Skip to main content

Controlled Sex Drive = Discipline

Controlled Sex Drive = Discipline

And that’s especially true for us men as we are natural hunters. But without proper control, sex can destroy all areas of your life. This post isn’t intended to discourage you from having sex. That’s not my business what you do. It’s to merely shine light on the fact that if you are single, you may not be able to go a week without running down on something. And I just want to provide some perspective on what could happen if you had some control

Before I met my wife, I had no discipline over my sex drive. If a woman said “come over” I would drop everything of importance for a quick nut

I remember one time when I had to be up for work at 5am in the morning. A chick hit me up around 9pm and said she wanted to come over but didn’t have a car. I drove one hour to her house and back, spent money on gas and etc.. and I didn’t get home until like 12:30am. Had sex with her and then I only had 3 hours to sleep. I woke up late for work the next morning and almost lost my job

That’s just one scenario but there are many others where men got women pregnant, cheated on their girl/wife and lost a good woman, going broke, or getting set up and robbed by another dude who used sex as a lure because he knew you were weak

King 🤴🏾, when you have control of your sex drive, the enemy no longer has control over you. He can’t tempt you to miss that important meeting. He can’t tempt you to hit the club when you should be working on your business. He can’t tempt you to drop a bag on a chick for some ass when you could be investing that into yourself and business. When you have control, you findeth a good woman who can multiply what you have because your VISION is now clear

As a single man, ask yourself:

HOW LONG CAN I GO WITHOUT SEX?

HOW LONG CAN I JUST STAY TO MYSELF AND ENJOY MY OWN SPACE?
HOW LONG CAN I COMMIT ALL OF MY ENERGY TO GOD AND NOT LUST?

HOW LONG CAN I WORK ON MY TEMPLE?

Once you learn how to do that for yourself, KING 🤴🏾, you become a powerful human being and man of GOD

I’m only speaking from experience and I hope this helps someone today ❤️🙏🏽 #lifelessons

Copied: @princedonnell on IG

Comments

  1. Well written. Great to hear that this is possible. I’m sure your wife is a lucky lady.♥️

    ReplyDelete
    Replies
    1. Thanks Hedone....you mean @princedonnell's? Yes she is.

      Delete

Post a Comment

Popular posts from this blog

10 Important Cybersecurity Practices for your Business

  10 Important Cybersecurity Practices for your Business 1. EDUCATION  It’s much easier to prevent a hack than it is to recover from a hack. Once your company’s sensitive data is stolen through a ransomware attack, recovering it is often a long and arduous process. Teaching employees about basic security, personal cybersecurity, and the prevalence of cyber threats goes a long way in stopping ransomware attacks before they can really do damage. Your employees should understand that they might be targets of malicious actors, eager to exploit any entry they can find in your company. The average cost of a cyberattack is 3.86 million and the cumulative total for global cybercrime is expected to cost $6 trillion. If you don’t pay to train your employees about cybersecurity best practices eventually you may end up paying more in the long run. High quality and free trainings for your employees are available from several government resources including Department of Homeland S...
Top 20 Most Asked Third Party Risk Questions for Vendors  These questions help organizations assess the overall risk posed by third-party vendors, covering critical areas like data protection, regulatory compliance, and incident response. Here’s a list of the Top 20 Most Asked Third-Party Risk Management (TPRM) Questions for Vendors in TPRM questionnaires: 1. What types of sensitive data do you handle for our organization? Vendors should clarify the types of data they collect, process, or store, such as personal information, financial data, or intellectual property. 2. How do you protect data at rest and in transit? This question probes into the encryption methods, protocols, and security controls in place for safeguarding data during storage and transmission. 3. Do you have a formal Information Security Program in place? Vendors should describe their overall cybersecurity framework, including policies, procedures, and governance. 4. How do you manage user access to our data and s...

Nearly 500,000 workers are needed in cybersecurity roles around the country

The push to work from home during the coronavirus pandemic is straining cybersecurity professionals around the country tasked with ensuring workers are able to not only work efficiently from remote locations — but to do so safely. This rapid shift is a tall order for an industry that was already in need of skilled professionals long before the pandemic took hold.  Cybersecurity workers were taken off some or all of their typical security duties to assist with other IT-related tasks, including equipping mobile workforces, according to an April survey from global nonprofit (ISC)2, the largest association of certified cybersecurity professionals. The survey of 256 cyber pros found nearly half were re-tasked and that a quarter said cybersecurity incidents increased since the transition to remote work, with some seeing as many as double the number of incidents. Separate data from another nonprofit cybersecurity group, the Information Systems Security Association, found a 63% increase in...