CIO - How do I manage my online reputation to support my career?
Always maintain a branded online presence--it's essential in today's world of work. Your online identity could support or torpedo your candidacy for the position you may want next. According to multiple studies noted by Harvard Business Review, more than 75 percent of companies and recruiters review candidate profiles online and 70 percent have decided not to hire a candidate based on what they've found. And some won't hire you if they find little online information about you, so don't try to be invisible either.
Sometimes mix a little personality into your professional image. But be careful and use common sense on exactly what you share. There are some things we just don't need to know. Use the 80-20 rule: 80 percent professional image in public, 20 percent of your personal side. For example, if you are on Twitter, 80 percent of your tweets can be about technology, industry and business topics, while 20 percent are about your thoughts on travel, sports, current events, your city, family, friends and your personal technology.
Never ruin your reputation by using bad language or being disrespectful (online or in any public setting). If you want to disagree in an online post, make your point in a polite manner and move on. With 85 percent of American adults using the Internet, according to a recent Pew study, there is a lot of noise out there. Distinguish yourself as an intelligent thinker, but not at the expense of someone else. Think before you press the enter key. If you're not sure how your message will be perceived, now or later, decide against sending it and simply walk away.
Kim Batson, a CIO career coach, can be contacted at http://cio-coach.com.
Read more about relationship building/networking in CIO's Relationship Building/Networking Drilldown.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- SDCRAA Case Study: Adapting ERP to business needs This case study goes in depth about San Diego County Regional Airport Authority's created flexibility for a changing industry.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All IT Careers White Papers | Webcasts