facebook linkedin twitter

Tip of the Week: Why You Should Reconsider Your Best Practices

Tip of the Week: Why You Should Reconsider Your Best Practices

The term “best practice” has been used by businesses for years to describe the optimal way of performing a particular task. However, before fully adopting them into business operations, it is important for these practices to be examined and deemed to be beneficial to an individual company’s circumstances. If they are not, a company risks much by adopting a misplaced best practice.

The major problem is that “best practices,” while useful if applied properly, is a term that has largely become a buzzword for businesses to use in their communications. This is dangerous, as there is a lot put at stake based on the term “best practice” alone. Therefore, it is crucial that so-called best practices are reviewed and examined before a business puts strategies based on these practices into place.

This was the argument made by Professor Freek Vermeulen in his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business. An interview with the Harvard Business Review allowed him to discuss the phenomenon further.

To provide an example of how best practices may not always be of a business’ best interest to follow, Vermeulen discussed a South African bank called Capitec and how they relied on reverse benchmarking to identify how to become an outlier in their industry.

The practice of reverse benchmarking can be summed up as the process of examining how one’s industry typically operates in order to identity weak spots in accepted practices and improve internal business operations. This can often lead to the abandonment of what is considered the status quo, if not heavily modifying it.

Capitec’s examinations revealed that other banks in South Africa had a tendency to close at four o’clock in the afternoon. To abandon this status quo, industry-standard practice, Capitec not only extended their hours to enable those who worked during the day to see to their banking needs once their work day was over, they even implemented Saturday hours in many of their branches. As a result, Capitec has since carved out a healthy market share for themselves.

This account is just one example that shows how what is standard practice might not be what is best for the business following it. However, many businesses give some push back when directly asked why they follow the practices they follow. These businesses often will respond with some statement that essentially says “this is what is comfortable” or “this is how it has always been done.” These answers are a good sign that, according to Vermeulen, an organization needs to run a self-audit to determine if they are enacting practices because they benefit the organization, or if they are simply resisting change.

Furthermore, there is the risk inherent in assuming that something that made a business successful is automatically a best practice. As Vermeulen mentioned in his interview, many companies who have reached the top may have simply been lucky as they enacted risk-laden strategies, and most of the companies who tried similar strategies have long since failed and been forgotten.

Of course, changing established practices and patterns is not easy for businesses to do. Vermeulen notes this, stating that many companies will hold out until they have no choice but to make a change. This is usually done at the point where their profits and productivity take a hit. However, waiting until this point often makes change more difficult for these companies. According to Vermeulen, the key to avoiding unnecessary difficulty is simple: “Be proactive.”

By taking the opportunity to audit your business practices before your company is stuck in a life or death situation, you can more clearly see where your company is weakest. Better yet, you will be able to remedy these weaknesses before your company is at risk.

Computerware can help you evaluate your IT solutions to ensure that they are not contributing to any weaknesses that your company may suffer from. Call us at (703) 821-8200 for more information.

