Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Personalities are Key to Successful Networking

Personalities are Key to Successful Networking

Almost everyone has, at one time, worked with someone with whom their personality clashed, whether they did not get along or just didn’t work effectively together. While this is a perfectly natural phenomenon of both nature and nurturing, it is best to put personal differences aside when forming a professional relationship with a coworker.

This was the focus of Networking Like a Pro, a publication by Dr. Ivan Misner and Brian Hilliard. In it, they explore how personalities come into play in the workplace, and how each person’s behaviors influence their interpersonal relationships. While most people display the traits of many personality types, the book makes the assertion that all people fall into four predominant personality types, especially where business is involved. Business networking is strongly influenced by how well your behavioral type meshes with another’s.

So, does this mean that you just won’t be able to network with some people, and with others it will be effortless? Not so.

Misner and Hilliard offer advice on how to best interact with these behavioral types by understanding what really makes them tick. These types are as follows: Go-Getters, Nurturers, Examiners, and Promoters.

Go-Getters
When dealing with a Go-Getter, you have to think--and move--fast. The Go-Getter is determined to get the results they are looking for ASAP, and if the rules need to be bent in order to get them, so be it.

To communicate with a Go-Getter, you need to make the value that you offer them clearly relevant and essential to their goals. More specifically, you need to make them see how you can help speed up their operations without sacrificing the results they strive for. The Go-Getter will also want to hear that they have options to choose from, but would rather hear a pitch than they would a heavily-planned-out script. With a Go-Getter, stick to the highlights, and deliver on your promises.

Nurturers
Where a Go-Getter has more of a “now, if not sooner” attitude, a Nurturer sees the value in taking their time where business matters are concerned, operating with patience. Nurturers are also natural team players, surrounding themselves with supportive allies and willing to offer assistance wherever it is needed. They can be overly tolerant, however, willing to endure a less-than-ideal situation than ready to take a risk to change it.

Honesty is the best policy when working with a Nurturer. To work with them, you will first need to build their trust. You can help this process along by gently guiding them toward a mutually beneficial solution. To accomplish this, you also need to maintain contact with the Nurturer, regularly providing evidence as to how a business relationship with you can provide simplicity and support.

Examiners
A born skeptic, an Examiner will thoroughly examine and evaluate everything that they may work with--including the people. They will unsurprisingly be predisposed to perfectionism, and at the very least, are very thorough. The Examiner is a strong conversationalist, as they use their stores of knowledge and information to their advantage. Efficiency is also a virtue to the Examiner, and so they will move on once their objective has been met, whether that is to the next assignment or to the next event.

As you build a connection with an Examiner, you need to be concise and clear about your position and why it is worth their time to be involved. Lean on facts and evidence to make your point, and only use small talk and stories if they add to the evidence that you are a dependable provider. You need to be sure that you put your best foot forward when interacting with an Examiner, as they will be forming a very strong opinion of you from the get-go.

Promoters
A Promoter is a salesman, usually an extrovert, and a thought leader. They have the drive to spread any good idea they find, more often identifying them instinctively than through research-based evidence. Promoters often attend industry events to network and socialize. They are usually juggling many different projects, and are rarely confrontational.

Communicating with a Promoter requires you to match their speed and align your needs with their priorities. One such priority is their professional image, so you need to make sure that your offer increases their visibility in the industry. As you deal with a Promoter, make sure that you document the finer details of your agreements in writing, and you fulfil your end of the bargain promptly and professionally. Furthermore, you should always give a Promoter plenty of help whenever it is required to prove that you are the best choice for their needs.

These strategies should enable you to network more directly, with the end result being more business relationships that provide mutual benefit. Which of these personality types do you think you most embody? Tell us in the comments!

Sign Up For Our Newsletter

  • Company Name *
  • First Name *
  • Last Name *

      Request a Consultation

      Request a
      Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for you!

      Contact Us!

