Attract Recruiters' Attention with Seven Personal Branding Trends - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Attract Recruiters' Attention with Seven Personal Branding Trends-4 Next

Do you have a QR code?

QR codes are taking off in all kinds of ways that weren’t originally anticipated. For example, according to, it’s now possible to place extremely large QR codes on the tops of buildings that will be photographed by the satellites that feed Google Maps. The QR code will cause a logo of that company to appear when someone looks at their building’s images on Google. Putting a giant QR code on the top of your house may not be the best way to land a job. But you do have the opportunity to use QR codes to point those who are evaluating you to your websites, blogs and other relevant career marketing content. Arruda has seen QR codes on the top of resumes, on business cards and on networking name-badges. allows you to customize what people see when they click on your QR code and change it often, so you can direct hiring managers to the perfect presentation of your capabilities.

What does this mean for you?

You have a great opportunity to direct recruiters to the content you want them to see. If one of your brand attributes is 'innovative,' think about how you can use QR codes to tell others what you want them to know about you. If you’re a more seasoned professional and want to demonstrate that you’re innovative and on top of the latest trends, using QR codes on your resume and business card is like digital Botox. It will demonstrate that you are connected to what’s happening.

William Arruda, founder of Reach Personal Branding and author of "Career Distinction" and the upcoming book, "Ditch. Dare. Do!,"  has been in the business of helping people build their brands for a decade and each year, he publishes his personal branding trends for job seekers. Take a look at this year’s trends, posted on TheLadders, and decide which will help give you an edge and attract the attention of recruiters and hiring managers.

More Slideshows:

Five Defensive Actions to Take Before Your Mobile Device Is Stolen Don't get caught unprepared. Protect your mobile data now.

Five Business Process Management Pitfalls to Avoid Five BPM threats BPI (business process improvement) leaders need to be mindful of as organizations progress on their BPM initiatives.

Mobility Today: Balancing the Benefits and Risks of Mobile Adoption IT is striking a balance between mobile benefits and risks by transforming its approach to mobility.


Related Topics :, Seagate, Security

More Slideshows

Security113-290x195 6 Types of Insiders that Could Be Working for You

The insider threat is not really a cybersecurity problem or a data analytics issue; it's a human risk problem that can only be solved by understanding how people think and behave. ...  More >>

LastPassPasswords0x Are You One Password Away from a Data Breach?

To help improve overall cybersecurity practices, the first line of defense is often an educated user with strong password practices. ...  More >>

security43 Protecting Corporate Identities Through Password Management

One of the best ways to keep corporate identities safe is to practice proper password management. From an IT perspective, this entails determining the types of passwords that are acceptable and where they are housed on the company's systems. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.