A while back, I was startled to see people criticizing me harshly on an online IT forum. One poster called me “clearly incompetent” and demanded that I be fired. It was a chilling feeling, especially because I didn’t know any of my antagonists.
Thing is, it wasn’t about me. I share a name with a former public information officer for a Midwest school system. From what I pieced together, an IT security breach of some kind triggered some fallout for which my namesake was blamed. (I’m pretty sure it wasn’t her fault.)
Given our different geographies and occupations, my reputational risk from the nasty comments was minimal. But it was an unpleasant and creepy taste of what it must be like to experience an online attack or mistaken identity. (For an account of a much harsher lesson, pick up James Lasdun’s memoir of being a victim of a horrifying Internet vendetta, “Give Me Everything You Have
Everyone in the PR or reputation business knows that online reputation damage— deserved or not—is the underbelly of the anonymous Web, both for critics and their targets. Google isn’t just a search engine, it’s a reputation engine, as anyone who’s checked out a prospective blind date knows. What’s more, according to at least one source, 78 percent of recruiters do reputation searches for job candidates, and 63 percent check social media sites.
Of course, e-reputation concerns have spawned an entire industry, and the major social media sites have stepped up privacy and verification procedures under pressure, but people can be sloppy, rushed, and ignorant when it comes to social media. They’re also careless about anonymous handles, and as we all know, anonymity brings out the worst in just about everyone.
Yet having no digital footprint is also risky, at least in many relevant professions and business circles. So, how do you manage your e-reputation in a proactive way?
Yes, we all monitor for online mentions of our name, but remember to watch the social media accounts of your closest contacts, including friends and family. They’re the ones most likely to be posting silly photos or worse.
2. Protect your online identity.
Reputation starts with your name. Find out who has the same or highly similar name to yours; consider adopting an initial or using your full name if there’s a risk of confusion.
3. Sign up for every social network.
You don’t need to be active on all sites or communities; in fact, you can point everything to your Facebook page if that’s your identity hub, but claiming your name will deter squatters or name-a-likes.
4. Deal with any problems quickly.
The sooner you ask your brother-in-law to delete the New Year’s Eve party pictures or the blogger to correct the inaccurate quote, the better.
5. Secure your accounts.
This may be obvious, but it’s easy to forget or overlook as privacy settings and policies change. Switch off tagging, opt out of lists, and share your privacy preferences or concerns with close contacts who have access to information and images. A good way to do that is by asking about and respecting their wishes when it comes to sharing personal photos and content.
6. Don’t reveal personal information.
Identity thieves can use key dates, children’s names or ages, or mutual friends to hijack your page.
7. Create content.
Obviously this is the best way to build a positive digital identity and the first advice reputation professionals often give to clients. If a blog is too much, become an active commenter on other blogs or online communities.
Dorothy Crenshaw is CEO and creative director of Crenshaw Communications. She has been named one of the public relations industry’s 100 Most Powerful Women by PR Week. A version of this story appeared on the Crenshaw Communications blog.