{"id":253,"date":"2023-04-13T08:36:45","date_gmt":"2023-04-13T06:36:45","guid":{"rendered":"https:\/\/cyber-cerber.com\/blog\/?p=253"},"modified":"2024-04-16T15:50:19","modified_gmt":"2024-04-16T13:50:19","slug":"your-cv-your-life","status":"publish","type":"post","link":"https:\/\/cyber-cerber.com\/blog\/2023\/04\/13\/your-cv-your-life\/","title":{"rendered":"Your CV &#8211; Your Life!"},"content":{"rendered":"\n<p class=\"has-secondary-background-color has-background\">CV &#8211; Curriculum Vitae&#8230; or Resume&#8230; no, I will not go into this topic. You can find some good guidance in this <strong><em><a href=\"https:\/\/cdn1.sph.harvard.edu\/wp-content\/uploads\/sites\/36\/2020\/07\/Resume-Guide-October-2017-1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Harvard Resume\/CV<\/a><\/em><\/strong> guide.<\/p>\n\n\n\n<p class=\"has-primary-background-color has-background\">Also, I will not go into the design concept, which format is better or preferred&#8230; as there is none. Every recruiter has their own view and opinion, therefore, whatever you&#8217;ll choose, you&#8217;ll not be good enough for all. Just kidding.<\/p>\n\n\n\n<p class=\"has-text-align-center has-secondary-background-color has-background\">But what I will like to highlight now is your privacy. <strong>Your cyber-privacy!<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/cyber-cerber.com\/blog\/wp-content\/uploads\/2023\/02\/cyber-privacy-1024x576.jpg\" alt=\"\" class=\"wp-image-255\" srcset=\"https:\/\/cyber-cerber.com\/blog\/wp-content\/uploads\/2023\/02\/cyber-privacy-1024x576.jpg 1024w, https:\/\/cyber-cerber.com\/blog\/wp-content\/uploads\/2023\/02\/cyber-privacy-300x169.jpg 300w, https:\/\/cyber-cerber.com\/blog\/wp-content\/uploads\/2023\/02\/cyber-privacy-768x432.jpg 768w, https:\/\/cyber-cerber.com\/blog\/wp-content\/uploads\/2023\/02\/cyber-privacy.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p class=\"has-primary-background-color has-background\">We are all hunting for better jobs. Some of us are getting the dream job thru a direct recommendation, others by direct hunting, others thru a recruitment agency.<\/p>\n\n\n\n<p class=\"has-secondary-background-color has-background\">The recruitment agency has the privilege of working on our behalf, hunting and matching the best job as per our CV\/resume. They deal with the bureaucratic details in the background, the interviews, etc.<\/p>\n\n\n\n<p class=\"has-primary-background-color has-background\">And we are happy. And they are happy. So far, so good.<\/p>\n\n\n\n<p class=\"has-secondary-background-color has-background\">One of the duties of every accredited agency, at least in the EU, is to properly manipulate and store the data. Including our data. Our CV\/resume. As per the <strong><em><a rel=\"noreferrer noopener\" href=\"https:\/\/gdpr.eu\/\" target=\"_blank\">GDPR<\/a><\/em><\/strong>. They have certain procedures and protocols, including <strong><em><a rel=\"noreferrer noopener\" href=\"https:\/\/www.nist.gov\/blogs\/taking-measure\/why-security-and-privacy-matter-digital-world\" target=\"_blank\">cybersecurity<\/a><\/em><\/strong> and <strong><em><a rel=\"noreferrer noopener\" href=\"https:\/\/hbr.org\/2019\/01\/privacy-and-cybersecurity-are-converging-heres-why-that-matters-for-people-and-for-companies\" target=\"_blank\">cyberprivacy.<\/a><\/em><\/strong> <\/p>\n\n\n\n<p class=\"has-primary-background-color has-background\">And this is good, this is what we want. To have our data, our personal information, in safe hands!