Tip of the Week: Why You Should Reconsider Your Best Practices

Tip of the Week: Why You Should Reconsider Your Best Practices

The term “best practice” has been used by businesses for years to describe the optimal way of performing a particular task. However, before fully adopting them into business operations, it is important for these practices to be examined and deemed to be beneficial to an individual company’s circumstances. If they are not, a company risks much by adopting a misplaced best practice.

The major problem is that “best practices,” while useful if applied properly, is a term that has largely become a buzzword for businesses to use in their communications. This is dangerous, as there is a lot put at stake based on the term “best practice” alone. Therefore, it is crucial that so-called best practices are reviewed and examined before a business puts strategies based on these practices into place.

This was the argument made by Professor Freek Vermeulen in his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business. An interview with the Harvard Business Review allowed him to discuss the phenomenon further.

To provide an example of how best practices may not always be of a business’ best interest to follow, Vermeulen discussed a South African bank called Capitec and how they relied on reverse benchmarking to identify how to become an outlier in their industry.

The practice of reverse benchmarking can be summed up as the process of examining how one’s industry typically operates in order to identity weak spots in accepted practices and improve internal business operations. This can often lead to the abandonment of what is considered the status quo, if not heavily modifying it.

Capitec’s examinations revealed that other banks in South Africa had a tendency to close at four o’clock in the afternoon. To abandon this status quo, industry-standard practice, Capitec not only extended their hours to enable those who worked during the day to see to their banking needs once their work day was over, they even implemented Saturday hours in many of their branches. As a result, Capitec has since carved out a healthy market share for themselves.

This account is just one example that shows how what is standard practice might not be what is best for the business following it. However, many businesses give some push back when directly asked why they follow the practices they follow. These businesses often will respond with some statement that essentially says “this is what is comfortable” or “this is how it has always been done.” These answers are a good sign that, according to Vermeulen, an organization needs to run a self-audit to determine if they are enacting practices because they benefit the organization, or if they are simply resisting change.

Furthermore, there is the risk inherent in assuming that something that made a business successful is automatically a best practice. As Vermeulen mentioned in his interview, many companies who have reached the top may have simply been lucky as they enacted risk-laden strategies, and most of the companies who tried similar strategies have long since failed and been forgotten.

Of course, changing established practices and patterns is not easy for businesses to do. Vermeulen notes this, stating that many companies will hold out until they have no choice but to make a change. This is usually done at the point where their profits and productivity take a hit. However, waiting until this point often makes change more difficult for these companies. According to Vermeulen, the key to avoiding unnecessary difficulty is simple: “Be proactive.”

By taking the opportunity to audit your business practices before your company is stuck in a life or death situation, you can more clearly see where your company is weakest. Better yet, you will be able to remedy these weaknesses before your company is at risk.

Celera Networks can help you evaluate your IT solutions to ensure that they are not contributing to any weaknesses that your company may suffer from. Call us at (617) 375-9100 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 17 January 2018

Captcha Image

Request a Free Consultation

  • Company name *
  • First Name *
  • Last Name *
  • Title
  • Phone
  • What are your concerns?

      Sign up for our Newsletter!

      • Company *
      • First Name *
      • Last Name *

          Mobile? Grab this Article!

          QR-Code dieser Seite

          Tag Cloud

          security Tip of the Week technology Best Practices Cloud Privacy Hackers Productivity Business Computing business Malware Microsoft Internet IT Services Backup Hosted Solutions Managed Service Provider IT Support Email Workplace Tips Network Mobile Devices Hardware Communication Computer Smartphones Microsoft Office Disaster Recovery Holiday Windows Miscellaneous Mobile Device Management network security Small Business Business Continuity Windows 10 Efficiency Data Smartphone Server Alert Upgrade Saving Money Google Business Management Virtualization User Tips Software Social Media WiFi Remote Computing Operating System VoIP Internet of Things Big Data Android BYOD Gmail Passwords Ransomware The Internet of Things Mobile Computing App Cybersecurity Office Vendor Management Browser Innovation Remote Monitoring Apple Spam Phishing Collaboration Facebook Wireless Technology Apps Budget Business Growth Risk Management Analytics Artificial Intelligence Save Money Best Practice Going Green Tech Support Bring Your Own Device Office 365 Customer Service Gadgets Automation Hacker Robot Money Outsourced IT Office Tips IT Solutions Managed IT Services Information Technology Data Management Retail Hosted Solution IT service Bitcoin Document Management Data storage Recovery End of Support Health Hard Drives Cortana Proactive IT Outlook Current Events Application Employer-Employee Relationship Managed IT Avoiding Downtime Cost Management Mobile Device Presentation Hacking Content Filtering Firewall Computers Lithium-ion Battery Running Cable Customer Relationship Management IT Consultant virus Saving Time IT Support Education Network Congestion Virtual Desktop Windows 8 Analyitcs Administration Cryptocurrency Programming Specifications User Disaster Google Docs Quick Tips communications Laptop Two-factor Authentication Cybercrime Hacks Phone System Chrome USB VPN Twitter PowerPoint Social Samsung Antivirus iPhone LiFi Statistics Save Time Password intranet Net Neutrality Excel Hiring/Firing Tablet Social Engineering Maintenance Safety Downtime Mouse Business Owner project management Competition Encryption eWaste Marketing Website Work/Life Balance Wireless Search Settings Update Humor Bandwidth Trending Law Enforcement Private Cloud Paperless Office Fake News Typing Wi-Fi bdr Best Available Fraud data breaches Troubleshooting Television History Public Speaking People Gadget Business Intelligence Microsoft Excel Managed IT Services 5G risk Halloween Heating/Cooling Video Surveillance email scam Google Drive Cyber-attacks IBM Politics Public Cloud Online Currency Blockchain Licensing cyberattack Scary Stories Black Market Vulnerabilities SharePoint Managed Service Providers Telephony security breach Tip of the week Augmented Reality Piracy cyberattacks Sports Company Culture Computing Infrastructure Windows 8.1 Update Distributed Denial of Service Printer Unified Communications Training Fun Modern technology Digital Printing Data loss Storage Documents businesses Processors Vulnerability Display Evernote Printer Server Digital Signature Mobility File Sharing Entrepreneur business owners Virtual Assistant Computing IT Management Dark Data PDF Software as a Service Users Buisness Refrigeration Crowdfunding Notifications Networking Monitors Flexibility Data Warehousing Deep Learning IP Address Files Knowledge Hard Drive Google Wallet Google Calendar Co-managed IT Technology Tips CIO Telephone Systems Business Cards Writing Windows Server 2008 Mobile Office Websites Experience Productivity Help Desk Data Security Drones Access Control Computer Repair Mobile Technology User Error Crowdsourcing today ’s world Windows 7 Identities Botnet Router Hard Drive Disposal Mobile Payment Undo Government experience downtime Freedom of Information Solid State Drive Debate Word Skype Unified Threat Management Backups Consumers Data Breach Patch Management YouTube Memory Touchscreen Compliance News Alt Codes Travel LinkedIn Fiber-Optic Legal Downloads Regulations Environment Comparison Domains Motion Sickness Chromebook How To GPS Error Personal Information Cleaning Emoji Upgrades Tracking Electronic Medical Records Corporate Profile Computer Care 3D Printing Identity Theft Automobile WannaCry Staffing Unsupported Software Administrator Taxes Mobile Data Data Backup Sync Web Server Cloud Computing Supercomputer Mobile Device Managment Cameras Cabling IT Budget CCTV Infrastructure Digital Payment G Suite Virtual Reality Point of Sale Uninterrupted Power Supply Google Maps test post Machine Learning Unified Threat Management SaaS Meetings Relocation Physical Security Hard Disk Drive Software Tips Webcam