window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Personalities are Key to Successful Networking

Personalities are Key to Successful Networking

Almost everyone has, at one time, worked with someone with whom their personality clashed, whether they did not get along or just didn’t work effectively together. While this is a perfectly natural phenomenon of both nature and nurturing, it is best to put personal differences aside when forming a professional relationship with a coworker.

This was the focus of Networking Like a Pro, a publication by Dr. Ivan Misner and Brian Hilliard. In it, they explore how personalities come into play in the workplace, and how each person’s behaviors influence their interpersonal relationships. While most people display the traits of many personality types, the book makes the assertion that all people fall into four predominant personality types, especially where business is involved. Business networking is strongly influenced by how well your behavioral type meshes with another’s.

So, does this mean that you just won’t be able to network with some people, and with others it will be effortless? Not so.

Misner and Hilliard offer advice on how to best interact with these behavioral types by understanding what really makes them tick. These types are as follows: Go-Getters, Nurturers, Examiners, and Promoters.

Go-Getters
When dealing with a Go-Getter, you have to think--and move--fast. The Go-Getter is determined to get the results they are looking for ASAP, and if the rules need to be bent in order to get them, so be it.

To communicate with a Go-Getter, you need to make the value that you offer them clearly relevant and essential to their goals. More specifically, you need to make them see how you can help speed up their operations without sacrificing the results they strive for. The Go-Getter will also want to hear that they have options to choose from, but would rather hear a pitch than they would a heavily-planned-out script. With a Go-Getter, stick to the highlights, and deliver on your promises.

Nurturers
Where a Go-Getter has more of a “now, if not sooner” attitude, a Nurturer sees the value in taking their time where business matters are concerned, operating with patience. Nurturers are also natural team players, surrounding themselves with supportive allies and willing to offer assistance wherever it is needed. They can be overly tolerant, however, willing to endure a less-than-ideal situation than ready to take a risk to change it.

Honesty is the best policy when working with a Nurturer. To work with them, you will first need to build their trust. You can help this process along by gently guiding them toward a mutually beneficial solution. To accomplish this, you also need to maintain contact with the Nurturer, regularly providing evidence as to how a business relationship with you can provide simplicity and support.

Examiners
A born skeptic, an Examiner will thoroughly examine and evaluate everything that they may work with--including the people. They will unsurprisingly be predisposed to perfectionism, and at the very least, are very thorough. The Examiner is a strong conversationalist, as they use their stores of knowledge and information to their advantage. Efficiency is also a virtue to the Examiner, and so they will move on once their objective has been met, whether that is to the next assignment or to the next event.

As you build a connection with an Examiner, you need to be concise and clear about your position and why it is worth their time to be involved. Lean on facts and evidence to make your point, and only use small talk and stories if they add to the evidence that you are a dependable provider. You need to be sure that you put your best foot forward when interacting with an Examiner, as they will be forming a very strong opinion of you from the get-go.

Promoters
A Promoter is a salesman, usually an extrovert, and a thought leader. They have the drive to spread any good idea they find, more often identifying them instinctively than through research-based evidence. Promoters often attend industry events to network and socialize. They are usually juggling many different projects, and are rarely confrontational.

Communicating with a Promoter requires you to match their speed and align your needs with their priorities. One such priority is their professional image, so you need to make sure that your offer increases their visibility in the industry. As you deal with a Promoter, make sure that you document the finer details of your agreements in writing, and you fulfil your end of the bargain promptly and professionally. Furthermore, you should always give a Promoter plenty of help whenever it is required to prove that you are the best choice for their needs.

These strategies should enable you to network more directly, with the end result being more business relationships that provide mutual benefit. Which of these personality types do you think you most embody? Tell us in the comments!

