Friday, February 27, 2015

I Dare You To Work With Me On Monday March 2, 2015



Whoever works with me on Monday March 2, 2015 will be in for a treat.  In a few hours, I'm headed to Wolf Creek, Colorado for what could possibly be the best powder ski day of my entire life.  A few weeks ago, SNOWCOUNTRY.com chose me as the winner of two Wolf Creek lift tickets.  I've been saving them for a chance to ski famous Wolf Creek powder.

If you're not a skier or snowboarder, this forecast won't mean much to you but if you chase storms as I often do, can you imagine anything better than this and free lift tickets!

Friday
Chance of precipitation is 90%. Total daytime snow accumulation of 3 to 5 inches possible.
Friday Night
Chance of precipitation is 100%. New snow accumulation of 11 to 17 inches possible.
Saturday

Chance of precipitation is 90%. New snow accumulation of 10 to 16 inches possible.

If we work together in any way on Monday, you'll get the most energized Jeff Snyder you'll ever encounter.  Nothing energizes me more than knee deep powder.  You have been warned.

Don't Let Blind Spots Hold You Back




My first call of the day was with an Executive Vice President (EVP) who has been in his current role for more than a decade.  He has done what he joined his current company to do and it is now time for a change.

During the month of January, this EVP made the rounds to many different people to get advice on how to build his resume.  He went to HR leaders, Recruiters, business colleagues.  He told me this morning that he is now thoroughly confused and he has learned a lot.

I asked the EVP if he would share what he learned.  He suggested that nearly everybody has a different opinion about resume writing.  I asked the EVP what results he had achieved by listening to such a variety of opinions. 

The EVP told me he has sent out 15 resumes in his local community.  His batting average is currently 0.00.  He has not generated a single interview through is resume sharing efforts.  Next week, this EVP is scheduled with me to consume my 1 Hour Resume Coaching that is backed with a money back guarantee.  There is a 100% chance that I can solve all of his problems with a resume writing methodology that is backed with results.

Here are three of several emails that have landed in my Inbox in the past week from my resume coaching clients and career coaching clients.  The third block of information has been heavily sanitized because I don’t want to give away information with regards to specifically where my career coaching client is interviewing.

"I'm going all in with your services." IT Leader Transitioning to Information Security 
 "Thank you for taking the time last month during our one hour resume coaching session.  I definitely have grown from the experience and have a much better understanding of the key components of the resume and how they can best grasp the attention of hiring managers. I look forward to your LinkedIn Optimization and alignment guidance in the near future!”  Transitioning Law Enforcement Leader
"Your assistance in the form of feedback, periodic review and advice was a big help." Transitioning DEA Agent
"But my guys in the CISO Forum love you." Vice President
"I am still waiting on a GLOBAL FINANCIAL COMPANY to write the final offer. I was contacted by the hiring manager again to let me know they have had short days due to weather and I should get it next week. The longer wait has paid off though since I have had more time to move further with XYZ BANK,  ABC Health, and a VERY LARGE AIRLINE." Transitioning Corporate Security Professional
" What I've learned in this call exceeds my expectations ...I took 3 pages of notes" Soon to Transition Chief Information Security Officer
If you're asking why I constantly share this kind of information, I have a rock solid crystal clear answer for you.  A few years ago, I discovered how to align my natural strengths with the work I do. I took action on what I learned to the extent that I now invest as much of my time as possible doing things that I love to do and things that I'm great at with people who want to advance, improve and get to the next level.

No, I'm not great at all things but I do know where I have the potential to hit grand slams. This is what I help my career coaching clients to discover so they can also hit grand slams. It is the most fun work I get to do and I'm energized after I've done it.

The Gallup organization surveys the US Workforce every year and has been doing so for over a decade.  They consistently find that approximately 70% of the US workforce is disengaged and only 30% of US workers are engaged.  I'm on a personal mission to help more people get into the engaged category.

Jeff Snyder's, Security Job Coach, Security Career Coach, Security Recruiter Blog, 719.686.8810


" What I've learned in this call exceeds my expectations....I took 3 pages of notes"




Thursday, February 26, 2015

“Security Certifications Are For Fools”


The title for this blog is a comment that one of your colleagues added to an article I read last week.  

While your colleague is entitled to his opinion, I doubt that he gave any thought to how many hard working, highly certified security professionals he might have insulted with his comment.

In 2008, CISO job with a very good Human Resource Director client.   After one of the candidates I delivered to my client completed his interview process, my HR Director client called to give me feedback on the interview. 

