Attend IT Blog

Attend IT Limited has been serving the Brentford area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Get People to Listen to You Better

Tip of the Week: How to Get People to Listen to You Better

It’s important that you are able to communicate with the people you work for, with, and over; and a big part of this is ensuring that your points are heard. Let’s go over a few strategies and techniques that can help you ensure that those around you are apt to listen to what you have to say.

Learn How to Listen Better, First

Listening is very much a two-way street. The better you’re able to actively listen to the other participants of a conversation, the more likely it is that they’ll act in kind and return the courtesy.

Be attentive, processing and absorbing what your collaborators in conversation have to say. When appropriate, briefly give your opinion and ask questions to help clarify what they’ve said. Above all, resist the temptation to start taking over the conversation and turning the attention back to you. Instead, maintain eye contact and engage with what the other person is saying.

Speak Less While Saying More

Speaking of listening, did you know that people spend about 75% of their day communicating with others, and of that time, 55% or so is devoted to listening? How likely is it that they want to hear you say more, when you could get the same points across with fewer words? 

By keeping your words brief, you save everyone time. Plus, you make them more inclined to listen to you the less you tend to prattle on and the more value your words have. 

Use Body Language to Your Advantage

It’s also important to recognize that your voice is far from the only way you communicate. You get quite a bit of your message across through non-verbal communication, as well. Everything from your posture to your tone of voice can communicate how passionately you believe in what you are saying. This has a direct impact on how confident you seem, and how drawn to listen to you the people around you will be.

Write Down the Important Parts

Finally, there’s no rule that says that you can’t use additional forms of communication to better get your messages across. Only about a quarter of what people listen to ultimately sticks in their minds, so providing those you are speaking to with a written summary of your key points when you are able can make a significant difference in their retention. Naturally, this won’t always be practical, but it can be a handy addition when the circumstances allow.

Hopefully, these tricks will help you ensure those you are speaking to, listen.

What It Means to Lead From the Front
Dissecting the Lessons from a Recent Amazon Scam W...

Mobile? Grab this Article!

