(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Personalities are Key to Successful Networking

Personalities are Key to Successful Networking

Almost everyone has, at one time, worked with someone with whom their personality clashed, whether they did not get along or just didn’t work effectively together. While this is a perfectly natural phenomenon of both nature and nurturing, it is best to put personal differences aside when forming a professional relationship with a coworker.

This was the focus of Networking Like a Pro, a publication by Dr. Ivan Misner and Brian Hilliard. In it, they explore how personalities come into play in the workplace, and how each person’s behaviors influence their interpersonal relationships. While most people display the traits of many personality types, the book makes the assertion that all people fall into four predominant personality types, especially where business is involved. Business networking is strongly influenced by how well your behavioral type meshes with another’s.

So, does this mean that you just won’t be able to network with some people, and with others it will be effortless? Not so.

Misner and Hilliard offer advice on how to best interact with these behavioral types by understanding what really makes them tick. These types are as follows: Go-Getters, Nurturers, Examiners, and Promoters.

When dealing with a Go-Getter, you have to think--and move--fast. The Go-Getter is determined to get the results they are looking for ASAP, and if the rules need to be bent in order to get them, so be it.

To communicate with a Go-Getter, you need to make the value that you offer them clearly relevant and essential to their goals. More specifically, you need to make them see how you can help speed up their operations without sacrificing the results they strive for. The Go-Getter will also want to hear that they have options to choose from, but would rather hear a pitch than they would a heavily-planned-out script. With a Go-Getter, stick to the highlights, and deliver on your promises.

Where a Go-Getter has more of a “now, if not sooner” attitude, a Nurturer sees the value in taking their time where business matters are concerned, operating with patience. Nurturers are also natural team players, surrounding themselves with supportive allies and willing to offer assistance wherever it is needed. They can be overly tolerant, however, willing to endure a less-than-ideal situation than ready to take a risk to change it.

Honesty is the best policy when working with a Nurturer. To work with them, you will first need to build their trust. You can help this process along by gently guiding them toward a mutually beneficial solution. To accomplish this, you also need to maintain contact with the Nurturer, regularly providing evidence as to how a business relationship with you can provide simplicity and support.

A born skeptic, an Examiner will thoroughly examine and evaluate everything that they may work with--including the people. They will unsurprisingly be predisposed to perfectionism, and at the very least, are very thorough. The Examiner is a strong conversationalist, as they use their stores of knowledge and information to their advantage. Efficiency is also a virtue to the Examiner, and so they will move on once their objective has been met, whether that is to the next assignment or to the next event.

As you build a connection with an Examiner, you need to be concise and clear about your position and why it is worth their time to be involved. Lean on facts and evidence to make your point, and only use small talk and stories if they add to the evidence that you are a dependable provider. You need to be sure that you put your best foot forward when interacting with an Examiner, as they will be forming a very strong opinion of you from the get-go.

A Promoter is a salesman, usually an extrovert, and a thought leader. They have the drive to spread any good idea they find, more often identifying them instinctively than through research-based evidence. Promoters often attend industry events to network and socialize. They are usually juggling many different projects, and are rarely confrontational.

Communicating with a Promoter requires you to match their speed and align your needs with their priorities. One such priority is their professional image, so you need to make sure that your offer increases their visibility in the industry. As you deal with a Promoter, make sure that you document the finer details of your agreements in writing, and you fulfil your end of the bargain promptly and professionally. Furthermore, you should always give a Promoter plenty of help whenever it is required to prove that you are the best choice for their needs.

These strategies should enable you to network more directly, with the end result being more business relationships that provide mutual benefit. Which of these personality types do you think you most embody? Tell us in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 21 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Hackers Business Computing Microsoft Productivity Backup Malware Hosted Solutions Internet Mobile Devices Google Efficiency IT Support Business VoIP Miscellaneous IT Services Managed Service Provider Email Server Disaster Recovery Business Continuity Workplace Tips Network Data Windows Upgrade Innovation Software Hardware Business Management Computer Network Security Save Money Saving Money Communication Android Smartphones Mobile Device Management Virtualization User Tips Managed IT Services Holiday Smartphone Browser communications Microsoft Office WiFi Windows 10 Outsourced IT Social Media Operating System Mobile Computing Data Backup Computers Small Business BYOD Hacking Chrome Proactive IT Remote Monitoring Avoiding Downtime Application IT Solutions Alert Apple Cybercrime Big Data Information Technology Ransomware Passwords Marketing Social Engineering Automation Managed IT Services Employer-Employee Relationship The Internet of Things Office Quick Tips Budget Collaboration Recovery spam Going Green Telephone Systems Remote Computing Data Recovery Health Mobility Gadgets Bring Your Own Device VPN How To Managed IT Save Time Firewall Cloud Computing App BDR Bandwidth Compliance Vendor Management Cybersecurity iPhone Wireless Technology User Error Two-factor Authentication PowerPoint Vulnerability Website Excel Phone System Content Filtering Money Downtime Office Tips Artificial Intelligence History Tablet IT Support Value Gmail Lithium-ion battery Memory Retail Search Windows 10 Private Cloud Risk Management Networking Mouse Antivirus Redundancy Office 365 Analytics Internet of Things Router Phishing Internet Exlporer Data storage Outlook Identity Theft Data Security Biometrics Intranet Flexibility Credit Cards Administration Hard Drives Entertainment Law Enforcement Facebook Running Cable Solid State Drive IT Consultant Unified Threat Management Skype Apps Data Storage Physical Security DDoS Mobile Office Robot Customer Relationship Management Workers Word Saving Time Business Intelligence Google Drive Environment Document Management Business Owner Best Available People OneNote Online Currency SaaS Programming Safety Network Congestion Trending IT Management Government Printer Work/Life Balance Meetings HaaS Fax Server Current Events Black Market Humor Statistics Unsupported Software Maintenance Data Management Public Cloud Remote Work Charger Software Tips Streaming Media Twitter Instant Messaging Shortcut Unified Communications Telephony Hybrid Cloud SharePoint Windows 8 Crowdfunding Google Docs Computer Care Encryption Sports Bluetooth Theft Touchscreen Start Menu HIPAA Spam Blocking Voice over Internet Protocol Audit Monitor eWaste Tablets HBO Notifications Keyboard YouTube Windows Media Player USB Cortana Mobile Multi-Factor Security Screen Mirroring Reputation Wearable Technology Social Fraud Frequently Asked Questions NarrowBand Hiring/Firing Google Apps Professional Services Computer Fan Lifestyle Cast Customers WIndows 7 Social Networking Amazon Tip of the week Applications Best Practice Chromecast Files Infrastructure Tools FENG Data Protection Productivity Managing Stress Password Analyitcs Amazon Web Services Windows Server 2008 Wi-Fi Laptop Virus Colocation Settings Password Manager LinkedIn Comparison Distributed Denial of Service Virtual Desktop Debate Online Shopping Company Culture Windows 7 Windows 8.1 Update Hosted Solution Touchpad Computer Accessories Computing Infrastructure IT service Human Resources Botnet Specifications Data Warehousing Relocation Virtual Reality Training Evernote Regulations Uninterrupted Power Supply Cameras End of Support Domains Video Surveillance Travel Millennials Consultant Mobile Device IaaS Bloatware Customer Service Education Wireless Charging Servers Cleaning Printer Server Internet exploMicrosoft Root Cause Analysis Workforce IT Plan Print Server Entrepreneur Worker Commute Piracy Fiber-Optic Flash Tech Support Patch Management Advertising Hacker Software as a Service Data loss Telecommuting User Cost Management Licensing Cables Net Neutrality Sync Computer Repair Shadow IT Scam Wireless Science Samsung Update Scalability Politics Transportation How to webinar Benefits PDF Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Electronic Medical Records Techology Public Computer Business Mangement Employer Employee Relationship Legal Data Breach Automobile Books Recycling Emails CrashOverride IBM Emergency Webinar Worker Supercomputer Content IT solutions Rootkit Video Games Users Knowledge Audiobook Netflix