Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Identifying Personality Types will Help Your Networking Efforts

Identifying Personality Types will Help Your Networking Efforts

One experience that almost everyone has been involved in is the clashing of personalities. This is only natural, as different people are born with different predispositions and are raised in differing environments. However, in the business world, one should do their best to keep personal differences from affecting the professional relationships they form.

In their recent publication Networking Like a Pro, Dr. Ivan Misner and Brian Hilliard explore the effect that a person’s innate behavioral style has on how they act as they rub elbows with other professionals. While these behaviors are present to some degree in everyone, the book posits that one or two of them make up the lion’s share of each individual’s behavior. How well you network, or generally interact, with someone is based on how well each of your behavioral types meshes with the other.

Does that mean that there are just some people who you will not be able to network with successfully? Not exactly.

Misner and Hilliard offer a cheat sheet, of sorts, to inform how to interact and cooperate with the four behavioral types: Go-Getters, Promoters, Examiners and Nurturers.

Go-Getters
There is a definite need for speed when dealing with a Go-Getter. The Go-Getter wants to see results now, if not sooner, and have no problem with bending the rules a little in order to achieve their goal.

In order to effectively communicate with a Go-Getter, they need to see the value that you offer as being relevant to their goals. In other words, they need to grasp how you can make business move faster for them while still delivering the results that they demand. Go-Getters will also want options, but won’t respond well to a planned-out script in lieu of a pitch. A Go-Getter wants to hear the highlights, and most importantly, needs to see that you deliver results as promised.

Promoters
A Promoter is someone who is always ready and willing to find a good idea and spread it, often based more on their gut feeling than on knowledge acquired through research. A true people-person, a Promoter will often attend industry events to meet new people and socialize. They tend to be non-confrontational, and will often have many different plans in the works at once.

In order to communicate with a Promoter, you need to match their tempo and focus on their priorities. Since a Promoter is often concerned with their image, you should demonstrate how your offer could boost their recognition in their industry. When making a deal with a Promoter, make sure that the small details and minutiae are all in writing, and that you quickly provide them with plenty of assistance to confirm that they made the best choice.

Examiners
An Examiner is a born skeptic, and will do everything they can to evaluate the person they are considering working with. They are very thorough, and will often be a perfectionist. Unsurprisingly, an Examiner is fond of information, and can use their knowledge to carry on conversations quite well. They also value efficiency, so they will not hesitate to leave an event once their goal has been reached.

When networking with an Examiner, concision is key, as is support for your position. You will want get straight to the point, providing facts and evidence that establish you as the best choice for their business needs. Small talk should only be used as supplementary evidence of your service quality and dependability. In a way, it is essential that you prove yourself to an Examiner, so make sure you put your best foot forward.

Nurturer
In contrast to the high-velocity approach of a Go-Getter, a Nurturer appreciates a slow-and-steady manner to doing business, and in addition to their patience, are often willing helpers. Highly approachable, a Nurturer surrounds themselves with others who are willing to support one another. They are predisposed to be team players. However, they also have a tendency to tolerate an unpleasant situation over taking a risk to change it.

To work with a Nurturer, it is best to simply be honest as you interact with them. They will need some time in order to really trust you, which you can encourage by occasionally nudging them toward the conclusion you want them to come to. Relatedly, it is important to stay in touch with a Nurturer throughout the process, providing evidence of how your solution will help simplify their business and offer them support.

With these strategies, you should be able to network more effectively and form mutually beneficial business relationships.

Which personality type do you think you present? Let us know in the comments!

