(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-78946278-1', 'auto'); ga('send', 'pageview');
407-478-6600    Get SUPPORT

TaylorWorks Blog

TaylorWorks has been serving the Longwood area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Personalities are Key to Successful Networking

Personalities are Key to Successful Networking

Almost everyone has, at one time, worked with someone with whom their personality clashed, whether they did not get along or just didn’t work effectively together. While this is a perfectly natural phenomenon of both nature and nurturing, it is best to put personal differences aside when forming a professional relationship with a coworker.

This was the focus of Networking Like a Pro, a publication by Dr. Ivan Misner and Brian Hilliard. In it, they explore how personalities come into play in the workplace, and how each person’s behaviors influence their interpersonal relationships. While most people display the traits of many personality types, the book makes the assertion that all people fall into four predominant personality types, especially where business is involved. Business networking is strongly influenced by how well your behavioral type meshes with another’s.

So, does this mean that you just won’t be able to network with some people, and with others it will be effortless? Not so.

Misner and Hilliard offer advice on how to best interact with these behavioral types by understanding what really makes them tick. These types are as follows: Go-Getters, Nurturers, Examiners, and Promoters.

When dealing with a Go-Getter, you have to think--and move--fast. The Go-Getter is determined to get the results they are looking for ASAP, and if the rules need to be bent in order to get them, so be it.

To communicate with a Go-Getter, you need to make the value that you offer them clearly relevant and essential to their goals. More specifically, you need to make them see how you can help speed up their operations without sacrificing the results they strive for. The Go-Getter will also want to hear that they have options to choose from, but would rather hear a pitch than they would a heavily-planned-out script. With a Go-Getter, stick to the highlights, and deliver on your promises.

Where a Go-Getter has more of a “now, if not sooner” attitude, a Nurturer sees the value in taking their time where business matters are concerned, operating with patience. Nurturers are also natural team players, surrounding themselves with supportive allies and willing to offer assistance wherever it is needed. They can be overly tolerant, however, willing to endure a less-than-ideal situation than ready to take a risk to change it.

Honesty is the best policy when working with a Nurturer. To work with them, you will first need to build their trust. You can help this process along by gently guiding them toward a mutually beneficial solution. To accomplish this, you also need to maintain contact with the Nurturer, regularly providing evidence as to how a business relationship with you can provide simplicity and support.

A born skeptic, an Examiner will thoroughly examine and evaluate everything that they may work with--including the people. They will unsurprisingly be predisposed to perfectionism, and at the very least, are very thorough. The Examiner is a strong conversationalist, as they use their stores of knowledge and information to their advantage. Efficiency is also a virtue to the Examiner, and so they will move on once their objective has been met, whether that is to the next assignment or to the next event.

As you build a connection with an Examiner, you need to be concise and clear about your position and why it is worth their time to be involved. Lean on facts and evidence to make your point, and only use small talk and stories if they add to the evidence that you are a dependable provider. You need to be sure that you put your best foot forward when interacting with an Examiner, as they will be forming a very strong opinion of you from the get-go.

A Promoter is a salesman, usually an extrovert, and a thought leader. They have the drive to spread any good idea they find, more often identifying them instinctively than through research-based evidence. Promoters often attend industry events to network and socialize. They are usually juggling many different projects, and are rarely confrontational.

Communicating with a Promoter requires you to match their speed and align your needs with their priorities. One such priority is their professional image, so you need to make sure that your offer increases their visibility in the industry. As you deal with a Promoter, make sure that you document the finer details of your agreements in writing, and you fulfil your end of the bargain promptly and professionally. Furthermore, you should always give a Promoter plenty of help whenever it is required to prove that you are the best choice for their needs.

These strategies should enable you to network more directly, with the end result being more business relationships that provide mutual benefit. Which of these personality types do you think you most embody? Tell us in the comments!

