Wednesday, June 3, 2009

The 10+ most dangerous words in business

Business buzzwords can be annoying — but everyday language can be far more treacherous. BNET UK’s Jo Owen lists a dozen seemingly innocuous words that are often used to distract, misdirect, and deceive the listener.



Don’t worry about the jargon: At least we all recognise it when we hear it. The really nasty language in business consists of normal words with abnormal meanings. Here are 12 words that should get any alert manager’s bullsh*t detector working overtime.

Note: This article originally appeared on BNET UK. It’s also available as a PDF download.


1: Just
This is used to make a huge request or error seem trivial, as in, “Could you just do this (500-page) document by Monday?” — a request best made late on a Friday afternoon.

2: But

Remember, whatever is said before but is b*****ks, as in, “That was a great presentation, but…” or, “I would like to help, but…”.

3: From
From is much loved by advertisers, as in “Fly to Rome from £10″ — excluding £100 of taxes and other “optional” extras for a flight leaving at 4 AM and going to an airport about 100kn away from Rome, and only if you book the ticket one year in advance.

4: Might (and any other conditional verb)
Might is used to achieve two thing. First, it sets up a negotiating position, as in, “I might be able to do that if…” Second, it lays the groundwork for excusing failure later on: “I would have done it, if only…”

5: Only
Closely related to just, this is an attempt to make a big request or problem seem small. “It was only a small error…. We only dropped one nuclear bomb over London…”.

6: Important (and urgent)
This is used to puff up any presentation: “This important new product/initiative…”. Important to whom? And why? Maybe it is important to the speaker, but why is it important to me?

7: Strategic
Important, with bells on. See Strategic Human Capital Division, formerly known as the Personnel Department. It’s alternatively used to justify something that has no financial justification at all: “This strategic IT investment (which costs £100 million and has no identifiable payback) is essential to the survival of the business.”

8: Rightsize, downsize, best shore, offshore, outsource, optimise, redeploy, downshift, re-engineer
How many ways are there to avoid saying straight up: “We are going to lay off staff”?

9: Thank you
Normally, thank you is good — except when used by automated voices at call centres saying, “Thank you for calling; we value your call… (and we have so much contempt for our customers that we can’t be bothered to answer your call promptly, so we will put you on hold until you give up and try to use our impenetrable and useless online help instead).”

10: Interesting
Fear this word. When your lawyer uses it, you are doomed. When your doctor uses it, check that your will is up to date. The recession is certainly interesting. A slightly less interesting time would be preferable.

11: Opportunity
Because the word problem has been banned in business-speak, all problems have become opportunities. This means many opportunities are problems. There is a limit to how many opportunities I can solve. Interesting and strategic opportunities really scare me.

12: Investment
Investment was first hijacked by the British government to justify wild and uncontrolled public sector spending. Spending is bad, but investment is good, so it simply reclassified all its spending as investment in the health, education, and future of the country. The businesses that followed the government’s lead by going on a spending/investment splurge are now going bust — unlike the government, they can’t print money or raise taxes.

Three questions you should ask an interviewer

Job interviews are not just a means by which prospective employers judge your suitability. It’s also a mechanism by which you can see if a company would be a place you’d want to work. Here are some questions you can ask an interviewer that will give you information about what the company culture is like and what the manager’s expectations will be.

——————————————————————————————————————-

Many people approach job interviews with a deer-in-the-headlights “please don’t let me say anything stupid” mentality. And that’s understandable since no matter how many times career experts say otherwise — that you should also use an interview to size up the company — the job interview is a means by which you’re being judged.

Sometimes when people attempt to size up a company and its job offering, it goes terribly wrong. Some candidates misinterpret that mission and end up asking “What about me?” questions such as, what’s the vacation policy and how long do employees get for lunch? Interviewers like questions from candidates, they really do, but you have to learn to ask the right kind. If you ask the right questions, the information you get back could help you tailor your own presentation. Here are some examples:

  1. What can you tell me about the people I’ll be working with?” You can tell a great deal about an interviewer from how she answers this question. Does she speak in glowing terms about the team? Or does she go into too much detail about their quirks? Maybe the question tips off a tirade from her about how worthless and unproductive her staff members are. (That last response should send you running for the hills.)