During the course of receiving feedback from my client, I learned that the candidate I’d sent to interview talked too much.  This happens sometimes when interview adrenaline flows or when someone has the strength of Communication near the top of their strengths list and they don’t know it.

As I listened to my client’s feedback, a somewhat abstract skill set came to my mind.  When Mike was done speaking, he asked me if I had any questions.  His intention in giving me feedback was to help me fine-tune my recruiting process.

I asked Mike if what he was really looking for in a candidate was someone who knew:

"What to say, When to say, How to say, To whom to say and When to say nothing"
This set of ideas just came to me at that moment.  Mike said YES and told me to write down what I’d just said.

The point here is that we don’t need to say everything that comes to our mind.  Sometimes the audience is not right for what comes to our mind.  Sometimes the timing of our message is not good.  Sometimes what we have in our minds simply needs to stay in our minds.

I don’t think security certifications are for fools by the way.

There is a fine line between having enough certifications to confirm that you’re a student of your profession and having too many certifications.  

While some employers rely too heavily on certifications and turn their hiring process into a check box exercise, most employers like to see some evidence that a security professional is serious enough about their chosen career to have earned certifications to verify their subject matter expertise.


Sunday, February 22, 2015

Cyber Security News, Education and Vulnerability Patch Report for the Week of February 22, 2015


 


CYBER SECURITY NEWS

OF THE WEEK

 

FROM OUR FRIENDS AT CITADEL INFORMATION GROUP


Cyber Crime

The Rise in State Tax Refund Fraud: Scam artists stole billions of dollars last year from the U.S. Treasury by filing phony federal tax refund requests on millions of Americans. But as Uncle Sam has made this type of fraud harder for thieves to profit from, the crooks have massively shifted their focus to conducting refund fraud at the state level. Or at least according to Intuit Inc., the makers of TurboTax: The company says it believes that shift is responsible for a whopping 3700 percent increase in fraudulent state tax refund filings this year in some states. KrebsOnSecurity, February 17, 2015
The Great Bank Heist, or Death by 1,000 Cuts?: I received a number of media requests and emails from readers over the weekend to comment on a front-page New York Times story about an organized gang of cybercriminals pulling off “one of the largest bank heists ever.” Turns out, I reported on this gang’s activities in December 2014, although my story ran minus many of the superlatives in the Times piece. KrebsOnSecurity, February 16, 2015

Cyber Privacy

The NSA Reportedly Stole Millions Of SIM Encryption Keys To Gather Private Data: The American National Security Agency (NSA), and the British Government Communications Headquarters (GCHQ), similar clandestine intelligence agencies, stole SIM card encryption keys from a manufacturer, allowing the groups to decrypt global cellular communications data. TechCrunch, February 19, 2015
Russian Researchers Uncover Sophisticated NSA Malware: Over the weekend Russian IT security vendor Kaspersky Lab released a report about a new family of malware dubbed “The Equation Family”. The software appears, from Kaspersky’s description, to be some of the most advanced malware ever seen. It is composed of several different pieces of software, which Kaspersky Lab reports work together and have been infecting computer users around the world for over a decade. It appears that specific techniques and exploits developed by the Equation Group were later used by the authors of Stuxnet, Flame, and Regin. The report alleges that the malware has significant commonalities with other programs that have been attributed to Western intelligence agencies; Reuters subsequently released an article about the report in which an anonymous former NSA employee claims that the malware was directly developed by the NSA. EFF, February 19, 2015

Cyber Warning

Until Superfish fix, Lenovo devices can’t be trusted for secure work: Millions of Lenovo owners are being warned to not use their desktops and laptops for “any kind of secure transaction,” amid concerns that the company installed adware on their machines. ZDNet, February 19, 2015
Cybercrime moving to the cloud in a big way: Report: About 16 million mobile devices have been infected by malicious software globally in 2014, according to the latest report by Alcatel-Lucent’s security arm Motive Security Labs. Such malware is used by “cybercriminals for corporate and personal espionage, information theft, denial of service attacks on business and governments, and banking and advertising scams,” the report said. FirstPost, February 16, 2015

Cyber Security Management

How corporate America can fight cybersecurity threats: Last week, President Obama, business leaders, consumer and privacy advocates, and law enforcement officials gathered for a summit at Stanford University to talk about cybersecurity. This conversation is long overdue. By any measure, cybersecurity is the biggest common threat organizations face. It is also the one where we see the largest gap between threat and preparedness. While companies are devoting significant resources to the problem, they must recognize that playing catch-up is inherent to tackling the problem. Fortune, February 17, 2015

