(707) 268-8850    Get SUPPORT

Network Management Services Blog

Personalities are Key to Successful Networking

Personalities are Key to Successful Networking

Almost everyone has, at one time, worked with someone with whom their personality clashed, whether they did not get along or just didn’t work effectively together. While this is a perfectly natural phenomenon of both nature and nurturing, it is best to put personal differences aside when forming a professional relationship with a coworker.

This was the focus of Networking Like a Pro, a publication by Dr. Ivan Misner and Brian Hilliard. In it, they explore how personalities come into play in the workplace, and how each person’s behaviors influence their interpersonal relationships. While most people display the traits of many personality types, the book makes the assertion that all people fall into four predominant personality types, especially where business is involved. Business networking is strongly influenced by how well your behavioral type meshes with another’s.

So, does this mean that you just won’t be able to network with some people, and with others it will be effortless? Not so.

Misner and Hilliard offer advice on how to best interact with these behavioral types by understanding what really makes them tick. These types are as follows: Go-Getters, Nurturers, Examiners, and Promoters.

When dealing with a Go-Getter, you have to think--and move--fast. The Go-Getter is determined to get the results they are looking for ASAP, and if the rules need to be bent in order to get them, so be it.

To communicate with a Go-Getter, you need to make the value that you offer them clearly relevant and essential to their goals. More specifically, you need to make them see how you can help speed up their operations without sacrificing the results they strive for. The Go-Getter will also want to hear that they have options to choose from, but would rather hear a pitch than they would a heavily-planned-out script. With a Go-Getter, stick to the highlights, and deliver on your promises.

Where a Go-Getter has more of a “now, if not sooner” attitude, a Nurturer sees the value in taking their time where business matters are concerned, operating with patience. Nurturers are also natural team players, surrounding themselves with supportive allies and willing to offer assistance wherever it is needed. They can be overly tolerant, however, willing to endure a less-than-ideal situation than ready to take a risk to change it.

Honesty is the best policy when working with a Nurturer. To work with them, you will first need to build their trust. You can help this process along by gently guiding them toward a mutually beneficial solution. To accomplish this, you also need to maintain contact with the Nurturer, regularly providing evidence as to how a business relationship with you can provide simplicity and support.

A born skeptic, an Examiner will thoroughly examine and evaluate everything that they may work with--including the people. They will unsurprisingly be predisposed to perfectionism, and at the very least, are very thorough. The Examiner is a strong conversationalist, as they use their stores of knowledge and information to their advantage. Efficiency is also a virtue to the Examiner, and so they will move on once their objective has been met, whether that is to the next assignment or to the next event.

As you build a connection with an Examiner, you need to be concise and clear about your position and why it is worth their time to be involved. Lean on facts and evidence to make your point, and only use small talk and stories if they add to the evidence that you are a dependable provider. You need to be sure that you put your best foot forward when interacting with an Examiner, as they will be forming a very strong opinion of you from the get-go.

A Promoter is a salesman, usually an extrovert, and a thought leader. They have the drive to spread any good idea they find, more often identifying them instinctively than through research-based evidence. Promoters often attend industry events to network and socialize. They are usually juggling many different projects, and are rarely confrontational.

Communicating with a Promoter requires you to match their speed and align your needs with their priorities. One such priority is their professional image, so you need to make sure that your offer increases their visibility in the industry. As you deal with a Promoter, make sure that you document the finer details of your agreements in writing, and you fulfil your end of the bargain promptly and professionally. Furthermore, you should always give a Promoter plenty of help whenever it is required to prove that you are the best choice for their needs.

These strategies should enable you to network more directly, with the end result being more business relationships that provide mutual benefit. Which of these personality types do you think you most embody? Tell us in the comments!