ALERT: Meltdown/Spectre Hardware Vulnerability Req...
Fiber-Optics Creating Lets Business Move Faster
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, September 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Cloud Network Security Best Practices Managed IT Services Privacy Business Computing Hackers Data Backup Email Malware VoIP Hosted Solutions Outsourced IT Data Recovery Mobile Devices Innovation Backup Google Tech Term Microsoft Data Software Saving Money Internet of Things Cloud Computing Business Continuity Internet Cybersecurity Android Efficiency Ransomware IT Services Hardware IT Support BDR Small Business Disaster Recovery Artificial Intelligence Communications User Tips Smartphones Applications Communication Cybercrime Law Enforcement Managed IT Router Gadgets Managed IT Services Business How To Network IT Support Save Money Business Intelligence BYOD Computers Browser Business Management Data Security Windows 10 Avoiding Downtime Phishing Mobile Device Management Data Protection Chrome Virtualization Two-factor Authentication Smartphone Collaboration Windows Productivity Money Apps Word Alert Firewall Productivity Blockchain Workplace Tips Proactive IT Bandwidth Analysis Social Engineering Office 365 Social Media IT Management Vulnerability Redundancy Spam App Telephone Systems Remote Monitoring Training Facebook Mobility Connectivity Document Management Computer Passwords Compliance Identity Theft Automation Budget Update Paperless Office Value Operating System Microsoft Office Servers Credit Cards Access Control Smart Tech Virtual Assistant Big Data Website Unified Threat Management Miscellaneous Networking Data loss Infrastructure Workers Mobile Computing VPN Upgrade Employer-Employee Relationship Business Owner Settings Holiday Education OneNote Bring Your Own Device Solid State Drive IT Plan Flexibility Information Technology CES Sports Password Wi-Fi Windows 7 File Sharing Information Mobile Device Comparison Private Cloud Data Breach Server Work/Life Balance Unsupported Software Encryption Machine Learning Managed Service Data Storage Content Management Spam Blocking Gmail Addiction Charger Risk Management Frequently Asked Questions Specifications IoT Password Management Business Technology Public Cloud Downtime Root Cause Analysis Patch Management Thought Leadership Cortana Wiring Marketing Hacker Software Tips Trending Strategy YouTube Computer Fan The Internet of Things Skype Evernote Theft Proactive Electronic Medical Records IT Consultant Recycling Cache Excel Millennials NIST Managed Service Provider Virtual Reality Meetings Scam Botnet Google Apps Streaming Media GDPR Physical Security Lifestyle End of Support Black Market FENG Content Filtering Start Menu Wireless Charging Remote Monitoring and Maintenance Leadership Users Hacking Data Warehousing Human Resources Students Instant Messaging Windows 10s Flash Fraud Authentication Travel eWaste Wireless Internet Health Office Tips Netflix HIPAA Tip of the week Workforce Insurance Cryptocurrency Telephone System PDF Worker Commute Content Filter Technology Tips E-Commerce Legal Entertainment Battery Mobile Line of Business Google Docs Staff Healthcare SaaS HaaS USB Amazon Fiber-Optic Nanotechnology Screen Mirroring Criminal Wire Cleaning Remote Computing Wireless Windows Server 2008 Telecommuting Practices Safe Mode Google Drive Current Events Password Manager Storage HBO Accountants HVAC Windows 10 Professional Services MSP webinar Data Management Voice over Internet Protocol Digital Signature Electronic Health Records Recovery Audit Sync Amazon Web Services Cables Knowledge Cast Software as a Service Computer Care Keyboard Remote Work Hosted Computing Hard Drives Business Mangement Emails Outlook Enterprise Content Management Tools Remote Worker Conferencing Multi-Factor Security Computing Infrastructure Augmented Reality Telephony Online Shopping Unified Communications Devices Network Congestion Save Time Government Smart Office Samsung Wireless Technology Regulations Inventory Humor Webinar Safety IBM Content Internet Exlporer Television User Error Music IT solutions Competition Politics Hybrid Cloud Customer Relationship Management Worker Audiobook IP Address Company Culture Public Computer Hiring/Firing WiFi Loyalty Wearable Technology Video Games Customer Service Transportation Rootkit Quick Tips Mobile Office Managing Stress Fun Internet exploMicrosoft Books Employer Employee Relationship Automobile How to Domains Benefits Files Regulation Office Camera Best Practice Advertising Computer Accessories Colocation Public Speaking Troubleshooting Smart Technology History Scalability Presentation Two Factor Authentication Twitter Relocation Printers Vendor Management Lithium-ion battery Search CrashOverride Emergency Bluetooth Assessment Shadow IT Hosted Solution Tech Support Techology Experience 5G

Mobile? Grab this Article!

QR-Code dieser Seite