Is Your Cybersecurity Prepared for 2018?
Tip of the Week: Is OneNote, or Evernote, Right fo...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, November 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Keyboard Shortcuts Computing Management User Tips Books Benefits Data Theft Automation CrashOverride Automobile Outsourced IT Legislation Reputation Advertising Identity Theft Hardware Wireless Colocation Google Maps Content Filtering Analysis Save Time App store Politics Facebook Congratulations Maintenance Internet of Things Mobile Device Management Project Management Operating System Shadow IT Ciminal Augmented Reality Shortcut Wasting Money IoT Printing Charger Co-Managed Services Data storage Websites Small Business Saving Money Streaming Media Hosted Solutions Internet Private Cloud Hosted Solution Windows 10 Virtual Assistant Comparison Hard Drives Files iPhone PDF Black Market Google Drive NFL Audit Memory Data Loss Television Cleaning Productivity Budget HaaS IT Support Monitors How To Antivirus WIndows Server 2008 Data Storage Ransomware File Sharing Touchscreen Law Enforcement Upgrade hacker Proactive Best Practices Users Hiring/Firing Administration Outlook Computer Fan Spam Safety IT Support Nanotechnology Display Apps Marketing FAQ Government BYOD Personal Information Managed Service Provider BDR Employee-Employer Relationship Upgrades Bandwidth Credit Cards Screen Mirroring Sales SaaS Smartphone Instant Messaging Passwords Work/Life Balance Emails Electronic Medical Records Video Games Value Thank You Retail Accessory Networking Telephone Admin Physical Security Word Transportation Business How to Wireless Technology Disaster Recovery IT Services Wireless Charging Hacking Virus Touchpad Saving Time Network Data Privacy Social Engineering Password Gadgets Bring Your Own Device Vulnerability Compliance Computer Accessories Content Access Control Emergency Artificial Intelligence Software as a Service Financial PowerPoint Printers Remote Computing Spyware Wireless Internet Humor Mobile Devices Managed IT Services Router Productivity Devices Monitor Firewall Managing Stress intranet App IT solutions Windows Ink The Internet of Things iOS Microsoft Word VoIP Smart Tech Managed IT Service Update Laptop Backup Wi-Fi Vendor Management Hyperlink Wasting Time Education Cloud Computing Privacy Experience Data Management Peripheral Hard Drive Licensing Flexibility WannaCry Gmail Specifications Virtualization Downtime OneNote Unsupported Software Collaboration eWaste Apple Amazon Data Breach Adobe Twitter Security Updates Worker IT Solutions Conferencing Financial Technology Managed Service Professional Services Software Data Protection Search Business Technology Computing Infrastructure Hybrid Cloud Computer Care Audiobook Keyboard Windows 7 Public Cloud Unified Communications Worker Commute VPN Samsung Risk Management Vendor Device Security Browser Tablets Two-factor Authentication Office Travel Server Testing Encryption Information Computer Forensics Computers Chromebook Techology Cybersecurity Utility Computing Tech Support Hackers Public Computer Android Alert Workers WPA3 Google Identities Storage Spam Blocking Cast Chromecast Proactive IT Windows 10s Cache Mobile Device Application Content Filter Sports Employer Employee Relationship Health Microsoft Excel Email Fraud Camera Going Green End of Support Hard Disk Drive Microsoft User Error Applications Evernote History Edge Settings Tech Term Miscellaneous Google Docs Internet Exlporer Bluetooth Innovation Technology Battery Communications Chrome Recovery Holiday Internet exploMicrosoft Telephone Systems Money Robot Communication Efficiency Dark Web Data Security Gifts Social Media Big Data USB Information Technology Customer Employer-Employee Relationship Rootkit Relocation Monitoring Windows 10 Smart Technology Blockchain Quick Tips Virtual Reality HBO Network Security Language Troubleshooting Connectivity Solid State Drive Loyalty Computer Sync Data Recovery Webinar Tip of the Week Managed IT Managed IT Services Students Phishing Cost Management HIPAA Remote Monitoring Cortana Business Owner Office 365 Root Cause Analysis Save Money Mobile Security Scalability Phone System Commerce Alexa for Business Avoiding Downtime Data Smartphones Google Assistant Cybercrime Mobility Projects Document Management MSP Entertainment Redundancy Assessment Business Continuity Excel Cloud Unified Threat Management File Storage Mobile Business Computing Malware Microsoft Office Consultant Meetings Identity Regulation Business Intelligence Windows Lifestyle Scam Best Practice Gamification Office Tips Business Management IT Management IT budget Data Backup Legal WiFi Workplace Tips Company Culture Training Patch Management Two Factor Authentication