ct logo wslogan

4 minutes reading time (789 words)

Personalities are Key to Successful Networking

Personalities are Key to Successful Networking

Almost everyone has, at one time, worked with someone with whom their personality clashed, whether they did not get along or just didn’t work effectively together. While this is a perfectly natural phenomenon of both nature and nurturing, it is best to put personal differences aside when forming a professional relationship with a coworker.

This was the focus of Networking Like a Pro, a publication by Dr. Ivan Misner and Brian Hilliard. In it, they explore how personalities come into play in the workplace, and how each person’s behaviors influence their interpersonal relationships. While most people display the traits of many personality types, the book makes the assertion that all people fall into four predominant personality types, especially where business is involved. Business networking is strongly influenced by how well your behavioral type meshes with another’s.

So, does this mean that you just won’t be able to network with some people, and with others it will be effortless? Not so.

Misner and Hilliard offer advice on how to best interact with these behavioral types by understanding what really makes them tick. These types are as follows: Go-Getters, Nurturers, Examiners, and Promoters.

When dealing with a Go-Getter, you have to think--and move--fast. The Go-Getter is determined to get the results they are looking for ASAP, and if the rules need to be bent in order to get them, so be it.

To communicate with a Go-Getter, you need to make the value that you offer them clearly relevant and essential to their goals. More specifically, you need to make them see how you can help speed up their operations without sacrificing the results they strive for. The Go-Getter will also want to hear that they have options to choose from, but would rather hear a pitch than they would a heavily-planned-out script. With a Go-Getter, stick to the highlights, and deliver on your promises.

Where a Go-Getter has more of a “now, if not sooner” attitude, a Nurturer sees the value in taking their time where business matters are concerned, operating with patience. Nurturers are also natural team players, surrounding themselves with supportive allies and willing to offer assistance wherever it is needed. They can be overly tolerant, however, willing to endure a less-than-ideal situation than ready to take a risk to change it.

Honesty is the best policy when working with a Nurturer. To work with them, you will first need to build their trust. You can help this process along by gently guiding them toward a mutually beneficial solution. To accomplish this, you also need to maintain contact with the Nurturer, regularly providing evidence as to how a business relationship with you can provide simplicity and support.

A born skeptic, an Examiner will thoroughly examine and evaluate everything that they may work with--including the people. They will unsurprisingly be predisposed to perfectionism, and at the very least, are very thorough. The Examiner is a strong conversationalist, as they use their stores of knowledge and information to their advantage. Efficiency is also a virtue to the Examiner, and so they will move on once their objective has been met, whether that is to the next assignment or to the next event.

As you build a connection with an Examiner, you need to be concise and clear about your position and why it is worth their time to be involved. Lean on facts and evidence to make your point, and only use small talk and stories if they add to the evidence that you are a dependable provider. You need to be sure that you put your best foot forward when interacting with an Examiner, as they will be forming a very strong opinion of you from the get-go.

A Promoter is a salesman, usually an extrovert, and a thought leader. They have the drive to spread any good idea they find, more often identifying them instinctively than through research-based evidence. Promoters often attend industry events to network and socialize. They are usually juggling many different projects, and are rarely confrontational.

Communicating with a Promoter requires you to match their speed and align your needs with their priorities. One such priority is their professional image, so you need to make sure that your offer increases their visibility in the industry. As you deal with a Promoter, make sure that you document the finer details of your agreements in writing, and you fulfil your end of the bargain promptly and professionally. Furthermore, you should always give a Promoter plenty of help whenever it is required to prove that you are the best choice for their needs.

These strategies should enable you to network more directly, with the end result being more business relationships that provide mutual benefit. Which of these personality types do you think you most embody? Tell us in the comments!



Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Cloud Business Computing Hackers Backup Microsoft Innovation Malware Tech Term Internet Email Data Small Business VoIP Network Security Cybercrime Android Mobile Devices Smartphones Efficiency Cloud Computing Hardware Software Windows Business Ransomware Data Backup Browser Business Management How To Smartphone User Tips Internet of Things Computers Cybersecurity Communication Productivity Communications Mobile Device Management Upgrade Automation Chrome Collaboration Hosted Solutions Money Network Artificial Intelligence Router Computer Law Enforcement Social Engineering Data Recovery Business Continuity Managed IT Services Gadgets Alert Data Security Two-factor Authentication Office 365 Outsourced IT App Data Protection Bandwidth Saving Money Phishing Managed IT Services Telephone Systems BDR Server Safety Data Breach Spam Connectivity Disaster Recovery Windows 10 Save Money Operating System Bring Your Own Device Vulnerability Social Media Word OneNote Miscellaneous YouTube Wi-Fi Identity Theft Microsoft Office Quick Tips Windows 10 IT Plan Remote Monitoring IT Services Managed IT Recovery Business Intelligence Virtualization The Internet of Things Apps Windows 7 VPN Unsupported Software Update Infrastructure Data storage CES Paperless Office Physical Security Spam Blocking Internet Exlporer Redundancy Password Private Cloud BYOD Content Management Government Downtime Data Storage Avoiding Downtime Google Drive Networking IT Support Comparison Passwords Public Cloud Website Blockchain Cleaning Sports IT Management Facebook Gmail Applications Productivity HaaS Online Shopping Entertainment NIST Hybrid Cloud Emails Voice over Internet Protocol HIPAA Thought Leadership Laptop Apple Tech Support Windows Server 2008 End of Support Network Congestion eWaste Big Data Authentication Value Solid State Drive Files Supercomputer Data loss Mobile Device Workers Customer Settings Electronic Medical Records Smart Office Shadow IT Telephony Evernote Holiday Cryptocurrency Monitor PDF Human Resources Touchpad iPhone Credit Cards Servers Internet exploMicrosoft IT Consultant Criminal Nanotechnology Office Audit Document Management Black Market History Budget Screen Mirroring Botnet Practices Hacking Marketing Chromecast HBO Millennials Managed Service Provider Root Cause Analysis Skype Flexibility Wireless Charging Safe Mode Multi-Factor Security Staff Addiction Flash Fraud HVAC Advertising Software Tips Smart Tech Relocation Uninterrupted Power Supply Going Green Computer Fan Workforce Hiring/Firing Cast Travel Password Manager Hosted Computing Charger Frequently Asked Questions Start Menu Cortana Digital Signature Virtual Assistant Data Management NarrowBand Netflix Trending Cache FENG Amazon Enterprise Content Management Outlook webinar Google Docs Patch Management Office Tips Excel Telecommuting Automobile Machine Learning User Error Current Events Workplace Tips Business Mangement USB Inventory DDoS Computer Care Windows 10s Health Meetings Tools Legal Google Apps Encryption Telephone System Wireless Technology Wireless Internet Sync Amazon Web Services Password Management Humor Conferencing Scam Devices Tip of the week Remote Work Work/Life Balance Robot Knowledge Recycling Access Control Samsung IBM Employer-Employee Relationship Keyboard Accountants Reputation Specifications Wire Television Transportation Managing Stress Experience Training Users Public Computer CrashOverride IT Support Webinar Benefits Twitter Books Loyalty Save Time Video Games Music Vendor Management Virtual Reality Information Technology Bluetooth IT solutions Battery Firewall Remote Computing WiFi Emergency SaaS Worker Commute Scalability Wearable Technology Mobility Risk Management Education Smart Technology Content Search Employer Employee Relationship Thank You Politics Worker Computing Infrastructure Two Factor Authentication Assessment Techology Audiobook How to Computer Accessories Company Culture Instant Messaging Troubleshooting Congratulations Best Practice Wireless Rootkit