Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why You Should Reconsider Your Best Practices

Tip of the Week: Why You Should Reconsider Your Best Practices

The term “best practice” has been used by businesses for years to describe the optimal way of performing a particular task. However, before fully adopting them into business operations, it is important for these practices to be examined and deemed to be beneficial to an individual company’s circumstances. If they are not, a company risks much by adopting a misplaced best practice.

The major problem is that “best practices,” while useful if applied properly, is a term that has largely become a buzzword for businesses to use in their communications. This is dangerous, as there is a lot put at stake based on the term “best practice” alone. Therefore, it is crucial that so-called best practices are reviewed and examined before a business puts strategies based on these practices into place.

This was the argument made by Professor Freek Vermeulen in his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business. An interview with the Harvard Business Review allowed him to discuss the phenomenon further.

To provide an example of how best practices may not always be of a business’ best interest to follow, Vermeulen discussed a South African bank called Capitec and how they relied on reverse benchmarking to identify how to become an outlier in their industry.

The practice of reverse benchmarking can be summed up as the process of examining how one’s industry typically operates in order to identity weak spots in accepted practices and improve internal business operations. This can often lead to the abandonment of what is considered the status quo, if not heavily modifying it.

Capitec’s examinations revealed that other banks in South Africa had a tendency to close at four o’clock in the afternoon. To abandon this status quo, industry-standard practice, Capitec not only extended their hours to enable those who worked during the day to see to their banking needs once their work day was over, they even implemented Saturday hours in many of their branches. As a result, Capitec has since carved out a healthy market share for themselves.

This account is just one example that shows how what is standard practice might not be what is best for the business following it. However, many businesses give some push back when directly asked why they follow the practices they follow. These businesses often will respond with some statement that essentially says “this is what is comfortable” or “this is how it has always been done.” These answers are a good sign that, according to Vermeulen, an organization needs to run a self-audit to determine if they are enacting practices because they benefit the organization, or if they are simply resisting change.

Furthermore, there is the risk inherent in assuming that something that made a business successful is automatically a best practice. As Vermeulen mentioned in his interview, many companies who have reached the top may have simply been lucky as they enacted risk-laden strategies, and most of the companies who tried similar strategies have long since failed and been forgotten.

Of course, changing established practices and patterns is not easy for businesses to do. Vermeulen notes this, stating that many companies will hold out until they have no choice but to make a change. This is usually done at the point where their profits and productivity take a hit. However, waiting until this point often makes change more difficult for these companies. According to Vermeulen, the key to avoiding unnecessary difficulty is simple: “Be proactive.”

By taking the opportunity to audit your business practices before your company is stuck in a life or death situation, you can more clearly see where your company is weakest. Better yet, you will be able to remedy these weaknesses before your company is at risk.

Computerware can help you evaluate your IT solutions to ensure that they are not contributing to any weaknesses that your company may suffer from. Call us at (703) 821-8200 for more information.