Cyber Security Management – Cyber Update

Microsoft Updates Windows Defender to Fry Superfish: If you’re a Lenovo laptop owner, then you’ve probably heard about the Superfish adware the company added to its consumer PCs last fall. PC Magazine, February 20, 2015

Cyber Security Management – HIPAA

HIPAA and “Meaningful Use” Audits: Issues to Consider and How to Prepare: As more and more providers adopt electronic health records (“EHRs”) systems (and with new regulations concerning their required use for purposes of Medicare billing for chronic care management, their popularity can only continue to grow), a myriad of compliance issues continue to surround them. To that end, the federal government has stepped up auditing programs to ensure compliance with HIPAA/HITECH as well as making sure taxpayer money has been invested wisely through the Meaningful Use program. The bent of these audit programs is clearly along the lines that applicable covered entities and business associates should be preparing with a “when” mindset, rather than “if,” as these audits are going to happen. JDSupra, February 20, 2015

Securing the Village

Why Everyone’s to Blame for Identity Theft: The other day a reporter asked me who’s to blame for the growing epidemic of identity-related tax fraud. I almost replied, “the government and the bad guys,” but I caught myself before committing to that inaccuracy. “We’re all to blame,” I said. ABC News, February 15, 2015
2 North Hollywood High teams compete for national cyber security title: Defense will be the game next month when two teams from North Hollywood High School travel to Washington, D.C., to compete in a prestigious national championship. DailyNews, February 15, 2015

National Cyber Security

Hackers Said to Remain Active in U.S. State Department E-Mails: (Bloomberg) — U.S. and private security specialists are trying to expel unidentified hackers from the unclassified portion of the U.S. State Department’s e-mail system, two officials familiar with the investigation said Thursday. Bloomberg, February 19, 2015
U.S. Embedded Spyware Overseas, Report Claims: SAN FRANCISCO — The United States has found a way to permanently embed surveillance and sabotage tools in computers and networks it has targeted in Iran, Russia, Pakistan, China, Afghanistan and other countries closely watched by American intelligence agencies, according to a Russian cybersecurity firm. The New York Times, February 16, 2015
Obama Calls for Public Debate Over Encryption: SAN FRANCISCO — President Barack Obama said Friday that he probably leans more toward strong computer data encryption than many in law enforcement, but added that he understands investigators’ concerns over the matter because of their need to protect people from attacks. The New York Times, February 13, 2015

Cyber Misc

Cellphone Start-Ups Use Wi-Fi First to Handle Calls and Take On Rivals: SAN FRANCISCO — It would not be an insult to say Republic Wireless and FreedomPop are obscure little companies. But they dream big. The two companies are at the forefront of a tantalizing wireless communications concept that has proved hard to produce on a big scale: Reduce cellphone costs by relying on strategically placed Wi-Fi routers. And when there are no routers available, fall back on the traditional cellular network. The New York Times, February 16, 2015


Weekend Vulnerability and Patch Report, February 22, 2015



Important Security Updates

Apple iTunes: Apple has released version 12.1.1 (64-bit and 32-bit) of iTunes. Updates are available from Apple’s website.
Google Chrome: Google has released Google Chrome version 40.0.2214.115. Updates are available from within the browser or from Google Chrome’s website.
Google Picasa: Google has released version 3.9 Build 139.161. Updates are available at the Picasa website.

Current Software Versions

Adobe Flash  16.0.0.305 [Windows 7: IE]
Adobe Flash  16.0.0.305 [Windows 7: Firefox, Mozilla]
Adobe Flash  16.0.0.305 [Windows 8: IE]
Adobe Flash  16.0.0.305 [Macintosh OS X: Firefox, Opera, Safari]
Adobe Reader 11.0.10
Dropbox 3.2.6 [Citadel warns against relying on Dropbox security. We recommend files containing sensitive information be independently encrypted with a program like Axcrypt; encryption keys be at least 15 characters long; and the Dropbox password be at least 15 characters long and different from other passwords.]
Firefox 35.0.1
Google Chrome 40.0.2214.115
Internet Explorer 11.0.9600.17633
Java SE 8 Update 31 [Citadel recommends removing or disabling Java from your browser. Java is a major source of cyber criminal exploits. It is not needed for most internet browsing. If you have a particular web site that requires Java, Citadel recommends using a two-browser approach to minimize risk. If you normally browse the Web with Firefox, for example, disable the Java plugin in Firefox and use an alternative browser — such as Chrome, IE9, Safari, etc — with Java enabled to browse only the sites that require it.]
QuickTime 7.76.80.95
Safari 5.1.7 
Safari 7.1.3 [Mac OS X]
Skype 7.1.60.105

Newly Announced Unpatched Vulnerabilities

None
For an updated list of previously announced Unpatched Vulnerabilities, please see the resources section of Citadel’s website.

