Tip of the Week: Why You Should Reexamine Your Business Practices

Tip of the Week: Why You Should Reexamine Your Business Practices

As a business adopts certain “best practices,” it is important for business leaders to consider why they are adopted, and more importantly, are they really for the best? There are many problems that subscribing to false best practices can produce, and so it becomes important to identify, adjust, and resolve them.

The term “best practices” is used exceptionally often in business communications, blogs, and other messages, to the point that it is fair to say that the term is bandied about just for the sake of using it. However, so much stake is placed in what is considered “best practice” that whatever is purported to be best is accepted without any further examination.

In his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business, and in an interview with the Harvard Business Review discussing this publication, Professor Freek Vermeulen discusses this phenomenon.

In the interview, the subject of reverse benchmarking is brought up, and with it, the example presented by Capitec. Capitec is a bank in South Africa that leveraged reverse benchmarking in order to cement their place in their market.

Reverse benchmarking is where you examine the standard practices of your particular industry in order to determine how one can do better, often by abandoning what other businesses treat as status quo. Returning to the Capitec example, Capitec observed that the other banks in South Africa were closing at 4 o’clock in the afternoon. In response to this, Capitec extended their hours to allow those who are employed to attend to their banking after work, and many of their branches have Saturday hours as well.

This is just one example of how “best practices” may not always be “best” for all businesses. However, when many businesses are questioned specifically regarding their supposed best practices, the response is often some variation of “this is what is safe and/or comfortable, and this is the way it has always been done.” According to Vermeulen, this is a good sign that there needs to be an examination into whether or not an organization is subscribing to practices because they are truly helpful, or if they are just stuck to the status quo.

There is also the danger of assuming that, because a company became successful by doing something, that something is a best practice. Vermeulen brought up the possibility that the companies who have reached the top have done so by following risky strategies and lucked out, while the vast majority of companies who did the same thing they did ultimately failed and died out in obscurity.

Vermeulen also acknowledges that changing an established practice is not an easy conclusion for many businesses to come to. According to him, companies will wait as long as they can before they make a change out of necessity--when they begin to see productivity and profitability suffer--but by then, change is more difficult to make.

This is why Vermeulen offers this advice: “Be proactive.”

By evaluating your business and establishing what actually works and--more importantly--what doesn’t, you can identify weak points and resolve them before they cause your business too much trouble.

Haber Group can do the same for your IT, evaluating your systems and network to ensure that everything is up to standard. Give us a call at 866.625.3560 for more information.

Here’s Our Rundown on Blockchain Technology
Technology Has Played a Part in Shaping How We Cel...
 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Malware Hackers Business Internet Computer Business Computing Microsoft Software Hosted Solutions Mobile Devices Google Backup Windows 10 Network Security Ransomware Android IT Services Hardware Smartphone User Tips Small Business Managed IT Services Data Management Tech Term Windows IT Support Gmail Productivity Data Browser Facebook Cloud Computing Server Internet of Things Saving Money App Business Continuity Microsoft Office Smartphones Disaster Recovery Upgrade Cybersecurity Managed Service Provider Phishing Efficiency Word Artificial Intelligence Data Recovery Business Management Encryption Remote Monitoring Office 365 Spam Data Backup Tip of the week Social Media IT Support Workplace Tips Government Employer-Employee Relationship Office Tips Money Infrastructure Chrome Managed IT Services Outsourced IT Content Filtering Innovation Productivity Communication Big Data Windows 10 Miscellaneous communications Applications Risk Management Website Apple Wireless Vulnerability Analytics Antivirus Data storage VoIP Customer Service Robot Firewall Passwords Settings Two-factor Authentication WiFi Avoiding Downtime IT Management Bandwidth The Internet of Things YouTube Recovery Save Money Virtual Reality LiFi Search Scam Paperless Office Mobile Security IBM Tablet SaaS Storage Administration Customer Relationship Management Unified Threat Management Wi-Fi VPN Holiday Apps Outlook Data Security Augmented Reality Hacking Data loss Business Technology Monitors Virtual Private Network BYOD Network Printing Safety Server Management Automation Hacker End of Support Presentation Hosted Solution Computing HIPAA Telephone Systems Google Drive Office Password Maintenance Wireless Technology Mobile Device Mouse Vendor Management Sports Cables Uninterrupted Power Supply Best Practice Patch Management telephony Title II Connectivity Training Knowledge Virtualization Quick Tips Information Technology User Error SharePoint Bluetooth Google Docs Managed IT Service Modem Education Writing Licensing Automobile Mobile Office Continuity Specifications Compliance Charging Users Corporate Profile Windows 8 Computers Value Smart Office Wires Solid State Drive Business Growth Online IoT Experience Unified Communications VoIP Google Wallet Downloads IT Technicians Break Fix Cookies Hard Drives How To Current Events Networking Retail Cooperation Mobile Device Management Running Cable Solar Black Friday Regulations Remote Computing Virtual Desktop WannaCry Display Hotspot Professional Services Work IT service Heating/Cooling Legal Buisness Voice over Internet Protocol Hard Disk Drive Alt Codes Dark Data Microsoft Excel Star Wars Time Management Drones Multi-Factor Security Mirgation User Cabling Dark Web Nanotechnology IT solutions Refrigeration Firefox Going Green Social Engineering Staff Lithium-ion battery Laptop Business Intelligence Cyber Monday Social Networking Social Language USB Digital Payment Optimization Public Speaking BDR Servers Chromebook 5G FinTech Typing Blockchain Cost Management Politics Competition Network Management Google Calendar Chatbots Company Culture Deep Learning Managed IT Humor Net Neutrality Screen Reader Cortana Techology Printer Wearable Technology Collaboration Halloween Operating System Smart Technology Motherboard Fun Digital Hacks Lenovo Computing Infrastructure Dongle Recycling Google Maps Identity Downtime MSP Cryptocurrency Mail Merge Permissions Assessment Tech Support Document Management Touchscreen Budget Legislation Scary Stories Managing Stress Disaster Bring Your Own Device Shortcut sip FCC Smart Tech Computer Care Undo Unified Threat Management How To Access Control File Sharing Statistics Distributed Denial of Service Router Samsung Marketing Spyware Superfish Alerts Service Level Agreement IP Address Cybercrime eWaste Comparison Development Gadgets Application Bitcoin Address Network Congestion Fraud Internet Exlporer Websites Identity Theft Travel Law Enforcement Notifications G Suite CrashOverride Mobile Computing Twitter Botnet Supercomputer Physical Security Motion Sickness Gadget Staffing Upgrades Crowdsourcing Taxes Personal Information Administrator Web Server Emergency Machine Learning IT Budget Domains Update GPS 3D Printing IT Consultant Computer Repair Processors Cameras Relocation Meetings Tracking Unsupported Software Cleaning Health Alert CCTV Private Cloud Emoji Webcam Mobile Data Work/Life Balance Electronic Medical Records Error Black Market Point of Sale