Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why You Should Reconsider Your Best Practices

Tip of the Week: Why You Should Reconsider Your Best Practices

The term “best practice” has been used by businesses for years to describe the optimal way of performing a particular task. However, before fully adopting them into business operations, it is important for these practices to be examined and deemed to be beneficial to an individual company’s circumstances. If they are not, a company risks much by adopting a misplaced best practice.

The major problem is that “best practices,” while useful if applied properly, is a term that has largely become a buzzword for businesses to use in their communications. This is dangerous, as there is a lot put at stake based on the term “best practice” alone. Therefore, it is crucial that so-called best practices are reviewed and examined before a business puts strategies based on these practices into place.

This was the argument made by Professor Freek Vermeulen in his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business. An interview with the Harvard Business Review allowed him to discuss the phenomenon further.

To provide an example of how best practices may not always be of a business’ best interest to follow, Vermeulen discussed a South African bank called Capitec and how they relied on reverse benchmarking to identify how to become an outlier in their industry.

The practice of reverse benchmarking can be summed up as the process of examining how one’s industry typically operates in order to identity weak spots in accepted practices and improve internal business operations. This can often lead to the abandonment of what is considered the status quo, if not heavily modifying it.

Capitec’s examinations revealed that other banks in South Africa had a tendency to close at four o’clock in the afternoon. To abandon this status quo, industry-standard practice, Capitec not only extended their hours to enable those who worked during the day to see to their banking needs once their work day was over, they even implemented Saturday hours in many of their branches. As a result, Capitec has since carved out a healthy market share for themselves.

This account is just one example that shows how what is standard practice might not be what is best for the business following it. However, many businesses give some push back when directly asked why they follow the practices they follow. These businesses often will respond with some statement that essentially says “this is what is comfortable” or “this is how it has always been done.” These answers are a good sign that, according to Vermeulen, an organization needs to run a self-audit to determine if they are enacting practices because they benefit the organization, or if they are simply resisting change.

Furthermore, there is the risk inherent in assuming that something that made a business successful is automatically a best practice. As Vermeulen mentioned in his interview, many companies who have reached the top may have simply been lucky as they enacted risk-laden strategies, and most of the companies who tried similar strategies have long since failed and been forgotten.

Of course, changing established practices and patterns is not easy for businesses to do. Vermeulen notes this, stating that many companies will hold out until they have no choice but to make a change. This is usually done at the point where their profits and productivity take a hit. However, waiting until this point often makes change more difficult for these companies. According to Vermeulen, the key to avoiding unnecessary difficulty is simple: “Be proactive.”

By taking the opportunity to audit your business practices before your company is stuck in a life or death situation, you can more clearly see where your company is weakest. Better yet, you will be able to remedy these weaknesses before your company is at risk.

Computerware can help you evaluate your IT solutions to ensure that they are not contributing to any weaknesses that your company may suffer from. Call us at (703) 821-8200 for more information.

Proper Hard Drive Disposal is An Involved Process
Which is More Secure, Your Mobile Network or Wi-Fi...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 20 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Software Hackers Workplace Tips Business Computing Productivity Backup Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Small Business Gadgets Quick Tips Smartphones Network Security Business Continuity User Tips Mobile Devices Computer Mobile Office Disaster Recovery Microsoft Office Network Virtualization Server VoIP Social Media Mobile Device Management Miscellaneous Upgrade Windows 10 Windows Unified Threat Management Android Smartphone Ransomware Holiday Operating System Remote Computing Passwords Innovation BYOD Communication Mobile Computing WiFi Vendor Management Remote Monitoring The Internet of Things Apps Facebook Collaboration Marketing Analytics History Users Managed IT services Firewall Data Management Apple Alert IT Support IT Consultant Phishing Save Money Outsourced IT Cybersecurity Managed IT Services App Productivity Bring Your Own Device Automation Gmail Office Big data Health Content Filtering Going Green BDR Spam Hiring/Firing Wireless Technology Search Windows 8 Browser Tech Support Lithium-ion Battery communications Hard Drives Managed IT Budget Outlook Artificial Intelligence Virus Best Practice Internet of Things IBM Bandwidth Mobile Device Office 365 Money Phone System Encryption Recovery Update Employer-Employee Relationship Printer Cost Management Data Backup Help Desk Antivirus Maintenance Information Technology Save Time Document Management Saving Time Running Cable Networking Government Humor Risk Management Law Enforcement Data storage Proactive IT Computers Customer Service It Management Legal Hard Drive Travel Education Administration SaaS Robot Hacking Windows 10 Computer Repair Black Market User Data Recovery Business Growth Intranet DDoS Fax Server Telephone Systems Training Word Disaster Digital Payment End of Support Cortana Password Project Management Hacker Securty Avoiding Downtime Comparison Solid State Drive PowerPoint Tablet Social Networking Current Events Flexibility Excel Two-factor Authentication VPN Twitter Wireless Website Mobility iPhone Business Intelligence Hosted Solution How To IT service Digital Social Engineering Start Menu Compliance Trending Taxes Computing Infrastructure Software as a Service Co-managed IT Access Control Safety Uninterrupted Power Supply Specifications Statistics Social Network Congestion Telephony Data Security Monitors Streaming Media Lifestyle Patch Management Google Maps Inbound Marketing Cybercrime YouTube Bitcoin Unified Communications Settings Cloud Computing Chrome Hack Router Computer Accessories Downtime Customer Relationship Management Politics Processors USB Augmented Reality Presentation Pain Points Mouse Distributed Denial of Service Company Culture Cryptocurrency Virtual Desktop Text Messaging User Error Google Docs Laptop Public Cloud Programming Documents Heating/Cooling Office Tips Gaming Console Webcam Paperless Office Scam Net Neutrality Sports Retail Automobile Computing Experience eWaste Notifications Knowledge Troubleshooting Freedom of Information Web Server Turn Key Reliable Computing Technology Tips Staffing Environment Fraud Websites Music Competition Workers Video Surveillance Trojan Virtual Reality Organize Saving ZTime Tech Terms Upgrades LinkedIn Business Owner News email scam Bluetooth Access LiFi Application Samsung Archive Debate Rental Service Deep Learning Fake News G Suite Visible Light Communication Vulnerabilities Physical Security Point of Contact Memory Spyware Wi-Fi Tablets Digital Signature Mobile Technology Thin CLient Data Protection Entertainment Microsoft Excel Sync Advertising Business Cards CCTV Flash cache Google Wallet Mobile Payment Harddrive Analytic Leadership Data Loss Displays Corporate Profile In Internet of Things Emails External Harddrive Assessment Banking Redundancy Drones Public Speaking Television Scalability Device Management File Sharing Data Breach VoIP Blockchain Permissions Entrepreneur Meetings Smart Phones Get More Done Language Consultation Business Metrics Cabling online Currency HIPAA SharePoint Private Cloud Business Managemenet Printer Server Audit Writing switches Electronic Payment Tip of the week Administrator Supercomputer Chromebook Emergency IP Address Worker Evernote Machine Learning Messenger Computer Care Human Resources Virtual Assistant Google Drive Employer Employee Relationship GPS Work/Life Balance Download Vulnerability Licensing Data Warehousing Upselling Skype Webinar Botnet Books Printing Electricity IT consulting Hard Drive Disposal Cleaning Teamwork Ebay 3D Microchip Business Technology CIO Storage Windows Server 2008 Recycling Computer Malfunction Reading Downloads Regulations WannaCry Windows XP PDF Unified Threat Management Time Management Society Keyboard Best Available Pirating Information Best Practives Adminstration Hacks Micrsooft Domains Windows 7 Product Reviews Motion Sickness Read Microserver Relocation Google Calendar Fiber-Optic Touchscreen Shortcut Tracking Content Management Value Identity Theft Piracy Software License Capital Productuvuty 3D Printing CrashOverride

hp supplies medallionLarge2017