Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why You Should Reexamine Your Business Practices

Tip of the Week: Why You Should Reexamine Your Business Practices

As a business adopts certain “best practices,” it is important for business leaders to consider why they are adopted, and more importantly, are they really for the best? There are many problems that subscribing to false best practices can produce, and so it becomes important to identify, adjust, and resolve them.

The term “best practices” is used exceptionally often in business communications, blogs, and other messages, to the point that it is fair to say that the term is bandied about just for the sake of using it. However, so much stake is placed in what is considered “best practice” that whatever is purported to be best is accepted without any further examination.

In his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business, and in an interview with the Harvard Business Review discussing this publication, Professor Freek Vermeulen discusses this phenomenon.

In the interview, the subject of reverse benchmarking is brought up, and with it, the example presented by Capitec. Capitec is a bank in South Africa that leveraged reverse benchmarking in order to cement their place in their market.

Reverse benchmarking is where you examine the standard practices of your particular industry in order to determine how one can do better, often by abandoning what other businesses treat as status quo. Returning to the Capitec example, Capitec observed that the other banks in South Africa were closing at 4 o’clock in the afternoon. In response to this, Capitec extended their hours to allow those who are employed to attend to their banking after work, and many of their branches have Saturday hours as well.

This is just one example of how “best practices” may not always be “best” for all businesses. However, when many businesses are questioned specifically regarding their supposed best practices, the response is often some variation of “this is what is safe and/or comfortable, and this is the way it has always been done.” According to Vermeulen, this is a good sign that there needs to be an examination into whether or not an organization is subscribing to practices because they are truly helpful, or if they are just stuck to the status quo.

There is also the danger of assuming that, because a company became successful by doing something, that something is a best practice. Vermeulen brought up the possibility that the companies who have reached the top have done so by following risky strategies and lucked out, while the vast majority of companies who did the same thing they did ultimately failed and died out in obscurity.

Vermeulen also acknowledges that changing an established practice is not an easy conclusion for many businesses to come to. According to him, companies will wait as long as they can before they make a change out of necessity--when they begin to see productivity and profitability suffer--but by then, change is more difficult to make.

This is why Vermeulen offers this advice: “Be proactive.”

By evaluating your business and establishing what actually works and--more importantly--what doesn’t, you can identify weak points and resolve them before they cause your business too much trouble.

BNMC can do the same for your IT, evaluating your systems and network to ensure that everything is up to standard. Give us a call at 978-482-2020 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 16 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Email Malware Hackers Business Computing Internet Microsoft Hosted Solutions Software IT Services Business Ransomware Android Computer Smartphone Google Windows Network Security Windows 10 Backup Small Business Business Continuity Data Browser Innovation Internet of Things App Hardware Data Management Managed IT Services Data Recovery User Tips Smartphones Tip of the week Outsourced IT Saving Money Remote Monitoring Artificial Intelligence Office 365 Encryption Mobile Devices Productivity IT Support Phishing Cloud Computing Upgrade Cybersecurity Gmail Office Tips IT Support Data storage Big Data Money Windows 10 Managed Service Provider Facebook Efficiency Vulnerability Risk Management Settings Word Robot Google Drive Productivity Employer-Employee Relationship communications Social Media Disaster Recovery Government Microsoft Office Unified Threat Management Passwords Managed IT Services LiFi Outlook Maintenance Monitors Administration Two-factor Authentication Save Money Content Filtering Automation Scam Mouse Analytics Miscellaneous Apple Mobile Device SaaS IT Management Network Virtual Private Network Holiday Business Management Telephone Systems Alert Computing Chrome Hosted Solution Server Firewall Bandwidth Workplace Tips Antivirus End of Support YouTube Data Backup Education Printer Time Management Safety Websites Black Friday Google Docs Scary Stories Search Hard Disk Drive Mobile Security Network Congestion Website Emergency Hacks Access Control Google Wallet Network Management Wi-Fi Unified Communications Cyber Monday Sports Business Growth Cabling Hotspot Computers Business Technology Password SharePoint Drones The Internet of Things Touchscreen How To Infrastructure Smart Technology Managed IT Hacker VoIP Language Display BYOD Lenovo WiFi Downloads Cybercrime Firefox Digital Payment Disaster Distributed Denial of Service Shortcut Alt Codes Marketing Computing Infrastructure Superfish Budget Uninterrupted Power Supply Managed IT Service Humor Patch Management Typing Customer Relationship Management IBM Computer Care Alerts Current Events IT solutions Multi-Factor Security Heating/Cooling Wireless Virtual Reality Break Fix Cryptocurrency Corporate Profile Training Communication Networking Going Green Automobile Google Calendar Running Cable Servers Dell Dark Web Storage Buisness VPN Bitcoin WannaCry Writing Virtual Desktop Data Security Printing Legislation Legal Laptop Server Management Google Maps Deep Learning Microsoft Excel Dark Data Windows 8 Quick Tips Data loss Retail Techology Spam Tablet Statistics desktop Bring Your Own Device Blockchain Customer Service Downtime Mail Merge Unified Threat Management VoIP Digital Office Politics Vendor Management Collaboration Comparison Operating System Bluetooth Gadgets Permissions Samsung Address Social User Error Information Technology Avoiding Downtime Spyware Social Engineering File Sharing Apps Specifications Halloween Best Practice Users Solid State Drive Fraud Identity Theft Personal Information Travel Cortana G Suite Crowdsourcing CrashOverride Supercomputer Botnet Motion Sickness Virtualization Taxes IT Budget Machine Learning Computer Repair IT Consultant Mobile Device Management Relocation How To Health Meetings Black Market Cleaning Work/Life Balance Mobile Computing Private Cloud Electronic Medical Records Webcam Twitter Law Enforcement Error Upgrades Ben McDonald shares Point of Sale Remote Computing Licensing Gadget 3D Printing Paperless Office Staffing Unsupported Software Administrator what was your? Update Web Server Processors GPS Mobile Data Recovery Cameras Tracking Chromebook CCTV Document Management Tech Support Physical Security Emoji Notifications

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3