For Your IT Department

Cisco Multiple Products: Secunia reports Cisco has released updates and partial fixes for its Adaptive Security Appliance (ASA), Aggregation Services Routers (ASR), TelePresence Management Suite, TelePresence MCU 4500 Series, Wireless LAN Controller and others. Apply updates. Secunia reports unpatched vulnerabilities in Cisco’s Web Security Appliance, Hosted Collaboration Solution (HCS), Web Security Appliance, and others. No official solutions are available.
If someone else is responsible for the security of your computer, forward our Weekend Vulnerability and Patch Report to them and follow up to make sure your computer has been patched and updated.
Vulnerability management is a key element of cyber security management. Cyber criminals take over user computers by writing computer programs that “exploit” vulnerabilities in operating systems (Windows, Apple OS, etc) and application programs (Adobe Acrobat, Office, Flash, Java, etc). When software companies find a vulnerability, they usually issue an update patch to fix the code running in their customer’s computers.
Citadel publishes our Weekend Vulnerability and Patch Report to alert readers to some of the week’s important updates and vulnerabilities. Our focus is on software typically found in the small or home office (SOHO) or that users are likely to have on their home computer. The report is not intended to be a thorough listing of updates and vulnerabilities.
Copyright © 2015 Citadel Information Group. All rights reserved.


Friday, February 20, 2015

A Satisfied 1 Hour Resume Coaching Client




From a 1 Hour Resume Coaching client:


"I just wanted to thank you for a great session, it was very insightful."


Nothing better than hearing from a happy client!  We'll now work on getting his resume and his LinkedIn Profile message aligned.




Jeff Snyder's, Security Job Coach, Resume Coaching, Security Recruiter Blog, 719.686.8810

GSN 2014 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

GSN 2014 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS









GSN INTERVIEW

 





Chuck Brooks, Distinguished Judge,
GSN 2014 Homeland Security Awards Program


Charles (Chuck) Brooks serves as Vice President/Client Executive for DHS at Xerox. Chuck served as the first Director of Legislative Affairs for the Science & Technology Directorate within the Department of Homeland Security. He was an Adjunct Faculty Member at Johns Hopkins University, where he taught a graduate course on “Congress and Homeland Security.” He also spent 6 years on Capitol Hill as a Senior Advisor on national security issues to the late Senator Arlen Specter. Chuck has an MA in International Relations from the University of Chicago and a BA in Political Science from DePauw University. He has served in several senior executive corporate roles and is widely published as a thought leader on subjects relating to homeland security, technology, innovation, CBRNE, and cybersecurity. He also operates two of the largest homeland security groups on LinkedIn and is a featured speaker at government and industry conferences. Chuck has also served as a judge for three recent Government Security News industry homeland security awards events.


GSN: What is the threat landscape for the Department of Homeland Security as it enters its second decade of operations?

CB: DHS has made great progress over the last decade but the current threat level is now heightened for DHS, the intelligence community, and law enforcement as a result of evolving threats. The most immediate threat is posed by ISIS and affiliated Islamic extremists who have gained combat experience in Iraq and Syria and have ac­cess to Western passports. Rep. Michael McCaul (R-Texas), chairman of the House Homeland Security Committee, said these terrorists “present the greatest threat we’ve seen since 9/11.” Also, a decade ago terrorists’ ability to organize and mobilize was more limited because of com­munication capabilities. The exponential growth in smart phones (there are now 14B smartphones worldwide) and the terrorists’ use of social media has made surveillance and monitoring of those who might threaten the home­land a bigger challenge.

