CIO - How do I manage my online reputation to support my career?
Always maintain a branded online presence--it's essential in today's world of work. Your online identity could support or torpedo your candidacy for the position you may want next. According to multiple studies noted by Harvard Business Review, more than 75 percent of companies and recruiters review candidate profiles online and 70 percent have decided not to hire a candidate based on what they've found. And some won't hire you if they find little online information about you, so don't try to be invisible either.
Sometimes mix a little personality into your professional image. But be careful and use common sense on exactly what you share. There are some things we just don't need to know. Use the 80-20 rule: 80 percent professional image in public, 20 percent of your personal side. For example, if you are on Twitter, 80 percent of your tweets can be about technology, industry and business topics, while 20 percent are about your thoughts on travel, sports, current events, your city, family, friends and your personal technology.
Never ruin your reputation by using bad language or being disrespectful (online or in any public setting). If you want to disagree in an online post, make your point in a polite manner and move on. With 85 percent of American adults using the Internet, according to a recent Pew study, there is a lot of noise out there. Distinguish yourself as an intelligent thinker, but not at the expense of someone else. Think before you press the enter key. If you're not sure how your message will be perceived, now or later, decide against sending it and simply walk away.
Kim Batson, a CIO career coach, can be contacted at http://cio-coach.com.
Read more about relationship building/networking in CIO's Relationship Building/Networking Drilldown.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts