๐Ÿ…ฑ๐Ÿ…ป๐Ÿ…พ๐Ÿ…ฒ๐Ÿ…บ๐Ÿ…ด๐Ÿ…ณ

โ†ณ

Years in the AV world expose you to it allโ€”

the โ€œgeniusโ€ sales tactics, the polished pitches, the illusion of strategy.

Some โ€˜opportunitiesโ€™ arenโ€™t opportunitiesโ€”theyโ€™re just temperature checks to see how negotiable you are.

Example of the playbook: ๐™ฒ๐š•๐š’๐šŒ๐š” ๐šข๐š˜๐šž๐š› ๐š๐šŠ๐šŸ๐š˜๐š›๐š’๐š๐šŽ ๐š•๐š’๐šœ๐š ๐š‹๐šŽ๐š•๐š˜๐š  ๐š๐š˜๐š› ๐š๐š‘๐šŽ ๐™ป๐š’๐š—๐š”๐šŽ๐š๐š’๐š— ๐š™๐š˜๐šœ๐š

โ–ช๏ธFake job posts 

โ–ช๏ธBid shopping 

โ–ช๏ธSilence 

โ–ช๏ธProject or job strategy

โ–ช๏ธFake competitive bids or competition

โ–ช๏ธRevisions

โ–ช๏ธScope creep

โ–ช๏ธPrice anchoring

โ–ช๏ธTesting desperation

โ–ช๏ธSales techniques disguised as operational agreements

โ–ช๏ธSmall job today; big opportunity tomorrow

โ–ช๏ธFalse urgency

โ–ช๏ธBait-and-Switch Engagement

โ–ช๏ธSocial Engineering

โ–ช๏ธResource Fishing

โ–ช๏ธGhosting

โ–ช๏ธPipeline Building


โ–ช๏ธThose persistent lurkers on your profile are one of the worst. Is it a sales tactic or a security concern? 


๐—ฅ๐—ฒ๐—ฐ๐—ฒ๐—ป๐˜๐—น๐˜†, ๐—œ ๐—ฟ๐—ฒ๐—บ๐—ผ๐˜ƒ๐—ฒ๐—ฑ (๐–ป๐—…๐—ˆ๐–ผ๐—„๐–พ๐–ฝ) ๐˜€๐—ฒ๐˜ƒ๐—ฒ๐—ฟ๐—ฎ๐—น ๐—ต๐˜‚๐—ป๐—ฑ๐—ฟ๐—ฒ๐—ฑ ๐—ฐ๐—ผ๐—ป๐—ป๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป๐˜€ ๐—ณ๐—ฟ๐—ผ๐—บ ๐—ผ๐—ป๐—ฒ ๐˜€๐—ผ๐—ฐ๐—ถ๐—ฎ๐—น ๐—ฝ๐—น๐—ฎ๐˜๐—ณ๐—ผ๐—ฟ๐—บ ๐—ฎ๐—ณ๐˜๐—ฒ๐—ฟ ๐—ฟ๐—ฒ๐—ฎ๐—ฐ๐—ต๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ฒ ๐—ฝ๐—น๐—ฎ๐˜๐—ณ๐—ผ๐—ฟ๐—บโ€™๐˜€ ๐—ฐ๐—ผ๐—ป๐—ป๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—น๐—ถ๐—บ๐—ถ๐˜, ๐—ฎ๐—น๐—น๐—ผ๐˜„๐—ถ๐—ป๐—ด ๐˜€๐—ฝ๐—ฎ๐—ฐ๐—ฒ ๐˜๐—ผ ๐—ฐ๐—ผ๐—ป๐—ป๐—ฒ๐—ฐ๐˜ ๐˜„๐—ถ๐˜๐—ต ๐—ป๐—ฒ๐˜„ ๐—ฝ๐—ฟ๐—ผ๐—ณ๐—ฒ๐˜€๐˜€๐—ถ๐—ผ๐—ป๐—ฎ๐—น๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—ฒ๐˜…๐—ฝ๐—ฎ๐—ป๐—ฑ ๐—บ๐˜† ๐—ป๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ.