your thoughts on travel, sports, current events, your city, family, friends and your personal technology.
Never ruin your reputation by using bad language or being disrespectful (online or in any public setting). If you want to disagree in an online post, make your point in a polite manner and move on. With 85 percent of American adults using the Internet, according to a recent Pew study, there is a lot of noise out there. Distinguish yourself as an intelligent thinker, but not at the expense of someone else. Think before you press the enter key. If you're not sure how your message will be perceived, now or later, decide against sending it and simply walk away.
Kim Batson, a CIO career coach, can be contacted at http://cio-coach.com.
Read more about relationship building/networking in CIO's Relationship Building/Networking Drilldown.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Batten Down the Hatches! A Guide to Protecting Data in Motion
The risks facing high-speed data networks and unencrypted data while in motion are very real and on the rise. As information becomes one of the most valuable ‘off balance sheet’ assets, protection of that information and the investment in it is a paramount obligation of office-holders and management. Read now for a better understanding of the risks to data in motion.
Building a Better Mousetrap in Anti-Malware
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.
Mobility Apps: What every developer should know
Learn how others have delivered industry-leading, multi-platform management and security solutions. In this whitepaper, we look how app developers can develop, deploy and manage apps that enterprises can rely on today and into the future. Click to download!