Proper Hard Drive Disposal is An Involved Process
Which is More Secure, Your Mobile Network or Wi-Fi...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 21 April 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Business Computing Hackers Backup Managed Service Provider Productivity Workplace Tips Data Hardware Business Saving Money Malware Email IT Support IT Services Hosted Solutions Google Network Security Small Business Efficiency Quick Tips Smartphones Gadgets Mobile Devices User Tips Business Continuity Disaster Recovery Computer Virtualization Mobile Office Network Microsoft Office VoIP Social Media Server Smartphone Mobile Device Management Android Windows 10 Miscellaneous Innovation Upgrade Unified Threat Management Windows Ransomware Remote Monitoring Passwords Holiday Operating System Remote Computing Mobile Computing WiFi Vendor Management Collaboration BYOD Communication Apps The Internet of Things Marketing Facebook Users Analytics Cybersecurity Firewall History Apple Managed IT services Data Management IT Support Productivity communications Alert Phishing Internet of Things Save Money Managed IT Services IT Consultant Outsourced IT Content Filtering BDR Spam Health Bring Your Own Device Automation Gmail Office Big data App Tech Support Information Technology Best Practice Going Green Data Backup Hiring/Firing Mobile Device Wireless Technology Bandwidth Search Outlook Browser Maintenance Lithium-ion Battery Virus Budget Hard Drives Data Recovery Antivirus Windows 8 Managed IT Artificial Intelligence Hacking Printer Money IBM Office 365 Recovery Employer-Employee Relationship Update Encryption Cost Management Phone System Help Desk Legal Save Time Document Management SaaS Running Cable Saving Time It Management Hard Drive Government Intranet Cybercrime Risk Management Administration Networking Training Proactive IT Two-factor Authentication Customer Service Computers Law Enforcement VPN Travel Website Education Data storage Cloud Computing Humor Business Intelligence Project Management Avoiding Downtime User Computer Repair Current Events Hosted Solution Excel Robot DDoS Compliance Social Engineering Mobility Word Black Market Password Cortana Business Growth Windows 10 Digital Payment Hacker Downtime Telephone Systems Comparison Tablet Company Culture Augmented Reality PowerPoint Access Control Disaster Social Networking End of Support Wireless Data Security Securty Twitter Solid State Drive Fax Server Data Loss Flexibility iPhone Data Breach Laptop Mobile Technology Private Cloud Cleaning Office Tips Regulations Tech Term Paperless Office Bitcoin Sports Trending Distributed Denial of Service Computing Specifications Pain Points Safety Public Cloud Identity Theft Social Blockchain Statistics User Error IT service Network Congestion Virtual Reality Business Technology Bluetooth Streaming Media Gaming Console Inbound Marketing Automobile Computing Infrastructure Scam Webcam How To Chrome Digital Telephony Monitors Router Websites Processors USB Tech Terms Computer Accessories Start Menu YouTube Customer Relationship Management Taxes Presentation Settings Unified Communications Software as a Service Virtual Desktop Mouse Uninterrupted Power Supply Co-managed IT Documents Programming Text Messaging Heating/Cooling Data Protection Politics Patch Management Google Maps Lifestyle Retail Emails Experience eWaste Cryptocurrency Redundancy Hack Vulnerabilities Google Docs Net Neutrality Value Troubleshooting IT consulting Consultation Meetings Books Device security Staffing Environment Microsoft Excel Content Management Cabling Administrator Smart Phones Microchip Competition Business Cards Get More Done Audit CIO Business Owner Mobile Payment Windows XP Supercomputer Reading Printer Server Machine Learning Society Emergency Video Surveillance Worker Saving ZTime Hacks Application Piracy Micrsooft LinkedIn Computer Care Television Google Drive Employer Employee Relationship Relocation HTML Archive Vulnerability Debate Licensing Electricity Botnet Notifications Software License Digital Signature Printing Webinar Entertainment SharePoint Point of Contact Upselling Reliable Computing Devices Tip of the week Music WannaCry Thin CLient Computer Malfunction IT Plan Upgrades Downloads Evernote LiFi Analytic Time Management Accountants Virtual Assistant Leadership Motion Sickness Rental Service Public Speaking Migration Best Practives Deep Learning Google Calendar Memory Data Warehousing Visible Light Communication Touchscreen Tracking Equifax Microserver Wi-Fi Entrepreneur Hard Drive Disposal Knowledge Device Management Business Managemenet Web Server Desktop HIPAA Technology Tips Flash Electronic Payment Windows Server 2008 Advertising Workers Startup Turn Key Unified Threat Management Google Wallet online Currency Access IP Address Applications Trojan Displays Smart Tech Organize Windows 7 Samsung Human Resources G Suite Banking Fiber-Optic Drones Skype Spyware Physical Security File Sharing Mobile Security Multi-Factor Security Language Freedom of Information Permissions Tablets GPS Sync Business Metrics Fraud Teamwork switches cache CCTV UTM Writing Storage Legislation PDF News Ebay 3D Corporate Profile In Internet of Things Chromebook Keyboard email scam Best Available Recycling Product Reviews Assessment Harddrive Messenger Domains Multi-factor Authentication Scalability Wireless Headphones Work/Life Balance Fake News Read Pirating Information Adminstration VoIP External Harddrive Download Shortcut 3D Printing Nanotechnology Capital Productuvuty CrashOverride