<\/p>\n\n\n\n<p class=\"has-secondary-background-color has-background\">But recently, over the past months, I started to see a lot of individual recruiters, advertising jobs and collecting CVs into, most of the time, Gmail accounts. <\/p>\n\n\n\n<p class=\"has-primary-background-color has-background\">Nothing wrong with or against individuals offering jobs to others, don&#8217;t take me wrong. Not going into the professional recruitment process (background check, profile match, certifications and skills verified, etc)&#8230; if is properly done or is just passing the paper from one hand to another&#8230;<\/p>\n\n\n\n<p class=\"has-secondary-background-color has-background\">My main concern is how our CVs, or personal data, are manipulated, stored, and protected by the @gmail.com user. Is the device &#8220;malware&#8221; free? Is the user cyber-clean, cyber-aware, and with good internet and computer habits? Is the data stored in a cyber-protected and encrypted environment? For how long the data is stored? What happens with that data after the &#8220;recruitment&#8221; process is finished? Is deleted? When? How? Do you get any feedback on the status of your CV\/resume after the recruitment process is done?<\/p>\n\n\n\n<p class=\"has-primary-background-color has-background\">You may say&#8230; is just a CV. No bank details, no PIN. Nothing to lose. Right?<\/p>\n\n\n\n<p class=\"has-secondary-background-color has-background\">Let&#8217;s review&#8230; In your CV, you have a name, a picture, DOB, location\/address, email, telephone number, in-depth details of your previous jobs, medicals &amp; references details&#8230; And the list can go on. And what can happen? Well&#8230; sit tight and brace for impact&#8230;<\/p>\n\n\n\n<p class=\"has-text-align-center has-secondary-background-color has-background\"><strong><em><a href=\"https:\/\/www.bitdefender.com\/blog\/hotforsecurity\/what-is-impersonation\/\" target=\"_blank\" rel=\"noreferrer noopener\">Impersonating<\/a><\/em><\/strong>, <strong><em><a href=\"https:\/\/www.edweek.org\/leadership\/students-create-fake-online-profiles-to-bully-peers\/2012\/04\" target=\"_blank\" rel=\"noreferrer noopener\">fake profiles<\/a><\/em><\/strong>, <strong><em><a href=\"https:\/\/www.nyu.edu\/life\/information-technology\/about-nyu-it\/nyu-it-news\/the-download\/the-download-features\/phishing-spear-phishing-whaling.html\" target=\"_blank\" rel=\"noreferrer noopener\">spare phishing, or even whaling<\/a><\/em><\/strong>, <strong><em>and <a href=\"https:\/\/www.stopbullying.gov\/cyberbullying\/what-is-it\" target=\"_blank\" rel=\"noreferrer noopener\">cyberbullying<\/a><\/em><\/strong>, <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/04\/how-to-protect-yourself-from-online-harassment?utm_source=iterable&amp;utm_medium=email&amp;utm_campaign=b2c_pro_oth_20240415_aprilweeklynewsletter_nonpaid_v3_2_171292098185&amp;utm_content=online_harassment\" data-type=\"link\" data-id=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/04\/how-to-protect-yourself-from-online-harassment?utm_source=iterable&amp;utm_medium=email&amp;utm_campaign=b2c_pro_oth_20240415_aprilweeklynewsletter_nonpaid_v3_2_171292098185&amp;utm_content=online_harassment\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><em>online harassment<\/em><\/strong><\/a> are just a few of the real dangers behind personal data (CV) in the wrong hands.<\/p>\n\n\n\n<p class=\"has-secondary-background-color has-background\">Just do a quick test&#8230; type &#8220;CV&#8221; in any search engine? What you&#8217;ll get? Tons of data, private data. Add a name&#8230; and there you go. And you don&#8217;t want to be on that visible list. Not to mention the <strong><em><a href=\"https:\/\/www.csoonline.com\/article\/3249765\/what-is-the-dark-web-how-to-access-it-and-what-youll-find.html\" data-type=\"URL\" data-id=\"https:\/\/www.csoonline.com\/article\/3249765\/what-is-the-dark-web-how-to-access-it-and-what-youll-find.html\" target=\"_blank\" rel=\"noreferrer noopener\">dark web<\/a><\/em><\/strong> and <strong><em><a href=\"https:\/\/us.norton.com\/blog\/how-to\/how-can-i-access-the-deep-web\" data-type=\"URL\" data-id=\"https:\/\/us.norton.com\/blog\/how-to\/how-can-i-access-the-deep-web\" target=\"_blank\" rel=\"noreferrer noopener\">deep web<\/a><\/em><\/strong>!