Qr Code

Tag Cloud

Technology Security Business Computing Productivity Network Security Cloud Best Practices Tip of the Week Business Data Backup Managed IT Services Data Recovery Hackers Data IT Services communications IT Support Disaster Recovery Privacy Hosted Solutions VoIP Software Backup Mobile Devices Innovation Cybersecurity Malware Small Business Saving Money Efficiency Email Phishing Business Continuity Internet Cloud Computing Business Management Hardware Collaboration Computer Outsourced IT BDR Automation Smartphones Productivity Microsoft User Tips Information Technology Internet of Things IT Support Ransomware Workplace Strategy Compliance Server Quick Tips Users Smartphone Communication Risk Management Workplace Tips Artificial Intelligence Upgrade Managed IT services Mobility Meetings Wi-Fi Mobile Device Management Budget Network Spam Employee-Employer Relationship Covid-19 Managed IT BYOD Training Google Remote Save Money Human Resources Networking Managed Service Provider Mobile Device Windows 7 Avoiding Downtime Passwords Printing Wireless Android Document Management Remote Workers Gadgets Content Filtering Hosted Solution Cost Management VPN Video Conferencing Managed Service Microsoft Office Data Management Password Remote Computing Project Management Time Management Information Chrome MSP Instant Messaging Virtual Private Network Computers Windows 10 Firewall Remote Work Router History Help Desk Laptop Hacker Current Events End of Support Customer Relationship Management Encryption Monitoring Hard Drives IT Service Devices Managed Services AI Machine Learning Voice over Internet Protocol Audit Social Media Value Printers Solid State Drive Telephony Hybrid Cloud Paperless Office Manufacturing Big Data Software as a Service Office Conferencing Automobile Saving Time Backup and Disaster Recovery Data Breach Mobile Office Business Technology Personal Information Data Security Maintenance Printer Government Employer-Employee Relationship Redundancy Telephone Systems Recovery Wireless Internet Tech Term Marketing Mobile Computing Nanotechnology E-Commerce Disaster Content Filter Data Loss Employer/Employee Relationships Data Protection Office 365 Payroll Bandwidth Regulations Compliance Data Storage Copiers Save Time Smart Technology Gamification Flexibility Videoconferencing Professional Services Workers RMM Battery Two-factor Authentication Telephone iPhone Blockchain Leadership HIPAA Analysis Virtual Assistant Payment Cards Electronic Medical Records Transportation Cost Windows 10 Cybercrime Virtualization Analytics Chromebook Operating System Going Paperless Voiceover Internet Protocol Facebook Proactive Streaming The Internet of Things Travel Proactive IT Private Cloud Windows 11 Lifestyle How To Company Culture Alexa for Business Mobile Computing Applications Outsource IT Management Going Green Outsourcing Commerce Advertising Regulations Shadow IT Smart Tech Vendor Spyware Upgrades Business Telephone Students Utility Computing Update Business Intelligence e-waste Fiber Optics Windows Legal IoT Bitcoin Microsoft Outlook Azure Financial Technology File Sharing Troubleshooting Antivirus Vendor Management Paperless Solutions Cybersecurty Connectivity Apple Smartwatch Computer Repair Unified Communications Administration Workstations Customer Service Dark Web WPA3 Cabling App Windows Server 2008 Wireless Technology Browser Finance SMB Active Directory Evernote Break/Fix Window 10 Education Cleaning Storage intranet Remote Working Development CRM Holiday Wasting Money PDF Downtime Streaming Media User Error Social Engineering Inventory Management Work/Life Balance Remote Monitoring Colocation Files Copier Phone System File Storage Word PCI DSS SaaS Managed IT Service Employees Hacking Money Infrastructure Vulnerability Regulation Windows Server Black Market Hiring/Firing OneNote Online Storage Application Entertainment Samsung Amazon Microsoft 365 Work Unsupported Software Threats Camera Law Enforcement Edge Touchscreen Investment Communitications Financial 2FA Credit Cards Miscellaneous Net Neutrality Music Hard Drive Windows Ink Device Security Workplace Strategies WiFi OneDrive Access Control Sales Virus iOS Sync Security Cameras Processor Text Messaging eSignature Telework Medical IT Twitter Video Games Cortana Database IT solutions Patch Management Micrsosoft Root Cause Analysis Scams Projects Reputation Google Docs Ciminal SSD IT Management ROI Hosted Desktop Computer Accessories Bring Your Own Device Virtual Desktop FAQ Benchmarks Google Maps Unified Threat Management Screen Mirroring Sabotage Memory Admin Scalability Retail Office Tips Updates Audits Settings eCommerce Point of Sale Computer Forensics Hyperlink Health Identities Biometrics Windows 10s Outlook Digital Signage App store Authentication Augmented Reality Employee Managed Services Provider Safety Microsoft Excel Windows Server 2008 R2 Smart Devices Adobe Wireless Charging HaaS Policy Print Management Cast PC Identity Theft Internet Exlporer Websites Google Drive Computer Tips Computer Fan Tablets Microsoft Word Solutions Supply Chain Business Strategy Gmail Wasting Time Legislation Hard Disk Drive Shortcut Politics Charger Mobile Security WannaCry Alert Internet Service Provider Windows 8.1 Facebook Privacy Managing Stress Emergency Social Innovations Remote Management USB Books Tech Support Procedure Healthcare Consultant Worker Commute Scam Keyboard Shortcuts Humor Gifts Data Theft Identity NFL YouTube PowerPoint Accessory Search Comparison Language Excel Experience Licensing Voice Television CrashOverride Display Robot Telephone System Emails IT Solutions Proactive Management Best Practice Myths Virtual Reality Testing Fraud Organization HBO Server Maintenance Inventory How To Computer Care Data Privacy eWaste Environment Holidays Peripheral Specifications Workstation 5G Worker Google Assistant Co-Managed Services Relocation Sports IT budget Reviews Print Webinar WIndows Server 2008 Keyboard Apps