ALERT: Meltdown/Spectre Hardware Vulnerability Req...
Fiber-Optics Creating Lets Business Move Faster


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 16 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Backup Hosted Solutions Mobile Devices VoIP Innovation Email Google Tech Term Data Recovery Data Outsourced IT IT Support Internet of Things Saving Money Cloud Computing Internet Microsoft IT Services Software Communications BDR Hardware Business Continuity Efficiency Ransomware Smartphones Business Cybercrime Communication Small Business Cybersecurity Server User Tips Disaster Recovery Android Artificial Intelligence Managed IT Services Computers Avoiding Downtime Smartphone Save Money Windows Managed IT How To Gadgets Alert Browser Network Router Miscellaneous BYOD Money Social Media Applications Business Intelligence Chrome Phishing Firewall Mobile Device Management Windows 10 Data Security Data Protection Two-factor Authentication Computer Workplace Tips Social Engineering Passwords Law Enforcement Vulnerability Mobility Productivity Collaboration Business Management Upgrade Facebook VPN Compliance Spam Managed Service Provider Redundancy Private Cloud Identity Theft Flexibility Productivity Telephone Systems Blockchain Bandwidth Remote Monitoring Proactive IT Budget Virtualization IT Support Operating System Word Connectivity Office 365 Document Management Servers Sports Data Storage Hacking Virtual Assistant Mobile Computing Spam Blocking Training Workers CES Automation Windows 10 Physical Security Settings Encryption Office Tips Government Wi-Fi Content Management Paperless Office Data Breach Access Control Mobile Device Google Drive Content Filtering Data loss Smart Tech OneNote App Comparison Quick Tips Solid State Drive IT Management Employer-Employee Relationship Windows 7 Public Cloud Credit Cards Apps Holiday Information Value Analysis Password File Sharing Microsoft Office Data storage Business Owner IT Plan Networking Information Technology Bring Your Own Device Update Managed Service Infrastructure Big Data Work/Life Balance Website Unified Threat Management Unsupported Software Criminal Education Emergency Amazon Hosted Computing Legal Risk Management Excel Leadership Workforce Password Manager Recovery Internet exploMicrosoft Root Cause Analysis SaaS Botnet Cables Devices Camera FENG Cleaning Start Menu Netflix Digital Signature Machine Learning Save Time NIST Software Tips Cortana Flash Smart Office Office Patch Management Google Docs Amazon Web Services Inventory Tip of the week Telecommuting Business Mangement Addiction Advertising Meetings Travel IoT HaaS Telephone System Unified Communications Thought Leadership User Error Computer Care Mobile YouTube Cryptocurrency Current Events HIPAA Colocation Windows 10s Relocation Scam Data Warehousing Voice over Internet Protocol Online Shopping Hiring/Firing Health Windows Server 2008 webinar Remote Work Gmail Cache Entertainment Theft Streaming Media Augmented Reality USB Samsung Professional Services Strategy Safe Mode HBO Knowledge Wireless Technology Authentication MSP Computing Infrastructure Charger Sync Emails Students HVAC Humor Multi-Factor Security Evernote Files Conferencing Recycling PDF IBM Wireless Internet Black Market Screen Mirroring Software as a Service Insurance Safety Google Apps The Internet of Things Content Filter Reputation Internet Exlporer CrashOverride Tools Marketing Hacker Data Management Apple Electronic Medical Records Outlook Network Congestion Specifications Wireless Charging Nanotechnology Keyboard Remote Worker Audit Telephony Human Resources Healthcare Enterprise Content Management Trending Regulations eWaste Wire Hybrid Cloud Cast Fraud Practices Frequently Asked Questions IT Consultant Millennials Storage Hosted Solution Customer End of Support Downtime Accountants Business Technology Hard Drives iPhone Fiber-Optic Wiring Monitor History Computer Fan Skype Staff Electronic Health Records Password Management Supercomputer Lifestyle Rootkit Customer Service WiFi Proactive Employer Employee Relationship Twitter Mobile Office Content Domains Scalability Music Best Practice Wireless Politics Remote Monitoring and Maintenance Computer Accessories Shadow IT Audiobook Public Speaking Wearable Technology Printers Two Factor Authentication Line of Business Vendor Management Virtual Reality Presentation Bluetooth Assessment Lithium-ion battery Regulation Company Culture Automobile 5G Tech Support Worker Commute Fun Transportation Books Television Instant Messaging Troubleshooting Managing Stress Video Games Administration Webinar Benefits Worker Customer Relationship Management Battery Public Computer Competition How to Loyalty Techology IP Address Remote Computing Experience IT solutions Users Search Smart Technology