  2. How do you approach problem solving?” If the interviewer responds that he expects problems to be solved in nanoseconds and you know yourself to be the type of person who likes to weigh all aspects of an issue, then you can pretty much discern that a working relationship between you two will be like oil and water. This could work out nicely if you think you’re being a yin to his yang could be ultimately productive, but it’s something to think about.

  3. What do you see as the ultimate goal of your department or team?” A good manager will respond in terms of company value and employee satisfaction. If he responds that his ultimate goal is to not screw up and to stay under the radar, you should be able to infer that that culture will not be the most supportive to growth. Also beware if this question causes the interviewer to veer off on a long tangent about his personal career goals. (This actually happened to me once. About 20 minutes into his self-expressive monologue, I wanted to wave my hand and ask, “Hey, remember me?”)

Hope these help in your next job interview.

10 ways to protect yourself when you leave a job

Employers aren’t the only ones who have to look after security when an employee leaves. If that departing employee is you, make sure you pay attention to threats to your personal privacy and security.



In 10 important categories of employment transition security, I discussed several areas where a business should spend some time considering, developing, and implementing security measures related to employment transitions. During the transition period — from just before an employee leaves to a few months afterward — the organization’s IT resources may be especially vulnerable.

But matters of IT security are not entirely one-sided. When you leave a job, you have similar concerns. Here’s a simple list of 10 ways to help safeguard your privacy if you leave an employer for any reason. It includes some common sense advice that may seem obvious. But it’s tempting to ignore such advice for the sake of convenience. Having it spelled out in a list may help remind you of the importance of these protective measures.

Note: This article is based on the IT Security blog post 10 tips for personal security when you leave an employer. It’s also available as a PDF download.

1: Don’t violate company policies
I’m not a fan of arbitrary rules and overly restrictive behavioral policies, but that doesn’t mean you should violate rules set by the employer and your immediate supervisor whenever you feel like it. Not only can this cause problems for the employer and put your job at risk, it can also give the employer more reason to invade your privacy where the law and corporate policy allow.

Remember that the more you violate company policy, the more scrutiny you’re likely to attract if you get fired or laid off — or even if you leave on what looks like good terms from your perspective. Even if they find only some minor hint of policy violations a month after you leave, it could lead to a more in-depth examination of what you left behind. In a worst-case scenario, it could potentially lead to attempts to gain legal access to information about your life outside the workplace.

2: Don’t log instant messages
If you are allowed to use any of the various IM networks at work, it is best to keep any messages unrelated to work from being logged on company resources — such as the computer on your desk. Comments made about frustration in the workplace can come back to haunt you if found lingering on the hard drive, and a laissez-faire policy in good times may turn into a fishing expedition for incriminating statements you may have made when your name comes up in the list of people to lay off. If anything suggesting misbehavior on your part comes to light, it may lead to further investigations that pry into your private communications even more. It’s best to avoid leaving tracks, even if they seem innocent now, because of how they may be interpreted under other circumstances.

3: Use encryption for private communications
If company policy allows for private communications from the company network, it may be a good idea to encrypt everything so that potentially embarrassing private e-mails and IMs will not be logged by network traffic monitoring systems. Otherwise, the content of those communications may end up on some hard drive you have no control over, archived in perpetuity. Even if you have an IT department role that allows you access to the logging servers, it’s best to minimize the number of places that such information gets stored in plain text.

4: Don’t trust everything to encryption
While encryption tools are a great resource for protecting privacy, they are not a silver bullet. It is always possible that encrypted communications may later be decrypted, whether because the encryption scheme is cracked at some future point or because you don’t have a chance to clear your encryption keys from your workstation before being escorted out of the building, allowing someone cleaning up in your wake to possibly crack your pass phrase and use the keys to decrypt your data.

5: Don’t bring your private encryption keys to work
Using public key encryption schemes, such as any of the several options for OpenPGP, is a good idea and can help ensure greater privacy in your life. You may be tempted by convenience to simply copy your encryption keys from home to your work computer, but that’s a bad idea, mostly because of the previous point. Instead, you should generate a new key set at work if you want to use OpenPGP there and ensure that anyone who communicates with you via that set of keys knows that it is more subject to compromise than your more private “home” keys.

