Tip of the Week: Why You Should Reconsider Your Best Practices

Tip of the Week: Why You Should Reconsider Your Best Practices

The term “best practice” has been used by businesses for years to describe the optimal way of performing a particular task. However, before fully adopting them into business operations, it is important for these practices to be examined and deemed to be beneficial to an individual company’s circumstances. If they are not, a company risks much by adopting a misplaced best practice.

The major problem is that “best practices,” while useful if applied properly, is a term that has largely become a buzzword for businesses to use in their communications. This is dangerous, as there is a lot put at stake based on the term “best practice” alone. Therefore, it is crucial that so-called best practices are reviewed and examined before a business puts strategies based on these practices into place.

This was the argument made by Professor Freek Vermeulen in his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business. An interview with the Harvard Business Review allowed him to discuss the phenomenon further.

To provide an example of how best practices may not always be of a business’ best interest to follow, Vermeulen discussed a South African bank called Capitec and how they relied on reverse benchmarking to identify how to become an outlier in their industry.

The practice of reverse benchmarking can be summed up as the process of examining how one’s industry typically operates in order to identity weak spots in accepted practices and improve internal business operations. This can often lead to the abandonment of what is considered the status quo, if not heavily modifying it.

Capitec’s examinations revealed that other banks in South Africa had a tendency to close at four o’clock in the afternoon. To abandon this status quo, industry-standard practice, Capitec not only extended their hours to enable those who worked during the day to see to their banking needs once their work day was over, they even implemented Saturday hours in many of their branches. As a result, Capitec has since carved out a healthy market share for themselves.

This account is just one example that shows how what is standard practice might not be what is best for the business following it. However, many businesses give some push back when directly asked why they follow the practices they follow. These businesses often will respond with some statement that essentially says “this is what is comfortable” or “this is how it has always been done.” These answers are a good sign that, according to Vermeulen, an organization needs to run a self-audit to determine if they are enacting practices because they benefit the organization, or if they are simply resisting change.

Furthermore, there is the risk inherent in assuming that something that made a business successful is automatically a best practice. As Vermeulen mentioned in his interview, many companies who have reached the top may have simply been lucky as they enacted risk-laden strategies, and most of the companies who tried similar strategies have long since failed and been forgotten.

Of course, changing established practices and patterns is not easy for businesses to do. Vermeulen notes this, stating that many companies will hold out until they have no choice but to make a change. This is usually done at the point where their profits and productivity take a hit. However, waiting until this point often makes change more difficult for these companies. According to Vermeulen, the key to avoiding unnecessary difficulty is simple: “Be proactive.”

By taking the opportunity to audit your business practices before your company is stuck in a life or death situation, you can more clearly see where your company is weakest. Better yet, you will be able to remedy these weaknesses before your company is at risk.

Celera Networks can help you evaluate your IT solutions to ensure that they are not contributing to any weaknesses that your company may suffer from. Call us at (617) 375-9100 for more information.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 18 March 2018

Captcha Image

Request a Free Consultation

  • Company name *
  • First Name *
  • Last Name *
  • Title
  • Phone
  • What are your concerns?

      Sign up for our Newsletter!

      • Company *
      • First Name *
      • Last Name *

          Mobile? Grab this Article!

          QR-Code dieser Seite

          Tag Cloud

          security Tip of the Week technology Privacy Best Practices Cloud Hackers Business Computing Productivity business Malware Microsoft Internet IT Services Backup IT Support Hosted Solutions Managed Service Provider Email Network Mobile Devices Workplace Tips Hardware Communication Smartphones Disaster Recovery Computer Mobile Device Management Microsoft Office Holiday network security Windows Miscellaneous Efficiency Software Data Windows 10 Small Business Business Continuity Server Alert Smartphone Google Virtualization Upgrade Saving Money User Tips Business Management Internet of Things Remote Monitoring Innovation Ransomware Social Media WiFi Passwords Gmail Big Data Cybersecurity Android Remote Computing Operating System VoIP BYOD App Office Browser The Internet of Things Mobile Computing Apple Apps Spam Vendor Management Information Technology Business Growth Risk Management Artificial Intelligence Hacking Phishing Facebook Budget Collaboration Wireless Technology Analytics Cost Management Robot Customer Service Outsourced IT Automation IT Solutions Office Tips Money Save Money Data Management Going Green Office 365 Retail Managed IT Services Best Practice Gadgets Cybercrime Tech Support Bring Your Own Device Hacker Employer-Employee Relationship VPN Health Maintenance Computers Outlook End of Support IT Consultant Saving Time Application Website Presentation Firewall Content Filtering Downtime Managed IT Running Cable Lithium-ion Battery Mobile Device Customer Relationship Management virus Social Engineering Hosted Solution Document Management Bitcoin IT service communications Two-factor Authentication Antivirus Recovery Data storage Proactive IT Current Events intranet Hard Drives Avoiding Downtime Cortana Laptop Chrome Mobile Technology USB project management PowerPoint Samsung Statistics Password Data Breach Save Time Safety Marketing Data Recovery Mouse Twitter Encryption IT Support Excel Hiring/Firing Wireless Windows 8 Tablet Settings Bandwidth Business Owner Virtual Desktop Competition Administration Websites Blockchain Productivity Vulnerabilities Cryptocurrency Quick Tips eWaste Search Humor Company Culture Trending Google Docs Education Analyitcs Hacks Network Congestion Augmented Reality iPhone Work/Life Balance Programming Specifications Update Social Cloud Computing User Law Enforcement Disaster Private Cloud LiFi Net Neutrality Data Security Phone System Piracy Software License Google Wallet Knowledge Computer Repair CIO Multi-factor Authentication Politics Windows 7 Public Cloud Hard Drive Disposal Router Mobile Office Redundancy Documents Drones Black Market Mobile Payment Experience User Error Identity Theft Device security Telephony Freedom of Information Digital Signature Unified Threat Management Identities security breach PDF Patch Management Touchscreen Crowdfunding Undo Tech Term Training News Fiber-Optic Solid State Drive Modern technology Downloads Word IT Plan Co-managed IT Backups Processors Comparison Display YouTube Mobility HTML File Sharing Fake News Fraud Alt Codes business owners data breaches Migration Legal Notifications Television Monitors Flexibility Managed IT Services Domains Data Protection Files Microsoft Excel email scam Typing risk Wi-Fi Business Technology Telephone Systems Cyber-attacks bdr Writing Online Currency Debate Public Speaking Consumers Help Desk cyberattack 5G Skype Business Intelligence Memory Heating/Cooling Desktop Google Drive Crowdsourcing SharePoint Halloween Tip of the week today ’s world IBM Botnet Computing Infrastructure Virtual Reality cyberattacks LinkedIn Windows 8.1 Update Printer Applications Environment Government Distributed Denial of Service Scary Stories Digital experience downtime Data loss Vulnerability businesses Best Available People Printer Server Mobile Security Troubleshooting Evernote History Sports Compliance Virtual Assistant Unified Communications IT Management Users Travel Networking Printing Software as a Service Fun Video Surveillance Regulations Storage Data Warehousing Hard Drive Paperless Office Google Calendar Licensing Business Cards Computing Technology Tips Entrepreneur Buisness Managed Service Providers Refrigeration Dark Data Gadget Windows Server 2008 Deep Learning Access Control IP Address Cleaning Emoji Upgrades Infrastructure Tracking Electronic Medical Records Computer Care 3D Printing Uninterrupted Power Supply Automobile Staffing Unsupported Software Hard Disk Drive Administrator test post Taxes Mobile Data Sync Web Server Supercomputer Mobile Device Managment Cameras Corporate Profile IT Budget Devices CCTV WannaCry Digital Payment G Suite Point of Sale Google Maps Machine Learning Unified Threat Management SaaS Data Backup Meetings Relocation Physical Security Software Tips Webcam Value Motion Sickness Chromebook How To Cabling GPS UTM Error Personal Information