LiveChat Live Help
Contact us today!
(248) 218-5018
facebooktwittergooglelinkedinyoutubeExpetec Technology Services RSS Feed
 

Expetec Technology Services Blog

Expetec Technology Services has been serving the Troy area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why You Should Reconsider Your Best Practices

Tip of the Week: Why You Should Reconsider Your Best Practices

The term “best practice” has been used by businesses for years to describe the optimal way of performing a particular task. However, before fully adopting them into business operations, it is important for these practices to be examined and deemed to be beneficial to an individual company’s circumstances. If they are not, a company risks much by adopting a misplaced best practice.

The major problem is that “best practices,” while useful if applied properly, is a term that has largely become a buzzword for businesses to use in their communications. This is dangerous, as there is a lot put at stake based on the term “best practice” alone. Therefore, it is crucial that so-called best practices are reviewed and examined before a business puts strategies based on these practices into place.

This was the argument made by Professor Freek Vermeulen in his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business. An interview with the Harvard Business Review allowed him to discuss the phenomenon further.

To provide an example of how best practices may not always be of a business’ best interest to follow, Vermeulen discussed a South African bank called Capitec and how they relied on reverse benchmarking to identify how to become an outlier in their industry.

The practice of reverse benchmarking can be summed up as the process of examining how one’s industry typically operates in order to identity weak spots in accepted practices and improve internal business operations. This can often lead to the abandonment of what is considered the status quo, if not heavily modifying it.

Capitec’s examinations revealed that other banks in South Africa had a tendency to close at four o’clock in the afternoon. To abandon this status quo, industry-standard practice, Capitec not only extended their hours to enable those who worked during the day to see to their banking needs once their work day was over, they even implemented Saturday hours in many of their branches. As a result, Capitec has since carved out a healthy market share for themselves.

This account is just one example that shows how what is standard practice might not be what is best for the business following it. However, many businesses give some push back when directly asked why they follow the practices they follow. These businesses often will respond with some statement that essentially says “this is what is comfortable” or “this is how it has always been done.” These answers are a good sign that, according to Vermeulen, an organization needs to run a self-audit to determine if they are enacting practices because they benefit the organization, or if they are simply resisting change.

Furthermore, there is the risk inherent in assuming that something that made a business successful is automatically a best practice. As Vermeulen mentioned in his interview, many companies who have reached the top may have simply been lucky as they enacted risk-laden strategies, and most of the companies who tried similar strategies have long since failed and been forgotten.

Of course, changing established practices and patterns is not easy for businesses to do. Vermeulen notes this, stating that many companies will hold out until they have no choice but to make a change. This is usually done at the point where their profits and productivity take a hit. However, waiting until this point often makes change more difficult for these companies. According to Vermeulen, the key to avoiding unnecessary difficulty is simple: “Be proactive.”

By taking the opportunity to audit your business practices before your company is stuck in a life or death situation, you can more clearly see where your company is weakest. Better yet, you will be able to remedy these weaknesses before your company is at risk.

Expetec Technology Services can help you evaluate your IT solutions to ensure that they are not contributing to any weaknesses that your company may suffer from. Call us at (248) 218-5018 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 23 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Sign Up for Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Tip of the Week Privacy Technology Best Practices Cloud Internet hackers Business Computing Productivity malware Business IT Support Backup Microsoft Email Software Data Network Security IT Services Hardware Efficiency Hosted Solutions Managed Service Provider User Tips Mobile devices Mobile Device Management Computer Disaster Recovery Workplace Tips Google Business Management Microsoft Office Smartphone Android Holiday Ransomware Miscellaneous Remote Monitoring The Internet of Things Smartphones Network analytics Virtualization Business Continuity Windows Social Media Operating System Small Business BYOD Collaboration Remote Computing Server VoIP Unified Threat Management Phishing Mobile Computing WiFi IT Support Passwords Managed IT Services Alert Cybersecurity Windows 10 Save Money Outsourced IT Upgrade BDR Big Data Data Management Gmail Managed IT communications Saving Money Office Firewall Vendor Management apple Innovation Communication Outlook Internet of Things Artificial Intelligence Search Productivity Lithium-ion battery Employer-Employee Relationship Browser Managed IT services Quick Tips Facebook History Budget Cost Management Help Desk Hiring/Firing Content Filtering Hard Drives Hacking Best Practice App Bandwidth Recovery Encryption Saving Time Marketing Automation Running Cable IT Management Wireless Technology Customer Service Proactive IT Money Update Windows 10 Document Management Save Time Information Technology Data storage Mobility Tech Support SaaS Hard Drive Office 365 User Data Backup Hosted Solution Intranet Data Recovery Robot Networking Disaster Cybercrime Gadgets Project Management IBM Antivirus Spam tablet Health IT Consultant Apps Two-factor Authentication Bring Your Own Device Word Law Enforcement Excel Website iphone Uninterrupted Power Supply Documents PowerPoint Monitors Scam Bitcoin Wireless Downtime Software as a Service Google Docs Google Maps Company Culture Phone System Cloud Computing Compliance Social Networking Legal Administration Travel eWaste Experience VPN Current Events Computing Infrastructure Specifications Safety avoiding downtime Access Control Virtual Desktop End of Support Maintenance Net Neutrality Telephone Systems DDoS Data Security Education Heating/Cooling Presentation Patch Management YouTube Virus Social Chrome Unified Communications Cortana Network Congestion Programming Business Growth Business Intelligence Digital Risk Management Telephony Password Mobile Device Laptop Solid State Drive Training Computers Unified Threat Management Flexibility IT service Retail Start Menu Cryptocurrency Comparison Going Green Government IT consulting Bluetooth Troubleshooting Business Technology Microsoft Excel Cache Cleaning Politics Entrepreneur Application Websites Television Sports Windows XP Settings Business Owner Domains Data Protection Assessment Society Public Cloud PDF Router Mouse Displays Blockchain LinkedIn Inbound Marketing USB Knowledge Corporate Profile Consultation Windows 8 Skype Co-Managed IT Trending Office Tips SharePoint Upgrades Tip of the week Tech Terms VoIP Bata Backup Printer How To Audit Customer Relationship Management Pain Points Micrsooft Cabling Evernote Computer Repair Capital Virtual Assistant LiFi Statistics Vendor Mangement Product Reviews Printing Environment Staffing Digital Signature HIPAA Worker Data Warehousing Productuvuty Hard Drive Disposal Visible Light Communication Entertainment Teamwork Business Mangement Music Sync Downloads Writing Public Speaking Deep Learning Licensing Windows Server 2008 Electricity Fiber-Optic Advertising Data Loss Gaming Console Black Market Hack Google Calendar Securty Keyboard Hacker Redundancy Windows 7 Streaming Media WannaCry Fraud Social Engineering Online Currency Best Available Data Breach Google Drive Distributed Denial of Service Technology Tips Shortcut Regulations IP Address Freedom of Information email scam Permissions Value Content Management Read Time Management Google Wallet Emails Computer Accessories Computing Storage Augmented Reality Risk Mangaement Emergency News switches Access Vulnerabilities Electronic Payment Processors Drones Computer Care Mobile Technology CIO Vulnerability Fake News Spyware Business Cards File Sharing Human Resources Archive Competition Touchscreen Mobile Payment User Error

      Top Blog

      Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
      QR-Code