Computerware

Tip of the Week: Why You Should Reconsider Your Best Practices

Tip of the Week: Why You Should Reconsider Your Best Practices

The term “best practice” has been used by businesses for years to describe the optimal way of performing a particular task. However, before fully adopting them into business operations, it is important for these practices to be examined and deemed to be beneficial to an individual company’s circumstances. If they are not, a company risks much by adopting a misplaced best practice.

The major problem is that “best practices,” while useful if applied properly, is a term that has largely become a buzzword for businesses to use in their communications. This is dangerous, as there is a lot put at stake based on the term “best practice” alone. Therefore, it is crucial that so-called best practices are reviewed and examined before a business puts strategies based on these practices into place.

This was the argument made by Professor Freek Vermeulen in his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business. An interview with the Harvard Business Review allowed him to discuss the phenomenon further.

To provide an example of how best practices may not always be of a business’ best interest to follow, Vermeulen discussed a South African bank called Capitec and how they relied on reverse benchmarking to identify how to become an outlier in their industry.

The practice of reverse benchmarking can be summed up as the process of examining how one’s industry typically operates in order to identity weak spots in accepted practices and improve internal business operations. This can often lead to the abandonment of what is considered the status quo, if not heavily modifying it.

Capitec’s examinations revealed that other banks in South Africa had a tendency to close at four o’clock in the afternoon. To abandon this status quo, industry-standard practice, Capitec not only extended their hours to enable those who worked during the day to see to their banking needs once their work day was over, they even implemented Saturday hours in many of their branches. As a result, Capitec has since carved out a healthy market share for themselves.

This account is just one example that shows how what is standard practice might not be what is best for the business following it. However, many businesses give some push back when directly asked why they follow the practices they follow. These businesses often will respond with some statement that essentially says “this is what is comfortable” or “this is how it has always been done.” These answers are a good sign that, according to Vermeulen, an organization needs to run a self-audit to determine if they are enacting practices because they benefit the organization, or if they are simply resisting change.

Furthermore, there is the risk inherent in assuming that something that made a business successful is automatically a best practice. As Vermeulen mentioned in his interview, many companies who have reached the top may have simply been lucky as they enacted risk-laden strategies, and most of the companies who tried similar strategies have long since failed and been forgotten.

Of course, changing established practices and patterns is not easy for businesses to do. Vermeulen notes this, stating that many companies will hold out until they have no choice but to make a change. This is usually done at the point where their profits and productivity take a hit. However, waiting until this point often makes change more difficult for these companies. According to Vermeulen, the key to avoiding unnecessary difficulty is simple: “Be proactive.”

By taking the opportunity to audit your business practices before your company is stuck in a life or death situation, you can more clearly see where your company is weakest. Better yet, you will be able to remedy these weaknesses before your company is at risk.

Computerware can help you evaluate your IT solutions to ensure that they are not contributing to any weaknesses that your company may suffer from. Call us at (703) 821-8200 for more information.