The defense against CBRNE (chemical, biological, radiological, nuclear, and explosive) threats will continue to be priorities of DHS because of the asymmetrical terror consequences they present. The recent Ebola outbreak illustrates our vulnerability to pandemics and infectious disease outbreaks. The potential for bio-terrorism directed by non-state actors is a frightening but real scenario. Right­fully so, countering biological threats remains a high prior­ity at DHS. As our experiences in Afghanistan and Iraq have shown, man portable improvised explosive devices (IEDS) and vehicle-borne IEDS are still a major concern, especially against soft targets.
Other threats such as chemical and radiological substance releases, and natural disasters from floods, hur­ricanes and earthquakes all still pose plausible and dire threats to the homeland. Unfortunately, it is likely that the nation’s preparedness will be tested again in the coming decade.

One area where DHS has taken on an increasingly larger role is in cybersecurity. Presidential Directives have mandated DHS to play the primary role in the civilian side of government for cybersecurity. A major reason for the new focus on cybersecurity has been the rapid changes in the information technology landscape. Since 2003, the capabilities and connectivity of cyber devices and communications has grown exponentially. Concurrently, so have the cyber intrusions and threats from malware and hackers. This has required restructuring of priorities and the cybersecurity missions at DHS. The cyber threat to the homeland reaches far beyond terrorists and includes various criminal enterprises and adversarial nation states.

What do government and industry perceive to be the main cybersecurity threats and required responses?

CB: Both government and industry have prioritized critical infrastructure as a focus of threat and hardened response. There is a growing understanding of the seri­ousness and sophistication of the cyber threats, especially denial of service. In terms of preparation, the financial and retail communities have been at the forefront of address­ing these threats with significant investment in technolo­gies and in training. However, 43% of companies had breaches last year (including companies such as Home Depot, JPMorgan, and Target) and the intrusion threats are not diminishing.

According to the think tank Center For Strategic and International Studies (CSIS), cyber related crime now costs the global economy about $445-billion every year. These breaches demonstrate that there is a continued need for protocols and enhanced collaboration between government and industry.

Last year, The Council on CyberSecurity, an influ­ential not-for–profit organization, formed a “20 Critical Se­curity Controls list” with collaboration between the public and private sectors. The list provides an emerging working framework for protecting the critical infrastructure and provides a recommended set of actions for cyber defense that includes specific and actionable ways to stop today’s most pervasive attacks. I was honored to participate in that working group.

Indeed, cyber security controls are very important. In the U.S., most (approximately 85%) of the cybersecu­rity critical infrastructure including defense, oil and gas, electric power grids, healthcare, utilities, communications, transportation, banking, and finance is owned by the private sector and regulated by the public sector. DHS has recognized the importance for private sector input into cybersecurity requirements across these verticals and has played a major part in bringing government and industry together to develop a strategy to protect critical infrastruc­ture.

There will always be a need for better encryption, biometrics, analytics, and automated network security to protect critical infrastructure in all categories. Also, cyber resilience is an area that must be further developed both in processes and technologies. In the future, cybersecurity for the “Internet of Things,” consisting of hundreds of mil­lions connected IP enabled smart devices, will certainly be a main priority


What would be on your own master list of cybersecurity priorities and emerging trends?

Emerging Technology Areas:
• Internet of Things (society on new verge of
exponential interconnectivity)
• Wearables
• Drones and Robots
• Artificial intelligence
• Smart Cities
• Connected transportation
Priorities:
• Protecting critical infrastructure through technologies
and Public/Private cooperation
• Better encryption and biometrics (quantum encryp
tion, keyless authentication)
• Automated network-security correcting systems (self-
encrypting drives)
• Technologies for “real time” horizon scanning and
monitoring of networks
• Diagnostics and forensics (network traffic analysis,
payload analysis, and endpoint behavior analysis)
• Advanced defense for framework layers (network,
payload, endpoint, firewalls, and anti-virus)
• Mobility and BYOD security
• Big data
• Predictive analytics
• Interoperability
Trends:
• Informed risk management
• Emergence of Public/Private sector partnerships
• More information sharing and collaboration
between the public and private sectors
• Shared R & D spending
• Increased spending for cloud computing
• Consolidation of data centers
• Expansion of hiring and training of cybersecurity
workforce
• Tech foraging


What is Xerox’s focus in the homeland se­curity space?

CB: Xerox has a great tradition of innovation and has become a world leader in digitization, contact centers, document management, IT, and data analytics. Xerox is a recognized leader in “digitization” of documents in the Federal government. The company has been providing mailroom, scanning, imaging, indexing, and data capture for nearly three decades, including with DHS. Xerox uses innovative technologies, including Optical Character Recognition (OCR). OCR automatically extracts data from scanned images and makes those data available for elec­tronic processing for millions of images each day. Hav­ing electronic access to data and files provides for more efficient planning and operations in the security environ­ment.

Xerox is also known for its contact center exper­tise. The company uses multi-channel contact technology tools via phone, email, web, and mobility to optimize, automate, and help scale customer service agent response. Contact center management solutions are designed to minimize impact, assure end-user incidents are addressed quickly, and prevent reoccurrence that is important for a public safety mission.

Xerox has also developed and deployed a disease surveillance and outbreak management software called Maven that is of interest to homeland security and pub­lic health agencies. It is configured to provide “contact tracing” for Ebola and other communicable diseases. The software manages the identification and diagnosis of those who may have come in contact with an infected person.


Can you update us on your social media and thought leadership activities?
CB:

Many senior level executives in the Federal gov­ernment are on social sites such as LinkedIn, GovLoop, Facebook, and Twitter. There are an estimated 1.4 million Federal government employees who regularly use LinkedIn, including over 65,000 from DHS. Social media has be­come part of the fabric of how we communicate, operate, and conduct business. The two homeland security groups I run on LinkedIn –“U.S. Department of Homeland Security” and “Homeland Security”– have grown to over 50,000 members. (Please look them up and join and post!) I have become active now on Twitter too. Please follow me: @ChuckDBrooks

I have also been active on the speaking circuit at conferences, including recent presentations at the Na­tional Press Club, Homeland Security Week, Secure Cities, George Washington University, Bowie State University, and CyberMaryland. Please check out my recent article in The Hill newspaper called “Navigating the Four Pillars of Washington, DC” that explores the interplay between government, industry, media, and policy organizations in the nation’s capitol.

Thank you for speaking to me and letting me share my perspectives. GSN serves as an excellent media resource for all those active in the homeland security and national security fields. I strongly encourage others to become regular readers of your publication online and in print.


Speaking of Personal Branding...What Does Your Brand Suggest About You?




Speaking of Personal Branding

When I lived in the Midwest, I did a lot of Bass fishing.  My tackle box was filled with artificial worms and I recall catching a lot of bass with a color like this.  I found this color on the LinkedIn header of someone's Premium LinkedIn account today.  This is a great color to use for a Bass lure but I'm not so sure it is a great color to use to attract a recruiter or hiring authority's attention.




When it comes to personal branding, did you know that there is psychology connected to color?  That’s why large company logos are built using very specific colors.  

There are more risky colors to be aware of but did you know that most men and most women generally dislike the color Orange?




There is a reason why I built sample LinkedIn profile headers with these background colors.  
They speak to one’s personal brand and they have a specific psychological impact.





I'd enjoy helping your with your Personal Branding, Packaging and Marketing. This type of work falls within my sweet spot and I love to help my clients to succeed.

Emotional Intelligence…What is it?...Learn Through This Story




I’ve thought long and hard about writing this particular blog.  What I’ve been doing is applying my Impulse Control…an emotional intelligence skill. Since this person put this information in the public domain, I decided that my response to what was sent my way would be a teaching moment rather than inviting this person to lace up the skates to play hockey against me.

A few weeks ago, I shared a post with an Information Security group I’m part of on Facebook.  In response to my post, I received this comment.
 



I write a lot of blogs and articles.  To be specific, since 2007, I’ve added 1,165 blogs to my Security Recruiter Blog.  You might read the first blog and decide that you don’t like me and/or you don’t agree with what I’ve written.  It might take reading 100 of my blogs to determine that you don’t share my point of view.  Either way, I’m okay with that.

Yesterday, this person or the real person behind what appears to be a bogus profile on both Facebook and LinkedIn chose to share his mind again.



I did a little bit of homework on this individual to determine who he is and to determine how I would respond.  Here’s his LinkedIn Profile.







Here’s his Facebook profile.
























A real profile or not?  You can decide for yourself.

Emotional Intelligence is a mix or how we perceive ourselves and how we come across to others.  If your blogs or articles received the comments left by this person, how would his actions have made you feel?

Maybe your words and actions aren't as sharp as these words but we have choices to make other people feel good or bad about themselves every day. How we come across to other people is part of Emotional Intelligence.




My suggestion is that you might want to be more disciplined than this person in terms of the electronic trail you’re leaving behind you on the Internet.  I left these comments in place just the way they were delivered by the way.

Future employers and/or clients can and will find your Internet past if they want to.


SecurityRecruiter.com's Security Recruiter Blog