If you leave your employer, or have reason to believe the key set has been compromised (many employers still install keyloggers on company desktop computers to monitor employee behavior, after all), inform everyone who uses the public key for that set of keys to communicate with you privately that you are invalidating the key set. If you have uploaded the public key to a keyserver, you should invalidate the key on the keyserver as well.

6: Protect your private IM and e-mail passwords
It is generally best to avoid using the same IM accounts at work that you use at home, since instant messaging networks often do not encrypt login transactions between the client and the server. Just as the communications themselves may be intercepted by network traffic monitoring software, including tcpdump, so too can your user IDs and passwords for your IM accounts be intercepted — sometimes even if the messages themselves are encrypted by some third-party plug-in.

The same can be true of e-mails, if your -email logins are not encrypted. If you employ standard UNIX mail user agents, tools such as getmail and sSMTP can help you ensure those logins are protected — as well as the rest of the session. It is possible to use complete session encryption with Gmail, too, and GUI mail clients usually provide some mechanism for ensuring logins at least are encrypted if the server supports it. When such options are not available, though, it is best to avoid using an e-mail account you use elsewhere, just as it is with IM accounts.

7: Don’t store browser history or Web site passwords not directly related to work
To the extent possible, you should ensure that you leave no tracks when browsing the Web. Many browsers, such as Firefox 3, provide a built-in password manager you can use to automate the process of entering passwords for the plethora of Web sites you may visit regularly. Some of you may not be aware that many of them — again, like Firefox 3 — can allow you to recover those passwords in plain text if you forget them and need to remind yourself what passwords you have used. This may allow a former employer to do the same thing after you are no longer in the office. Browser history can be likewise problematic, allowing a glimpse further into your private habits than you may like or even serving to heighten suspicion and motivate more investigation and prying into your private life, similar to the potential effects of inferences drawn from IM logs.

8: Use encrypted proxies for private browsing
Just as you can encrypt IMs and e-mails to protect your privacy, you can also protect Web browsing from local eavesdropping at work. You can use OpenSSH as a secure Web proxy, for instance, so that all that is seen on the local network when you fire up your browser is encrypted traffic sent to a computer at your home. The advisability of this may be open to question, however, as any encrypted proxy traffic may appear suspicious to watchful net admins, and you may have to explain why you have near-constant encrypted traffic streaming to some offsite computer outside of your normal duties at work.

9: Don’t store the sole copy of anything important at work
Employers often escort employees out of the building when employment is terminated for any reason, without giving them the opportunity to recover anything from company computers. Sometimes, you may get invited to speak to a specific contact in the IT department, and have him or her recover any files you need, but that process can be long and annoying. And since it isn’t their data, it may be prone to being lost somewhere along the way. Perhaps worse, any such files are likely to be scrutinized before being turned over to you, to ensure that they do not contain company secrets or otherwise present a risk to the business or its resources. It is better to ensure that anything you don’t want to lose, but need to have available at work, is not stored only on a work computer.

10: Never give your employer reason to distrust you
Show the highest levels of integrity, even if you are angry with your employer over some deceptive behavior or other breach of trust by the employer. Do not sink to your employer’s level. Don’t skimp on reporting what you use, don’t try to arrange surplus supplies and other resources for yourself — don’t try to get away with anything at all that might impugn your character in the eyes of the employer or any third party to which the employer may present evidence of your “misdeeds.”

Even if you trust the chain of management all the way to the highest levels, in an uncertain economy it may be possible that business resources will fall to creditors, and your personal security may then be at risk. This risk can only be compounded if any evidence of your behavior can be construed by someone looking for excuses to pry into your life as justification for such an investigation. Always take pains to protect the company’s security as well as your own and avoid conflicts of interest or the appearance of impropriety, to the extent reasonably possible. In times of economic desperation, in an increasingly litigious world, good intentions are often not enough to protect you.

Security across the board

Always remember that in many ways, your employer’s security is also your own security, and security measures employed by someone else for his or her own benefit may prove beneficial to you, too. When it comes to security, we’re all in this together. Don’t let disputes over employment transition distract you from that fact.

ITWORLD
If you have any question then you put your question as comments.

Put your suggestions as comments