Categories
Social Media

Your CV – Your Life!

CV – Curriculum Vitae… or Resume… no, I will not go into this topic. You can find some good guidance in this Harvard Resume/CV guide.

Also, I will not go into the design concept, which format is better or preferred… as there is none. Every recruiter has their own view and opinion, therefore, whatever you’ll choose, you’ll not be good enough for all. Just kidding.

But what I will like to highlight now is your privacy. Your cyber-privacy!

We are all hunting for better jobs. Some of us are getting the dream job thru a direct recommendation, others by direct hunting, others thru a recruitment agency.

The recruitment agency has the privilege of working on our behalf, hunting and matching the best job as per our CV/resume. They deal with the bureaucratic details in the background, the interviews, etc.

And we are happy. And they are happy. So far, so good.

One of the duties of every accredited agency, at least in the EU, is to properly manipulate and store the data. Including our data. Our CV/resume. As per the GDPR. They have certain procedures and protocols, including cybersecurity and cyberprivacy.

And this is good, this is what we want. To have our data, our personal information, in safe hands!

But recently, over the past months, I started to see a lot of individual recruiters, advertising jobs and collecting CVs into, most of the time, Gmail accounts.

Nothing wrong with or against individuals offering jobs to others, don’t take me wrong. Not going into the professional recruitment process (background check, profile match, certifications and skills verified, etc)… if is properly done or is just passing the paper from one hand to another…

My main concern is how our CVs, or personal data, are manipulated, stored, and protected by the @gmail.com user. Is the device “malware” free? Is the user cyber-clean, cyber-aware, and with good internet and computer habits? Is the data stored in a cyber-protected and encrypted environment? For how long the data is stored? What happens with that data after the “recruitment” process is finished? Is deleted? When? How? Do you get any feedback on the status of your CV/resume after the recruitment process is done?

You may say… is just a CV. No bank details, no PIN. Nothing to lose. Right?

Let’s review… In your CV, you have a name, a picture, DOB, location/address, email, telephone number, in-depth details of your previous jobs, medicals & references details… And the list can go on. And what can happen? Well… sit tight and brace for impact…

Impersonating, fake profiles, spare phishing, or even whaling, and cyberbullying, online harassment are just a few of the real dangers behind personal data (CV) in the wrong hands.

Just do a quick test… type “CV” in any search engine? What you’ll get? Tons of data, private data. Add a name… and there you go. And you don’t want to be on that visible list. Not to mention the dark web and deep web!

Don’t post your CV online. Don’t give your CV to anyone who is just posting a job offer… Is that job offer even for real? Sometimes, we see “recruiters” of large (yes, large) yachts with Yahoo, Gmail, or other free accounts. If for a yacht of 30-40mtrs that is self-managing, this might be OK, for a large yacht with solid logistic support… it does not sound professional.

A few pieces of advice before sending your data:

  • Do a bit of basic research (searching engines, social media, etc) before jumping with “CV sent. Thank you Sir/Madam”…
  • Ask your recipient for an email confirmation and application status (forwarded, accepted, rejected, denied, etc). I know…most of the recruiters are demanding professionalism but they deeply lack basic polite feedback so… even fewer expectations from a @Gmail “recruiter”!
  • Ask for written confirmation of CV/resume/data deletion after the recruitment process is completed

Personal and professional data must be carried out in the most private and professional way. Treat the subject seriously and good luck in your job hunting!

Categories
CyberOps IT & Networking

3 basic steps to enhance your cyber-travel protection

The internet is full of competent advices in how to stay cyber-protected while surfing and browsing the world wide web.

In this very short guide, I will show you 3 very basic and very simple tricks to enhance your cybersecurity, on mobile, desktop or laptop device. Are free and easy to implement.

So, let’s begin:

  1. VPN: you heard about Virtual Private Network which is doing exactly what is saying: is placing your traffic inside of a tunnel between you and your final destination, via a Domain Name System provider. Trustable providers: CloudFlareWARP 1.1.1.1 or ProtonVPN (free or payed). I strongly recommend to have VPN installed (at least 2-3 options, because in some countries you may face heavy or random difficulties to use them) and activated at all the time! Not only when travelling or performing online banking or shopping but 24/7/365. Not all VPN’s are equal good, some of them are well known for selling your traffic data to some other parties.

2. DNS – the 1st step after joining a network, change your default DNS to 1.1.1.1 (part of Cloudflare), 208.67.222.222 · 208.67.220.220 ( part of Cisco), or 9.9.9.9 (Quad9). The instructions are quite easy to follow and takes few minutes to be implemented.

3. Internet protection: no matter what OS or device you are using, the cyber-protection is a must. Don’t be a cheap bastard! If you pay couple of good hundreds of euros for a device, you’ll have some “peanuts” money for a yearly subscription. Don’t think that if you are not a high profile VIP or important CEO, your data are less valuable! You have phone contacts & emails (see the email phishing attack in 2021), pictures… private stuff! You should take care of your digital data as much as you take care of your real life! Bitdefender is one of the recommended AV options. Also, you can consult AV Comparatives if you are looking for another trustful option.

Keep in mind that there is no perfect and complete cybersecurity protection! You, the user, are playing a very important role too in staying safe in the wild cyber World.

For consulting & support, contact me as listed on the main Cyber-Cerber page.

Stay safe!

Categories
CyberOps

Screen Privacy Protector

In a World where privacy issues are getting bigger and bigger, sometimes small and simple solutions may have a big positive impact.

In the below video, I ran a small test. Devices: a laptop (Macbook Pro M1) and an iPhone 12 Pro Max. Both with Belkin privacy screen protector.

Screen intensity on both devices: approx 75%.

You’ll be pleasantly surprised to see that bystanders are not able to spy (with or without bad intentions) your screen. The 30 degrees view angle is excellent and is doing its job. For the mobile phone, the touch feeling and response is very good, plus the scratch protection included.

Installation on both laptop & mobile – very easy. And very important – with no air bubbles left between the screen and the protection foil.

Cybersecurity & personal privacy are not a joke anymore! Treat them with maximum responsibility!

For more info & advices, stay tuned on Cyber-Cerber.