<\/p>\n\n\n\n<p class=\"has-primary-background-color has-background\">Don&#8217;t post your CV online. Don&#8217;t give your CV to anyone who is just posting a job offer&#8230; Is that job offer even for real? Sometimes, we see &#8220;recruiters&#8221; of large (yes, large) yachts with Yahoo, Gmail, or other free accounts. If for a yacht of 30-40mtrs that is self-managing, this might be OK, for a large yacht with solid logistic support&#8230; it does not sound professional. <\/p>\n\n\n\n<p class=\"has-primary-background-color has-background\">A few pieces of advice before sending your data:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Do a bit of basic research (searching engines, social media, etc) before jumping with &#8220;CV sent. Thank you Sir\/Madam&#8221;&#8230;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ask your recipient for an email confirmation and application status (forwarded, accepted, rejected, denied, etc). I know&#8230;most of the recruiters are demanding professionalism but they deeply lack basic polite feedback so&#8230; even fewer expectations from a @Gmail &#8220;recruiter&#8221;!<\/li>\n\n\n\n<li>Ask for written confirmation of CV\/resume\/data deletion after the recruitment process is completed<\/li>\n<\/ul>\n\n\n\n<p class=\"has-secondary-background-color has-background\"><em>Personal and professional data must be carried out in the most private and professional way. Treat the subject seriously and good luck in your job hunting!<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CV &#8211; Curriculum Vitae&#8230; or Resume&#8230; no, I will not go into this topic. You can find some good guidance in this Harvard Resume\/CV guide. Also, I will not go into the design concept, which format is better or preferred&#8230; as there is none. Every recruiter has their own view and opinion, therefore, whatever you&#8217;ll [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":257,"comment_status":"closed","ping_status":"open","sticky":false,"template":"templates\/template-full-width.php","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[76,75,80,12,49,67,78,29,82,79,77,81],"class_list":["post-253","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-media","tag-curriculum-vitae","tag-cv","tag-cv-privacy","tag-cyber-awareness","tag-cyber-cerber-2","tag-cyber-cerber-com","tag-cyberprivacy","tag-cybersecurity","tag-cyrcomms","tag-gdpr","tag-resume","tag-your-cv-your-life"],"_links":{"self":[{"href":"https:\/\/cyber-cerber.com\/blog\/wp-json\/wp\/v2\/posts\/253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-cerber.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-cerber.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-cerber.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-cerber.com\/blog\/wp-json\/wp\/v2\/comments?post=253"}],"version-history":[{"count":16,"href":"https:\/\/cyber-cerber.com\/blog\/wp-json\/wp\/v2\/posts\/253\/revisions"}],"predecessor-version":[{"id":370,"href":"https:\/\/cyber-cerber.com\/blog\/wp-json\/wp\/v2\/posts\/253\/revisions\/370"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyber-cerber.com\/blog\/wp-json\/wp\/v2\/media\/257"}],"wp:attachment":[{"href":"https:\/\/cyber-cerber.com\/blog\/wp-json\/wp\/v2\/media?parent=253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-cerber.com\/blog\/wp-json\/wp\/v2\/categories?post=253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-cerber.com\/blog\/wp-json\/wp\/v2\/tags?post=253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}