Proper Hard Drive Disposal is An Involved Process
Which is More Secure, Your Mobile Network or Wi-Fi...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 23, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Business Computing Software Hackers Microsoft Managed Service Provider Backup Productivity Workplace Tips Data Hardware Business Saving Money Email Malware Network Security IT Services IT Support Efficiency Hosted Solutions Google Small Business Computer Smartphones User Tips Quick Tips Gadgets Business Continuity Mobile Devices Disaster Recovery Innovation Microsoft Office Mobile Office Virtualization Network Android Social Media Mobile Device Management Server VoIP Collaboration Communication Miscellaneous Smartphone Upgrade Ransomware Windows 10 Unified Threat Management Windows Data Backup Data Recovery Passwords Tech Term IT Support Operating System Remote Monitoring Productivity Vendor Management Managed IT services Holiday BYOD Remote Computing Mobile Computing communications Apps Cybersecurity Facebook WiFi BDR The Internet of Things Marketing Analytics Apple Firewall Automation Users History Outsourced IT Data Management Internet of Things Phishing Mobile Device Managed IT Services Alert IT Consultant Artificial Intelligence Browser Save Money Big data App Content Filtering Spam Going Green Bandwidth Bring Your Own Device Gmail Maintenance Encryption Office Antivirus Health Cost Management Best Practice Information Technology Lithium-ion Battery Hiring/Firing Hard Drives Office 365 Outlook Windows 8 Managed IT Budget Two-factor Authentication Help Desk Wireless Technology Printer Virus Search Tech Support Cybercrime Phone System Hacking Money Training Document Management IBM Saving Time Computers VPN Travel Cloud Computing Update Business Technology Recovery Employer-Employee Relationship Save Time SaaS Windows 10 Law Enforcement Proactive IT Running Cable Compliance Hard Drive Data storage Access Control Customer Service Intranet Humor Administration Education Government Website It Management Legal Networking Risk Management Regulations Digital Payment iPhone Information Sports Password Cortana Computing Data Breach Disaster Downtime Current Events Machine Learning Telephone Systems Hosted Solution Hacker End of Support Project Management Comparison Tablet Excel Robot Securty Company Culture Computer Repair Customer Relationship Management Augmented Reality Solid State Drive User Social Networking File Sharing Fax Server Applications PowerPoint Flexibility Black Market Twitter Mobility Wireless Social Engineering Laptop DDoS Data Security Business Growth Patch Management Blockchain Word Data Loss Avoiding Downtime Paperless Office Business Intelligence Management Unified Communications Settings Value Telephony Redundancy Pain Points Taxes Router Computer Accessories User Error Distributed Denial of Service Vulnerabilities Co-managed IT Healthcare Digital Processors IT service USB Trending Websites Public Cloud Mouse Start Menu Tech Terms Presentation Identity Theft Mobile Technology Lifestyle Gaming Console Bluetooth Statistics Virtual Desktop Specifications Safety Programming Software as a Service Social Uninterrupted Power Supply Network Congestion Google Maps Virtual Reality Text Messaging Cryptocurrency Politics Webcam Managed Service Documents Automobile Conferencing Heating/Cooling Emails Vendor Google Docs Entertainment Bitcoin Data Protection Chromebook Experience Storage Streaming Media Computing Infrastructure Hack Cleaning Monitors How To Monitoring Office Tips Net Neutrality Download Inbound Marketing Retail Private Cloud eWaste Chrome Scam YouTube Tip of the week Shortcut Business Managemenet Google Calendar Supercomputer Multi-factor Authentication Micrsooft Content Management Wireless Headphones Telephone Entrepreneur VoIP Microchip Migration Connected Devices Drones Troubleshooting Touchscreen News Worker Environment online Currency Knowledge Network Management HIPAA Consultation Evernote Reading Samsung Equifax Fleet Tracking Virtual Assistant G Suite Permissions Language Competition Webinar Technology Tips Employer Employee Relationship Device security MSP Proxy Server Electronic Payment Licensing Upselling Nanotechnology Social Network LinkedIn Audit Hacks Physical Security Desktop Finance Electronic Medical Records Business Owner Fake News Writing Banking Botnet Business Cards Service Level Agreement Video Surveillance Music IP Address Data Warehousing Relocation Tablets Startup Asset Tracking switches Emergency Hard Drive Disposal Sync Unified Threat Management Backup and Disaster Recovery Application Skype Access Saving ZTime Username Dark Web Upgrades Archive Human Resources Screen Reader Customer Resource management LiFi Computer Care Notifications CCTV Gamification Health IT Microsoft Excel Best Practives Business Metrics Computer Malfunction Piracy Upload Debate Point of Contact Google Drive Windows Server 2008 Reliable Computing Harddrive Smart Tech Distribution Vulnerability In Internet of Things Fiber-Optic GPS Database Work/Life Balance Digital Signature Spyware Mobile Payment HTML Bookmark Deep Learning Telephone System Visible Light Communication Memory Teamwork Electricity Printing External Harddrive Mobile Security Microserver IT consulting Recycling Motion Sickness Software License Trends Analytic Windows 7 Scalability Multi-Factor Security Cost PDF Get More Done Fraud 3D Tactics Ebay Product Reviews cache Television Messenger Tracking Devices Thin CLient Browsers Advertising Flash Best Available Keyboard Printer Server WannaCry Downloads Rental Service Meetings Smart Phones UTM Content User Tip CIO Read Turn Key Error Windows XP Trojan Corporate Profile Web Server IT Plan Enterprise Resource Planning Staffing Google Wallet Domains Time Management Freedom of Information Cabling Legislation Device Management Wi-Fi Administrator email scam Adminstration Addiction Pirating Information Society Public Speaking Organize Assessment SharePoint Books Workers Accountants Leadership A.I. Data Analysis Displays CrashOverride Printers Fileless Malware Capital Productuvuty Managing Stress 3D Printing Regulation

toner1