Categories
Social Media

Your CV – Your Life!

CV – Curriculum Vitae… or Resume… no, I will not go into this topic. You can find some good guidance in this Harvard Resume/CV guide.

Also, I will not go into the design concept, which format is better or preferred… as there is none. Every recruiter has their own view and opinion, therefore, whatever you’ll choose, you’ll not be good enough for all. Just kidding.

But what I will like to highlight now is your privacy. Your cyber-privacy!

We are all hunting for better jobs. Some of us are getting the dream job thru a direct recommendation, others by direct hunting, others thru a recruitment agency.

The recruitment agency has the privilege of working on our behalf, hunting and matching the best job as per our CV/resume. They deal with the bureaucratic details in the background, the interviews, etc.

And we are happy. And they are happy. So far, so good.

One of the duties of every accredited agency, at least in the EU, is to properly manipulate and store the data. Including our data. Our CV/resume. As per the GDPR. They have certain procedures and protocols, including cybersecurity and cyberprivacy.

And this is good, this is what we want. To have our data, our personal information, in safe hands!

But recently, over the past months, I started to see a lot of individual recruiters, advertising jobs and collecting CVs into, most of the time, Gmail accounts.

Nothing wrong with or against individuals offering jobs to others, don’t take me wrong. Not going into the professional recruitment process (background check, profile match, certifications and skills verified, etc)… if is properly done or is just passing the paper from one hand to another…

My main concern is how our CVs, or personal data, are manipulated, stored, and protected by the @gmail.com user. Is the device “malware” free? Is the user cyber-clean, cyber-aware, and with good internet and computer habits? Is the data stored in a cyber-protected and encrypted environment? For how long the data is stored? What happens with that data after the “recruitment” process is finished? Is deleted? When? How? Do you get any feedback on the status of your CV/resume after the recruitment process is done?

You may say… is just a CV. No bank details, no PIN. Nothing to lose. Right?

Let’s review… In your CV, you have a name, a picture, DOB, location/address, email, telephone number, in-depth details of your previous jobs, medicals & references details… And the list can go on. And what can happen? Well… sit tight and brace for impact…

Impersonating, fake profiles, spare phishing, or even whaling, and cyberbullying, online harassment are just a few of the real dangers behind personal data (CV) in the wrong hands.

Just do a quick test… type “CV” in any search engine? What you’ll get? Tons of data, private data. Add a name… and there you go. And you don’t want to be on that visible list. Not to mention the dark web and deep web!

Don’t post your CV online. Don’t give your CV to anyone who is just posting a job offer… Is that job offer even for real? Sometimes, we see “recruiters” of large (yes, large) yachts with Yahoo, Gmail, or other free accounts. If for a yacht of 30-40mtrs that is self-managing, this might be OK, for a large yacht with solid logistic support… it does not sound professional.

A few pieces of advice before sending your data:

  • Do a bit of basic research (searching engines, social media, etc) before jumping with “CV sent. Thank you Sir/Madam”…
  • Ask your recipient for an email confirmation and application status (forwarded, accepted, rejected, denied, etc). I know…most of the recruiters are demanding professionalism but they deeply lack basic polite feedback so… even fewer expectations from a @Gmail “recruiter”!
  • Ask for written confirmation of CV/resume/data deletion after the recruitment process is completed

Personal and professional data must be carried out in the most private and professional way. Treat the subject seriously and good luck in your job hunting!

Categories
CyberOps IT & Networking

3 basic steps to enhance your cyber-travel protection

The internet is full of competent advices in how to stay cyber-protected while surfing and browsing the world wide web.

In this very short guide, I will show you 3 very basic and very simple tricks to enhance your cybersecurity, on mobile, desktop or laptop device. Are free and easy to implement.

So, let’s begin:

  1. VPN: you heard about Virtual Private Network which is doing exactly what is saying: is placing your traffic inside of a tunnel between you and your final destination, via a Domain Name System provider. Trustable providers: CloudFlareWARP 1.1.1.1 or ProtonVPN (free or payed). I strongly recommend to have VPN installed (at least 2-3 options, because in some countries you may face heavy or random difficulties to use them) and activated at all the time! Not only when travelling or performing online banking or shopping but 24/7/365. Not all VPN’s are equal good, some of them are well known for selling your traffic data to some other parties.

2. DNS – the 1st step after joining a network, change your default DNS to 1.1.1.1 (part of Cloudflare), 208.67.222.222 ยท 208.67.220.220 ( part of Cisco), or 9.9.9.9 (Quad9). The instructions are quite easy to follow and takes few minutes to be implemented.

3. Internet protection: no matter what OS or device you are using, the cyber-protection is a must. Don’t be a cheap bastard! If you pay couple of good hundreds of euros for a device, you’ll have some “peanuts” money for a yearly subscription. Don’t think that if you are not a high profile VIP or important CEO, your data are less valuable! You have phone contacts & emails (see the email phishing attack in 2021), pictures… private stuff! You should take care of your digital data as much as you take care of your real life! Bitdefender is one of the recommended AV options. Also, you can consult AV Comparatives if you are looking for another trustful option.

Keep in mind that there is no perfect and complete cybersecurity protection! You, the user, are playing a very important role too in staying safe in the wild cyber World.

For consulting & support, contact me as listed on the main Cyber-Cerber page.

Stay safe!

Categories
CyberOps

2020 – the year of Cyber Attack explosion

With the pandemic COVID-19 forcing employees and offices to reinvent in remote working outside of the usual “bubble office environment” than what it used to be before, cybersecurity concerns explodes… And with good reasons!

Mediterranean Shipping Company (MSC) was hit on April 9th by a cyber-attack.

On September 28th, CMA CMG suffered also a cyber-attack over its servers.

And this is not something really new… Back in May 2019, Princess Cruises (branch of Carnival Cruises) suffered a cyber incident.

IMO is developing a dedicated a dedicated department for the maritime cybersecurity guidelines to implement higher and stronger procedures and standards in protecting companies virtual assets.

Lloyd’s Register , DNV , US Coast Guard (to mention just a few) are taking also steps forward in implementing the IMO “Guidelines on Maritime Cyber Risk Management (MSC-FAL.1/Circ.3) – July 2017“.

Cybersecurity is real and countermeasures are available and applicable. Don’t remain behind and exposed… Keep up with the future!

by CyberCerber