Proper Hard Drive Disposal is An Involved Process
Which is More Secure, Your Mobile Network or Wi-Fi...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, July 17, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Microsoft Business Computing Hackers Backup Managed Service Provider Productivity Workplace Tips Data Hardware Saving Money Business Malware Email IT Services IT Support Hosted Solutions Google Network Security Efficiency Small Business Smartphones Quick Tips Gadgets User Tips Business Continuity Mobile Devices Computer Disaster Recovery Mobile Office Virtualization Network Android Innovation Microsoft Office VoIP Social Media Mobile Device Management Server Smartphone Windows 10 Upgrade Miscellaneous Ransomware Unified Threat Management Windows Remote Monitoring Operating System Mobile Computing BYOD Remote Computing Passwords Collaboration Communication Holiday Managed IT services Cybersecurity WiFi Vendor Management Apps Data Recovery IT Support The Internet of Things Data Backup Marketing Facebook Users Analytics History Apple Firewall Data Management communications Tech Term Automation BDR Productivity Internet of Things Alert Artificial Intelligence Phishing Managed IT Services IT Consultant App Outsourced IT Save Money Bring Your Own Device Big data Health Spam Gmail Content Filtering Bandwidth Going Green Mobile Device Office Maintenance Printer Encryption Tech Support Virus Budget Wireless Technology Antivirus Search Hiring/Firing Browser Hard Drives Cybercrime Information Technology Windows 8 Lithium-ion Battery Outlook Best Practice Cost Management Managed IT Update Office 365 Help Desk Phone System Money Document Management Recovery Employer-Employee Relationship Computers IBM Travel Hacking Humor Hard Drive It Management Business Technology Risk Management Networking Administration Legal Save Time Customer Service Two-factor Authentication Cloud Computing Regulations Windows 10 Government Website SaaS Proactive IT Running Cable Law Enforcement Saving Time VPN Training Intranet Compliance Education Data storage Black Market Flexibility Augmented Reality PowerPoint Data Security Laptop Blockchain Business Growth User Mobility Patch Management Data Loss Social Engineering Business Intelligence Applications Digital Payment Wireless Downtime DDoS Data Breach Paperless Office Current Events Avoiding Downtime Comparison Tablet Company Culture Project Management Disaster iPhone End of Support Computer Repair Hosted Solution Robot Word Social Networking Securty Telephone Systems Password Cortana Excel Fax Server Access Control Twitter Solid State Drive Customer Relationship Management Hacker Processors Identity Theft Vulnerabilities Streaming Media Bitcoin Data Protection USB Healthcare Gaming Console Cryptocurrency Google Docs Presentation Google Maps Experience Virtual Reality Webcam Net Neutrality Politics Text Messaging Specifications Safety Automobile Chrome Monitors Virtual Desktop Emails Cleaning Scam Office Tips Social Chromebook Redundancy Documents Computing Infrastructure Hack Router How To Computer Accessories YouTube Heating/Cooling Inbound Marketing Sports Download Unified Communications Settings Storage Private Cloud Co-managed IT Trending Digital Computing User Error Mouse Telephony Websites Machine Learning Start Menu Tech Terms Taxes Pain Points Retail Programming eWaste Distributed Denial of Service Statistics Mobile Technology IT service Value Lifestyle Network Congestion Software as a Service Public Cloud Uninterrupted Power Supply Bluetooth Electronic Payment Sync Equifax Saving ZTime Recycling Electricity Printing Competition File Sharing Network Management Analytic Device security Deep Learning Notifications CCTV Microserver Product Reviews Windows 7 Work/Life Balance Business Owner Finance Debate Read Business Metrics Computer Malfunction Nanotechnology Harddrive cache Television Visible Light Communication Memory IP Address Reliable Computing Desktop Human Resources In Internet of Things Startup WannaCry Downloads IT consulting Application Get More Done Business Cards Service Level Agreement GPS Printer Server External Harddrive Device Management Corporate Profile Turn Key Unified Threat Management Backup and Disaster Recovery Time Management Freedom of Information Gamification Content Management CIO Motion Sickness Screen Reader Business Managemenet Assessment SharePoint Advertising Flash Scalability Trojan Tip of the week Staffing Google Wallet Organize Smart Tech Thin CLient Google Calendar Windows XP Digital Signature Messenger Tracking Piracy Upload 3D Ebay Entertainment HTML Smart Phones online Currency VoIP Displays Teamwork Rental Service Meetings Fiber-Optic Database Touchscreen News Society Cabling Mobile Security Knowledge Micrsooft Web Server Conferencing Consultation Evernote Virtual Assistant Drones PDF Wi-Fi Administrator Multi-Factor Security Leadership LinkedIn Technology Tips Books Workers Software License Trends Adminstration Pirating Information Webinar Devices Audit Best Available Keyboard Supercomputer Fraud Tactics Fake News Worker UTM Content Archive Microchip Monitoring Skype Data Warehousing Permissions Language Domains Emergency Hard Drive Disposal Legislation Access Public Speaking Reading Samsung IT Plan Enterprise Resource Planning G Suite Accountants Computer Care switches Writing Shortcut Employer Employee Relationship email scam Addiction Point of Contact Microsoft Excel Music Licensing Multi-factor Authentication Information Upgrades Entrepreneur Hacks Physical Security Management Upselling Google Drive Windows Server 2008 Troubleshooting Video Surveillance Vulnerability Environment Banking Botnet Wireless Headphones Spyware Mobile Payment LiFi HIPAA Relocation Tablets Best Practives Migration Connected Devices MSP 3D Printing Username CrashOverride Managing Stress Capital Productuvuty

toner1.7