Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why You Should Reexamine Your Business Practices

Tip of the Week: Why You Should Reexamine Your Business Practices

As a business adopts certain “best practices,” it is important for business leaders to consider why they are adopted, and more importantly, are they really for the best? There are many problems that subscribing to false best practices can produce, and so it becomes important to identify, adjust, and resolve them.

The term “best practices” is used exceptionally often in business communications, blogs, and other messages, to the point that it is fair to say that the term is bandied about just for the sake of using it. However, so much stake is placed in what is considered “best practice” that whatever is purported to be best is accepted without any further examination.

In his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business, and in an interview with the Harvard Business Review discussing this publication, Professor Freek Vermeulen discusses this phenomenon.

In the interview, the subject of reverse benchmarking is brought up, and with it, the example presented by Capitec. Capitec is a bank in South Africa that leveraged reverse benchmarking in order to cement their place in their market.

Reverse benchmarking is where you examine the standard practices of your particular industry in order to determine how one can do better, often by abandoning what other businesses treat as status quo. Returning to the Capitec example, Capitec observed that the other banks in South Africa were closing at 4 o’clock in the afternoon. In response to this, Capitec extended their hours to allow those who are employed to attend to their banking after work, and many of their branches have Saturday hours as well.

This is just one example of how “best practices” may not always be “best” for all businesses. However, when many businesses are questioned specifically regarding their supposed best practices, the response is often some variation of “this is what is safe and/or comfortable, and this is the way it has always been done.” According to Vermeulen, this is a good sign that there needs to be an examination into whether or not an organization is subscribing to practices because they are truly helpful, or if they are just stuck to the status quo.

There is also the danger of assuming that, because a company became successful by doing something, that something is a best practice. Vermeulen brought up the possibility that the companies who have reached the top have done so by following risky strategies and lucked out, while the vast majority of companies who did the same thing they did ultimately failed and died out in obscurity.

Vermeulen also acknowledges that changing an established practice is not an easy conclusion for many businesses to come to. According to him, companies will wait as long as they can before they make a change out of necessity--when they begin to see productivity and profitability suffer--but by then, change is more difficult to make.

This is why Vermeulen offers this advice: “Be proactive.”

By evaluating your business and establishing what actually works and--more importantly--what doesn’t, you can identify weak points and resolve them before they cause your business too much trouble.

Haber Group can do the same for your IT, evaluating your systems and network to ensure that everything is up to standard. Give us a call at 866.625.3560 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 23 April 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Email Hackers Malware Business Business Computing Internet Hosted Solutions Computer Microsoft Software Backup Windows 10 Ransomware IT Services Network Security Android Mobile Devices Smartphone Google User Tips Data Management Hardware Small Business Browser Productivity Windows Business Continuity Cloud Computing Server Gmail Data Artificial Intelligence Internet of Things Managed Service Provider Phishing App Encryption Facebook Office 365 Upgrade Smartphones Saving Money Efficiency Data Recovery Microsoft Office Big Data Spam Tip of the week Disaster Recovery Social Media Word Business Management Managed IT Services Remote Monitoring Data Backup Workplace Tips Innovation Government Office Tips Infrastructure Outsourced IT IT Support Windows 10 Money Miscellaneous Firewall IT Support Customer Service Tech Term Apple Settings Passwords IT Management Content Filtering Productivity Two-factor Authentication Robot Risk Management Antivirus Cybersecurity Employer-Employee Relationship Chrome Communication WiFi Data storage The Internet of Things Bandwidth Outlook Search Scam Tablet Vulnerability Administration IBM Wireless VoIP Holiday VPN Password Apps Customer Relationship Management Data Security Mouse Wi-Fi Hacking Virtual Private Network Network End of Support Storage Server Management Managed IT Services Presentation Hosted Solution Hacker Avoiding Downtime Save Money Telephone Systems Office Virtual Reality Maintenance YouTube Wireless Technology communications Recovery SaaS Printing Website Unified Threat Management Computing Monitors Google Drive Business Technology HIPAA Data loss Automation LiFi BYOD Augmented Reality Analytics Safety Mobile Security Mobile Device Superfish IT Technicians Drones Spyware Writing Application Training Gadgets Multi-Factor Security Cookies Automobile Dark Web Patch Management Hotspot Social Uninterrupted Power Supply Sports Virtualization Paperless Office Mirgation Education Humor Retail Deep Learning Users Google Calendar Nanotechnology Net Neutrality Language Hacks Solid State Drive Remote Computing Networking Chatbots Budget How To sip Social Engineering Heating/Cooling Bring Your Own Device IT service Legislation FCC Computing Infrastructure Hard Disk Drive Buisness IT solutions User Identity Firefox telephony Servers Best Practice BDR Politics Comparison Collaboration Title II Alerts Competition Cortana Techology Specifications How To Business Growth 5G Google Maps Document Management Tech Support File Sharing Online Mail Merge Licensing Current Events Downtime Samsung Unified Threat Management Compliance Legal Network Congestion Black Friday Dark Data Statistics Alt Codes Cybercrime Identity Theft Marketing Websites Microsoft Excel Address Cooperation Going Green Quick Tips IP Address Knowledge User Error Regulations Computers Cyber Monday Bluetooth Typing Blockchain Staff Corporate Profile Display VoIP Unified Communications Mobile Office Experience Printer Social Networking Operating System Smart Technology Cryptocurrency Running Cable Hard Drives Permissions Wearable Technology WannaCry Virtual Desktop Time Management Mobile Device Management Access Control Motherboard Distributed Denial of Service Bitcoin Cabling Laptop Refrigeration Digital Payment Information Technology Public Speaking Network Management Lithium-ion battery SharePoint Router Google Docs Managed IT Service Managed IT Fraud Windows 8 Halloween Lenovo Applications Google Wallet Digital Touchscreen Computer Care Downloads Modem Break Fix Vendor Management Shortcut Fun Disaster Scary Stories Undo Point of Sale Black Market Law Enforcement Physical Security Twitter CrashOverride Staffing Gadget Administrator Personal Information Web Server Screen Reader GPS Computer Repair Cameras Processors Smart Tech Tracking Health Mobile Computing CCTV Alert Connectivity Electronic Medical Records Travel G Suite Notifications Botnet Upgrades Supercomputer Motion Sickness Taxes Crowdsourcing Machine Learning 3D Printing IT Budget Update Emergency Domains IT Consultant Relocation Unsupported Software Meetings Chromebook Cleaning Private Cloud Mobile Data Webcam Emoji Work/Life Balance Error