ALERT: Meltdown/Spectre Hardware Vulnerability Req...
Fiber-Optics Creating Lets Business Move Faster


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 16 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Tip of the Week Security Cloud Managed IT Services Best Practices Privacy Network Security Business Computing Hackers Technology Email VoIP Microsoft Outsourced IT Backup Business Continuity Data Backup Software Malware Saving Money Mobile Devices Google IT Support Hosted Solutions Small Business Disaster Recovery Android Smartphones Hardware Data How To Efficiency Cybersecurity Business Data Recovery Two-factor Authentication Chrome Law Enforcement User Tips Communications Managed IT Services Ransomware Avoiding Downtime Communication Cloud Computing Managed IT Computers Proactive IT Telephone Systems Spam Mobile Device Management Windows 10 Phishing Mobility Windows Gadgets Cybercrime Router Innovation App Internet Compliance Collaboration Alert BDR BYOD IT Services Social Engineering Bring Your Own Device Business Management Data Storage Internet of Things Flexibility Information Technology Business Intelligence Smartphone OneNote Apps Network Data Breach Work/Life Balance Budget IT Management Spam Blocking Browser Employer-Employee Relationship Operating System Value Bandwidth Social Media Virtualization Unsupported Software Identity Theft Workers Server Word Wi-Fi Vulnerability Solid State Drive Credit Cards Computer Business Owner Passwords Holiday Firewall Money Data Security Productivity Redundancy Artificial Intelligence Office 365 Save Money Remote Monitoring Software as a Service Cast Outlook FENG Black Market Comparison Hacking Leadership Online Shopping HaaS Hard Drives Telephony Netflix Unified Threat Management Government Google Drive Keyboard Facebook Frequently Asked Questions Battery Specifications Evernote Skype Settings Remote Computing Update Patch Management Excel Education Millennials webinar Wireless Charging Start Menu Computing Infrastructure Computer Care Data Warehousing Workforce Productivity Scam Tip of the week The Internet of Things Applications Conferencing Fiber-Optic Mobile Samsung Google Docs Telecommuting Windows Server 2008 Downtime IT Support Cables Professional Services End of Support Users IT Plan Voice over Internet Protocol Remote Work Office Tips Windows 7 Health Upgrade Root Cause Analysis Virtual Reality Unified Communications Tools Wireless Windows 10s Multi-Factor Security Networking Regulations Windows 10 Meetings Worker Commute Theft Software Tips SaaS Trending Current Events Servers Google Apps Cortana Botnet Private Cloud Physical Security Wireless Technology Audit Recovery Lifestyle Document Management Knowledge Fraud Flash Marketing Emails Infrastructure Mobile Device Travel Public Cloud Hacker Data loss Microsoft Office Content Filtering Mobile Computing Save Time Network Congestion Amazon Risk Management Technology Tips Charger Screen Mirroring HBO Website Computer Fan Data Protection IT Consultant Amazon Web Services Sync Politics IT solutions Office PDF Mobile Office Quick Tips Domains Public Computer HIPAA Video Games Relocation Emergency Public Speaking Automobile Employer Employee Relationship Colocation Humor Cleaning Lithium-ion battery Experience Augmented Reality Data Management Computer Accessories Tech Support Scalability WiFi Safety Music CrashOverride Hiring/Firing Bluetooth Internet Exlporer Wearable Technology Competition Automation Fun Transportation Big Data Content Miscellaneous USB Workplace Tips Benefits Audiobook Worker Internet exploMicrosoft Troubleshooting Instant Messaging Loyalty Search Smart Technology Files Entertainment Legal Rootkit Advertising Hosted Solution Presentation How to Password History Best Practice Training 5G Techology Managed Service Provider Two Factor Authentication IBM Vendor Management Shadow IT Assessment User Error Customer Relationship Management Webinar Password Manager Hybrid Cloud IP Address Books Television Electronic Medical Records Customer Service

      Mobile? Grab this Article!

      QR-Code dieser Seite