Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Identifying Personality Types will Help Your Networking Efforts

Identifying Personality Types will Help Your Networking Efforts

One experience that almost everyone has been involved in is the clashing of personalities. This is only natural, as different people are born with different predispositions and are raised in differing environments. However, in the business world, one should do their best to keep personal differences from affecting the professional relationships they form.

In their recent publication Networking Like a Pro, Dr. Ivan Misner and Brian Hilliard explore the effect that a person’s innate behavioral style has on how they act as they rub elbows with other professionals. While these behaviors are present to some degree in everyone, the book posits that one or two of them make up the lion’s share of each individual’s behavior. How well you network, or generally interact, with someone is based on how well each of your behavioral types meshes with the other.

Does that mean that there are just some people who you will not be able to network with successfully? Not exactly.

Misner and Hilliard offer a cheat sheet, of sorts, to inform how to interact and cooperate with the four behavioral types: Go-Getters, Promoters, Examiners and Nurturers.

Go-Getters
There is a definite need for speed when dealing with a Go-Getter. The Go-Getter wants to see results now, if not sooner, and have no problem with bending the rules a little in order to achieve their goal.

In order to effectively communicate with a Go-Getter, they need to see the value that you offer as being relevant to their goals. In other words, they need to grasp how you can make business move faster for them while still delivering the results that they demand. Go-Getters will also want options, but won’t respond well to a planned-out script in lieu of a pitch. A Go-Getter wants to hear the highlights, and most importantly, needs to see that you deliver results as promised.

Promoters
A Promoter is someone who is always ready and willing to find a good idea and spread it, often based more on their gut feeling than on knowledge acquired through research. A true people-person, a Promoter will often attend industry events to meet new people and socialize. They tend to be non-confrontational, and will often have many different plans in the works at once.

In order to communicate with a Promoter, you need to match their tempo and focus on their priorities. Since a Promoter is often concerned with their image, you should demonstrate how your offer could boost their recognition in their industry. When making a deal with a Promoter, make sure that the small details and minutiae are all in writing, and that you quickly provide them with plenty of assistance to confirm that they made the best choice.

Examiners
An Examiner is a born skeptic, and will do everything they can to evaluate the person they are considering working with. They are very thorough, and will often be a perfectionist. Unsurprisingly, an Examiner is fond of information, and can use their knowledge to carry on conversations quite well. They also value efficiency, so they will not hesitate to leave an event once their goal has been reached.

When networking with an Examiner, concision is key, as is support for your position. You will want get straight to the point, providing facts and evidence that establish you as the best choice for their business needs. Small talk should only be used as supplementary evidence of your service quality and dependability. In a way, it is essential that you prove yourself to an Examiner, so make sure you put your best foot forward.

Nurturer
In contrast to the high-velocity approach of a Go-Getter, a Nurturer appreciates a slow-and-steady manner to doing business, and in addition to their patience, are often willing helpers. Highly approachable, a Nurturer surrounds themselves with others who are willing to support one another. They are predisposed to be team players. However, they also have a tendency to tolerate an unpleasant situation over taking a risk to change it.

To work with a Nurturer, it is best to simply be honest as you interact with them. They will need some time in order to really trust you, which you can encourage by occasionally nudging them toward the conclusion you want them to come to. Relatedly, it is important to stay in touch with a Nurturer throughout the process, providing evidence of how your solution will help simplify their business and offer them support.

With these strategies, you should be able to network more effectively and form mutually beneficial business relationships.

Which personality type do you think you present? Let us know in the comments!

Is Your Cybersecurity Prepared for 2018?
Tip of the Week: Is OneNote, or Evernote, Right fo...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 22 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

History Chrome Hybrid Cloud Going Green Data storage Consultant Patch Management Education Application Legal Cortana Tip of the Week Relocation Shortcut Business Intelligence How to Transportation Language Update Google Maps Communications Computer Care Cleaning Advertising Microsoft Shadow IT Phishing Google Managed IT Services Data Breach Google Assistant Politics Blockchain Project Management Budget Storage Spam Cloud WannaCry Router Touchscreen hacker Meetings Colocation Computing Collaboration Edge Commerce Safety Proactive Emergency Unified Threat Management Search Proactive IT Data Recovery App Black Market Downtime Privacy Specifications USB Android Entertainment intranet Automobile Smartphone Backup Scam Server Hard Drive Maintenance Encryption IT Support Physical Security Augmented Reality PDF Two Factor Authentication Windows 10s Mobile Device Hard Drives Password Lifestyle Cast VoIP Windows 10 Mobile Security Worker Electronic Medical Records Remote Computing Hosted Solutions iPhone Chromebook Apple Data Storage Productivity Networking Efficiency Remote Monitoring Mobile Software as a Service How To Office 365 Save Time IT budget Hiring/Firing WiFi Evernote Sales Users Document Management Computer Fan Employer Employee Relationship Firewall Google Docs The Internet of Things Miscellaneous Virus Two-factor Authentication Adobe Credit Cards Cost Management eWaste Ransomware Communication Wireless Security Computing Infrastructure Troubleshooting Workplace Tips Microsoft Word Redundancy Ciminal Public Computer Malware Techology Conferencing Best Practice Internet Exlporer Websites Software OneNote Holiday Touchpad Mobility Monitor Health Innovation Data Security Files Disaster Recovery Sync Administration Public Cloud Managed IT Services HaaS Information Technology Computers Alert Phone System Chromecast HIPAA Connectivity Keyboard Battery Comparison Vulnerability User Error Operating System Screen Mirroring Small Business Audit Virtualization Business Management Monitoring Content Filtering Business Owner Quick Tips Law Enforcement Passwords Data Management Internet exploMicrosoft Mobile Devices Travel Wireless Technology Samsung Save Money Streaming Media Training Office Tips Webinar Upgrade Value Google Drive Laptop Compliance Hard Disk Drive Fraud Solid State Drive Workers Content Managed Service Provider Bluetooth Windows Ink Robot Best Practices Wireless Charging Computer Accessories Hosted Solution Excel Cloud Computing Customer IT Support Office Gadgets Nanotechnology Employer-Employee Relationship IoT Charger Video Games Bandwidth Financial Technology Cache Management Business Continuity Vendor Management Smart Tech FAQ Wi-Fi Identities Money SaaS Spyware Flexibility Upgrades IT Management Risk Management Professional Services Cybersecurity Artificial Intelligence Windows VPN Recovery App store Legislation Updates Worker Commute Humor Network Smartphones Microsoft Excel BDR Retail Telephone Systems Computer Hacking Personal Information Mobile Device Management Windows 10 Government Device Security Business Thank You Tech Support Gifts Antivirus Spam Blocking Printing Identity Theft Instant Messaging Technology Unsupported Software Rootkit Scalability Email Cybercrime Books iOS Data NFL Gmail Virtual Reality Experience Loyalty Browser Facebook Microsoft Office Assessment Avoiding Downtime Outsourced IT End of Support Marketing Applications Audiobook Outlook Data Theft Data Loss Social Engineering IT solutions Reputation Smart Technology Internet Regulation HBO Private Cloud Productivity Benefits Tablets Social Media Business Computing Word Data Protection Television Sports Congratulations Managed IT User Tips Tech Term Internet of Things Twitter Identity Work/Life Balance File Sharing Emails IT Services Bring Your Own Device Dark Web Monitors Hardware MSP BYOD WIndows Server 2008 Data Privacy IT Solutions Licensing Network Security Devices Managed IT Service CrashOverride Content Filter Saving Money Data Backup Root Cause Analysis Big Data Computer Forensics Analysis Hackers Apps Settings Automation