Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why You Should Reexamine Your Business Practices

Tip of the Week: Why You Should Reexamine Your Business Practices

As a business adopts certain “best practices,” it is important for business leaders to consider why they are adopted, and more importantly, are they really for the best? There are many problems that subscribing to false best practices can produce, and so it becomes important to identify, adjust, and resolve them.

The term “best practices” is used exceptionally often in business communications, blogs, and other messages, to the point that it is fair to say that the term is bandied about just for the sake of using it. However, so much stake is placed in what is considered “best practice” that whatever is purported to be best is accepted without any further examination.

In his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business, and in an interview with the Harvard Business Review discussing this publication, Professor Freek Vermeulen discusses this phenomenon.

In the interview, the subject of reverse benchmarking is brought up, and with it, the example presented by Capitec. Capitec is a bank in South Africa that leveraged reverse benchmarking in order to cement their place in their market.

Reverse benchmarking is where you examine the standard practices of your particular industry in order to determine how one can do better, often by abandoning what other businesses treat as status quo. Returning to the Capitec example, Capitec observed that the other banks in South Africa were closing at 4 o’clock in the afternoon. In response to this, Capitec extended their hours to allow those who are employed to attend to their banking after work, and many of their branches have Saturday hours as well.

This is just one example of how “best practices” may not always be “best” for all businesses. However, when many businesses are questioned specifically regarding their supposed best practices, the response is often some variation of “this is what is safe and/or comfortable, and this is the way it has always been done.” According to Vermeulen, this is a good sign that there needs to be an examination into whether or not an organization is subscribing to practices because they are truly helpful, or if they are just stuck to the status quo.

There is also the danger of assuming that, because a company became successful by doing something, that something is a best practice. Vermeulen brought up the possibility that the companies who have reached the top have done so by following risky strategies and lucked out, while the vast majority of companies who did the same thing they did ultimately failed and died out in obscurity.

Vermeulen also acknowledges that changing an established practice is not an easy conclusion for many businesses to come to. According to him, companies will wait as long as they can before they make a change out of necessity--when they begin to see productivity and profitability suffer--but by then, change is more difficult to make.

This is why Vermeulen offers this advice: “Be proactive.”

By evaluating your business and establishing what actually works and--more importantly--what doesn’t, you can identify weak points and resolve them before they cause your business too much trouble.

Haber Group can do the same for your IT, evaluating your systems and network to ensure that everything is up to standard. Give us a call at 866.625.3560 for more information.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 19 January 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Hackers Privacy Email Malware Business Internet Hosted Solutions Microsoft Windows 10 Computer Business Computing Android Backup IT Services Smartphone Ransomware Small Business Software Network Security Windows Hardware Google User Tips Productivity Mobile Devices Data Browser Data Management Facebook Office 365 Upgrade Saving Money Smartphones Gmail Business Continuity Internet of Things Phishing App Managed IT Services Remote Monitoring Efficiency Cloud Computing Workplace Tips Office Tips Data Recovery IT Support Artificial Intelligence Microsoft Office Outsourced IT Big Data Managed Service Provider Word Tip of the week Encryption Two-factor Authentication Robot Risk Management Server Productivity Innovation Cybersecurity Employer-Employee Relationship Data storage Government WiFi Money Disaster Recovery Spam Miscellaneous Windows 10 Social Media Apple Settings Firewall Customer Service Content Filtering IT Support communications Office Wireless Technology Managed IT Services Printing Recovery End of Support IT Management Telephone Systems Maintenance Computing Save Money Google Drive Data Backup LiFi SaaS Antivirus Chrome Analytics Unified Threat Management Safety Bandwidth Monitors Outlook The Internet of Things Search Automation Administration VoIP Mobile Device Password IBM Scam Mouse Wireless Tablet Apps Vulnerability Customer Relationship Management Wi-Fi Network Hacking Passwords Holiday Hosted Solution Business Management Presentation Virtual Private Network Hacker YouTube Avoiding Downtime Knowledge Marketing Techology Politics Fraud Collaboration Google Maps Typing Specifications Server Management Mail Merge IP Address Online How To Experience Unified Threat Management Operating System Mobile Security Unified Communications File Sharing Cryptocurrency Website Running Cable Black Friday Statistics Address Mobile Office Samsung Virtual Desktop Network Congestion Microsoft Excel User Error Quick Tips Websites Hotspot Hard Drives Bitcoin Virtual Reality Laptop Cyber Monday Bluetooth Corporate Profile Information Technology Mobile Device Management Computers Blockchain Refrigeration Printer VoIP Google Docs Language Windows 8 Public Speaking Halloween Smart Technology Permissions WannaCry Google Wallet Lithium-ion battery Display Access Control Time Management Augmented Reality Computing Infrastructure Cabling Scary Stories Distributed Denial of Service Business Technology Data loss Drones Undo SharePoint Digital Payment Network Management Fun Alerts Managed IT Infrastructure Social Sports Managed IT Service Gadgets Lenovo Digital BYOD Education Application Deep Learning Virtualization Downloads Touchscreen Humor Shortcut Disaster Hacks Break Fix Users Superfish Computer Care Spyware Budget Communication Bring Your Own Device Vendor Management Multi-Factor Security sip Patch Management Uninterrupted Power Supply Buisness Dark Web Training IT solutions Writing Best Practice Google Calendar telephony Automobile Solid State Drive User Net Neutrality Cortana Networking How To Retail IT service Business Growth Competition Legislation Heating/Cooling Storage VPN Hard Disk Drive Current Events Downtime FCC Social Engineering Data Security Firefox Legal 5G BDR Alt Codes Cybercrime Comparison Servers Dark Data Going Green Title II Tracking Health CCTV Alert Document Management Tech Support Electronic Medical Records Identity Theft Travel Domains G Suite Notifications Upgrades Supercomputer Botnet Motion Sickness Emergency Taxes Crowdsourcing 3D Printing IT Budget Machine Learning Update IT Consultant Unsupported Software Relocation Meetings Chromebook Cleaning Mobile Data Private Cloud Licensing Webcam Emoji Work/Life Balance Error Point of Sale Black Market CrashOverride Law Enforcement Physical Security Paperless Office Mobile Computing Twitter Staffing Gadget Administrator Personal Information Web Server Remote Computing GPS Computer Repair Cameras Processors