Vetting employees via traditional background checks is a good practice for minimizing insider risk. It prevents unknowingly hiring a convicted–or soon to be convicted–cybercriminal, like Mahalo did when they employed John Kenneth Schiefer. However, non-traditional vetting practices are emerging, which take advantage of the increasing number of job candidates building Internet personas. These practices are collectively called cyber-profiling or cyber-vetting. Growing along with cyber-profiling is a change in how organizations vet employees, with both positive business and potentially negative social consequences.What is cyber-profiling?Today’s workers spend a great deal of time on the Internet, visiting and contributing to social networking sites. Facebook, Twitter, MySpace, LinkedIn, and many other services allow people to communicate with others, while recording information a potential employer can use to assess character, cultural fit and other attitudes and characteristics. Organizations use content on social network sites to understand whether a job candidate may present a risk to the business if hired. Examples include: The candidate harbors potentially inflammatory views about race, religion, or other sensitive social domains. For example, an employer in the United Kingdom opted not to interview a man because he “…declared in his [MySpace] personal profile that he was against religion and anyone who believed in it” (Berkelaar, p. 9). The candidate participates in off-work activities which might cause embarrassment for the organization. The candidate’s views on one or more topics indicate he or she would not be a good “cultural” fit for the organization or for the team supervised by the hiring manager. The candidate’s participation in activist or political action groups might pose a threat because the business is involved in activities which conflict with the agendas of those groups. Discussions about the candidate might cause doubt about his or her character in general.The number of organizations using social networks for employee screening varies by country. Research indicates 20 percent of organizations in the United Kingdom use cyber-profiling with up to 77 percent cyber-profiling in the United States (Berkelaar, p. 8). BenefitsVetting is an important part of ensuring employees handling sensitive information or managing critical systems present as low a risk to the business as is reasonable and appropriate. It is also important in today’s world of Internet business assessments, by both the informed and the uninformed, that each employee reflects the values of an organization, whether acting on behalf of the business or during personal time. Further, with insiders responsible for 70 to 80 percent of all organization security incidents, an organization should do everything it can to hire only those individuals it believes trustworthy. However, traditional background checks are often not enough. A background check provides information about a candidate’s involvement in criminal investigations, civil action, or financial problems. What it doesn’t report about a candidate, especially one who has a clean history, is information about his or her general character and behavior. According to Berkelaar, Cyber-vetting presumably enables organizations to look for red flags indicating potential incompatibility with the organization or position. As a result, organizations ostensibly can screen applicants more comprehensively before an interview is even scheduled, saving time and money (p. 3-4).Something as simple as a Google search can provide pages of information about individuals active on the Web or who associate with friends who are.PitfallsTrying to understand a person’s character by looking at his or her online persona is not without issues. For example, many social networkers create digital identities which are completely different from their actual personality or belief system. The reasons for this are many, including trying to fit in with a group or simple experimentation. However, most employers believe there is no separation between the “real” person and the digital one.Most employers were not convinced that prospective employees “could make a clean break between their Facebook personas and professional comportment” (Brock, 2007) suggesting employers are evaluating potential employees using a traditional Western perception of a singular, unified identity (Eisenberg, 2001) (Berkelaar, p. 4).This means employers tend to use whatever they find on the Internet about a person, whether the information is vetted or not, whether the intent or agenda of the person posting the information is known and evaluated. Such oversights can result in passing over perfectly suitable prospects during the hiring process, and unfairly tagging a person as “unfit.”The final word There is a place for cyber-profiling in the hiring process. However, I believe it is only one color in the palette when painting a picture of a candidate as an employee. Without other colors, the resulting portrait falls far short of reflecting reality. Unless social network searches turn up clear issues not open to interpretation, hiring managers should use cyber-profiling to craft candidate-specific interview questions. This approach can still save time by screening questionable prospects via telephone. It also provides an opportunity for a candidate to explain what the manager found or to clarify that he or she is not the person associated with problematic information during the Internet search. After all, how many John Smiths or Amy Browns are there in the United States? Works CitedBerkelaar, B. L. , 2008-05-22 “Cyber-vetting (Potential) Employees: An Emerging Area of Study for Organizational Communication” Paper presented at the annual meeting of the International Communication Association, TBA, Montreal, Quebec, Canada Online . 2009-03-08 from http://www.allacademic.com/meta/p234515_index.html Related content opinion MQTT is not evil, just not always secure The MQTT messaging protocol standard used by IoT vendors is not inherenly secure enough. Solutions exist to secure it, but organizations and vendors must assess risk and properly configure IoT and network security. By Tom Olzak Jul 17, 2017 3 mins Internet of Things opinion IoT messaging protocol is big security risk Popular IoT messaging protocol lacks encryption and sufficient device authentication security. By Tom Olzak Jul 14, 2017 3 mins Cloud Security Data and Information Security Internet of Things opinion Anatomy of an insider attack Manage insider attack risks with scenarios and application of common sense. By Tom Olzak Sep 30, 2016 4 mins Business Continuity Security opinion Identity governance and admin: beyond basic access management User behavior analytics give additional power to identity management and compliance. By Tom Olzak Aug 30, 2016 5 mins Investigation and Forensics Compliance Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe