Resume Strategies For the IT Practitioner

Techno-speak began with one word: computer. Now it is a language unto its own, with multiple operating systems, countless software and databases, web environments and programming languages. And new acronyms spring up daily it seems (CAD, CICS, DB2, LAN, MSCE, SQL), adding to the growing techno-speak dictionary. What is the best resume strategy for the I.T. practitioner to employ? Will Human Resources “get it” if the resume reads like a mini techno-speak dictionary?

Speak the Language

Of course you need to include techno-speak to sufficiently establish your I.T. credentials. Achieve this by creating a Technical Skills summary on the first page, or creating an addendum of technical skills if you have accumulated a vast amount of expertise. Alternatively, write a bullet or two under each position that list the technical skills you used to design, solve, test or implement. But, and this is crucial, your resume cannot consist only of techno-speak as human resources folk are not reliably conversant in this language.

Remember the Bottom Line

No employer is solely interested in what languages you know, or what software you have worked with. What is far more compelling is in knowing what your knowledge and skill has meant to past employers’ bottom lines. How have you impacted savings and earnings in service delivery, product enhancements, and debugging solutions?

If you speak only I.T. lingo, without linking it to profit, you aren’t considering what motivates your reader. Tie what you did to business, to profits, to the industry in which your worked, to a leading company for which you worked, or to solutions. Now you’ve got the reader’s attention.

Education

I.T. seems to be one field where many practitioners are either entirely self-taught or have an introductory education, from where they evolved to master their field. And many worry about this when looking for a new gig. Education is often a small percentage, perhaps only 25 per cent, of the weight of hiring requirements. As long as you “sell” your abilities by describing your history of savings or profit-generating contributions, education becomes a secondary consideration.

Key Words and Phrases

Of course it doesn’t hurt to keep current with studies, and some positions demand a particular certification. For example, if you are soon to be Microsoft Certified, and this is a crucial requirement, then the phrase “Microsoft Certified” will surely be included in a key word search. Companies that receive so many resumes that their H.R. departments cannot cope, rely on key word and phrase searches conducted by programmed software, a process that eliminates the majority of applicants. In order to avoid instant elimination be sure to add that new course to your Education section, and qualify it with a date of expected completion so that you are representing yourself truthfully.

The most crucial resume strategy to remember is that you must tell the reader, in close to layman’s terms, what you did. Keep the techno-speak to a minimum, beef up your results and accomplishments, and you will have the … Read the rest

Smartphone and Mobile Security – How Wise Is Your Smartphone?

The smartphone continues to revolutionize the enterprise planet as new and innovative phones flood the marketplace and slick apps make it less complicated to accomplish company around the clock, from anyplace. From a profitability and productivity standpoint, the business enterprise enhancing affects are unquestionable.

But with this fast progression in smartphone technology come new safety challenges that not simply CIOs and IT employees need to have to consider, but additionally tiny business owners and managers. Smartphones is often open portals to sensitive personal information as well as your corporate network to which they hyperlink, generating it absolutely crucial to understand the security risks and tips on how to keep the integrity of one’s data.

Peter DiCostanzo, a preeminent mobile telephone and iPhone consultant, adds that “Like laptops, smartphones are an extension of your corporation’s network not only containing sensitive or confidential information, but by way of VPN capabilities it might allow direct connectivity towards the heart of the company’s business enterprise. It is actually imperative for the network administrator to view smartphones the identical as employee laptops, and to apply exactly the same (if not greater) precautions and access levels restricting access towards the corporate network.”

A couple of stats to think about… 36% of enterprise network attacks originate from end-user devices, and in accordance with the 2010 Information Breach study, 28% of attacks occur by means of the many social networks that staff enjoy on their smartphones. Monitoring these types of activities and deploying a use policy will go a lengthy way in securing sensitive corporation information that travels involving the organization network and employee smartphones. With more than 250,000 apps readily available, and using the rate at which they enter the industry, it is understandable that not all apps are vetted just before they’re offered for download.

This can be a huge supply of vulnerability and an increasingly inviting platform for malicious criminal activity that could have devastating effects in your organization. Highlighting the value of a sturdy use policy, DiCostanzo explains, “Policy need to define and restrict which smartphones may be used on a corporate network. If the phone does not assistance characteristics such as password protection, or remote-wipe (ability to remotely erase the telephone if lost) one example is, it shouldn’t be permitted to access company data.”

In closing, in case you already have a single or program to deploy a company smartphone to your workforce, give some critical thought to the following:

* Education. Make your personnel conscious of how their smartphone interacts along with your network.

* Build and strictly enforce a use policy, and ensure that security apps are integrated in said policy.

* Understand that not all smartphones operate on the very same platform. Telephone software packages have holes and no carrier is immune to malware and viruses. Study regarding the many vulnerabilities and safeguards with the smartphone alternatives you are thinking of.

* Need personnel to sync their phones regularly, maintaining sensitive information off of their phones.

* Retain … Read the rest