      Free Consultation
       

      Tag Cloud

      Tip of the Week Security Privacy Technology Best Practices Cloud Business Computing Google Hackers Backup Microsoft Windows 10 Software Malware Internet Network Security Email Smartphones Hosted Solutions Browser Productivity Innovation Efficiency Mobile Devices Data Disaster Recovery Business Ransomware Hardware Android User Tips Computer VoIP Cybercrime Business Continuity Business Management Office Alert Smartphone Windows Upgrade Computers Miscellaneous Automation Telephone Systems Managed IT Services Tech Term Law Enforcement Collaboration IT Services Productivity Small Business Quick Tips Virtualization communications Cloud Computing Chrome Money Outsourced IT Data Backup Office Tips Save Money Social Media Social Engineering Facebook Server Workplace Tips Health Router App Artificial Intelligence Network Cybersecurity How To Internet of Things Communication Data Recovery Work/Life Balance Bring Your Own Device Mobile Device Management Wi-Fi Office 365 Gmail Passwords History Remote Computing Bandwidth Operating System Spam Password Two-factor Authentication Managed IT Services Managed Service Provider Phishing Flexibility Vulnerability Recovery Entertainment Apps Word Marketing Hacking Data Management Holiday VPN Windows 10 Networking Safety Google Drive Application Data Protection Connectivity Data Breach Private Cloud Data Security HaaS Spam Blocking Government Cleaning Mouse Public Cloud Downtime Robot IT Support User Error CES Remote Monitoring USB Data storage Business Intelligence Wearable Technology Microsoft Office Content Management Update PDF Budget Internet Exlporer Mobility BDR Big Data Electronic Medical Records Best Practice Charger Legal Data Storage Settings Battery Sports Mobile Device IT Management Hiring/Firing Retail Website IT Plan Patch Management Windows 7 Physical Security Gadgets Identity Theft Infrastructure Managed IT End of Support YouTube Unsupported Software Scam Applications OneNote The Internet of Things Redundancy Meetings DDoS Keyboard Black Market BYOD eWaste Avoiding Downtime Encryption Comparison Employer-Employee Relationship Worker Environment Worker Commute Amazon Web Services Criminal Automobile Music Chromecast Search Notifications Specifications HBO Smart Technology Servers Telephony Rootkit Windows 10s Maintenance Tech Support Online Shopping Practices IBM Data loss Hybrid Cloud Two Factor Authentication How to Addiction webinar Outlook Evernote HVAC Skype Training Apple Shadow IT Streaming Media Hosted Computing Supercomputer Screen Mirroring Troubleshooting Frequently Asked Questions Monitor Customer Relationship Management Millennials Cache Conferencing Wireless Charging Start Menu Vendor Management Solid State Drive iPhone Blockchain Computer Care Inventory Cast Information Technology Excel Reputation Customer Service Saving Money Workforce Wireless Internet Emails Cortana Tools Running Cable Audit Content Shortcut Going Green HIPAA Access Control Current Events Books Tip of the week Save Time Customers Fax Server Telecommuting Wire Google Apps SaaS Computer Fan Files Audiobook Laptop Human Resources Google Docs Authentication Knowledge Wireless Emergency Windows Server 2008 Education Mobile Computing Remote Work Smart Office Workers Value FENG Touchpad Video Games Staff Nanotechnology Network Congestion Employer Employee Relationship People Computing Infrastructure Document Management Netflix Assessment Risk Management Scalability Social Voice over Internet Protocol Smart Tech IT Consultant Flash Computer Accessories Mobile Office Biometrics Programming Credit Cards Paperless Office IT Support Password Manager Botnet Television Internet exploMicrosoft Politics Instant Messaging Lithium-ion battery Multi-Factor Security Samsung Software Tips Transportation Bluetooth Relocation Users Fraud Machine Learning Business Mangement Travel Digital Signature Public Computer Advertising NarrowBand Social Networking Trending Devices Leadership Techology Benefits Sync Humor Virtual Reality Uninterrupted Power Supply Amazon Distributed Denial of Service Recycling Accountants Root Cause Analysis Experience IT solutions Wireless Technology Thought Leadership Firewall Managing Stress Thank You Twitter Congratulations Enterprise Content Management Password Management WiFi Webinar NIST IT solutions CrashOverride Company Culture
      QR-Code