Job recruiters warn college graduates to avoid creating Web-based evidence of risky behaviors (read: drugs, alcohol and sex) that they would not want a prospective employer to see. Job recruiters warn today’s college graduates to avoid creating Web-based evidence of risky behaviors (read: drugs, alcohol and sex) that they wouldn’t want a prospective employer to see. Those already in the workforce can benefit from such reputation-protecting advice too. “We know that this data for all practical purposes never goes away,” says Mark F. Foley, a partner at Chicago-based Foley & Lardner who advises corporations on data privacy and security issues. “If you upload a 90-second video [of yourself] on the Pensacola beach, there’s a good chance that could be found and used against you someday.” Share these tips with your HR and legal departments to help your employees keep their online noses clean.Assume that if people can recognize you, they will. Foley says that companies should remind their workers of the risks involved with representing themselves online, a public place in which the context of their words and actions are not controlled by them. While privacy protections vary by country (France is particularly strong), this advice about avoiding risk informs other tips here.Think about your online identity. You can always go incognito online; not a bad idea if you’re engaging in controversial commentary that you don’t want attached to you in the blogosphere or on a bulletin board or media outlet. Many, including CSOonline, allow anonymous comment posting.A new meaning for candid camera. Treat the growing plethora of outlets such as photo-sharing site Flickr, the MySpace Web community, the YouTube viral video hub and others like one big machine that could make—or break—your image and reputation. Watch that avatar. Foley says that companies should remind their workers of the risks involved with representing themselves online. For example, if you create an avatar to go to a place in Second Life that would merit an NC-17 movie rating, you might consider making your online identity appear nothing like your real identity. Related content brandpost How an integrated platform approach improves OT security By Richard Springer Sep 26, 2023 5 mins Security news Teachers urged to enter schoolgirls into UK’s flagship cybersecurity contest CyberFirst Girls aims to introduce girls to cybersecurity, increase diversity, and address the much-maligned skills shortage in the sector. By Michael Hill Sep 26, 2023 4 mins Back to School Education Industry IT Training news CREST, IASME to deliver UK NCSC’s Cyber Incident Exercising scheme CIE scheme aims to help organisations find quality service providers that can advise and support them in practising cyber incident response plans. By Michael Hill Sep 26, 2023 3 mins IT Governance Frameworks Incident Response Data and Information Security news Baffle releases encryption solution to secure data for generative AI Solution uses the advanced encryption standard algorithm to encrypt sensitive data throughout the generative AI pipeline. By Michael Hill Sep 26, 2023 3 mins Encryption Generative AI Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe