BNMC Blog

Tip of the Week: Why You Should Reexamine Your Business Practices

Tip of the Week: Why You Should Reexamine Your Business Practices

As a business adopts certain “best practices,” it is important for business leaders to consider why they are adopted, and more importantly, are they really for the best? There are many problems that subscribing to false best practices can produce, and so it becomes important to identify, adjust, and resolve them.

The term “best practices” is used exceptionally often in business communications, blogs, and other messages, to the point that it is fair to say that the term is bandied about just for the sake of using it. However, so much stake is placed in what is considered “best practice” that whatever is purported to be best is accepted without any further examination.

In his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business, and in an interview with the Harvard Business Review discussing this publication, Professor Freek Vermeulen discusses this phenomenon.

In the interview, the subject of reverse benchmarking is brought up, and with it, the example presented by Capitec. Capitec is a bank in South Africa that leveraged reverse benchmarking in order to cement their place in their market.

Reverse benchmarking is where you examine the standard practices of your particular industry in order to determine how one can do better, often by abandoning what other businesses treat as status quo. Returning to the Capitec example, Capitec observed that the other banks in South Africa were closing at 4 o’clock in the afternoon. In response to this, Capitec extended their hours to allow those who are employed to attend to their banking after work, and many of their branches have Saturday hours as well.

This is just one example of how “best practices” may not always be “best” for all businesses. However, when many businesses are questioned specifically regarding their supposed best practices, the response is often some variation of “this is what is safe and/or comfortable, and this is the way it has always been done.” According to Vermeulen, this is a good sign that there needs to be an examination into whether or not an organization is subscribing to practices because they are truly helpful, or if they are just stuck to the status quo.

There is also the danger of assuming that, because a company became successful by doing something, that something is a best practice. Vermeulen brought up the possibility that the companies who have reached the top have done so by following risky strategies and lucked out, while the vast majority of companies who did the same thing they did ultimately failed and died out in obscurity.

Vermeulen also acknowledges that changing an established practice is not an easy conclusion for many businesses to come to. According to him, companies will wait as long as they can before they make a change out of necessity--when they begin to see productivity and profitability suffer--but by then, change is more difficult to make.

This is why Vermeulen offers this advice: “Be proactive.”

By evaluating your business and establishing what actually works and--more importantly--what doesn’t, you can identify weak points and resolve them before they cause your business too much trouble.

BNMC can do the same for your IT, evaluating your systems and network to ensure that everything is up to standard. Give us a call at 978-482-2020 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, December 17 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Malware Business Computing Business User Tips Network Security Hackers Software Tech Term Internet Microsoft Google Computer IT Services Efficiency Ransomware Mobile Devices Hosted Solutions Communication Smartphone Small Business IT Support Backup Managed IT Services Data Productivity Android Saving Money Data Management Managed IT Services Business Continuity Hardware Windows 10 Cloud Computing Windows Browser Innovation Internet of Things Data Recovery Business Management App Microsoft Office Productivity Data Backup Cybersecurity Workplace Tips Office 365 Upgrade Windows 10 Word Outsourced IT Disaster Recovery Artificial Intelligence Encryption Gmail Passwords Server Mobile Device Remote Monitoring Facebook Infrastructure Applications Website Analytics communications BYOD Tip of the week Smartphones Network Employer-Employee Relationship Money Vulnerability IT Support Chrome Managed Service Provider Phishing Google Drive YouTube Content Filtering Bandwidth Social Media Miscellaneous Government Risk Management Office Tips Maintenance Company Culture Big Data Antivirus Data storage VoIP Robot Managed Service Save Money Settings Users IT Management Server Management Business Technology Administration HIPAA Mouse Data loss Virtual Private Network Unified Threat Management Touchscreen SaaS Telephone Systems Mobile Security Quick Tips desktop Apple Education Holiday Business Intelligence Storage Firewall Laptop Alert Printing The Internet of Things Display Two-factor Authentication Avoiding Downtime Wireless Scam Monitors Employee-Employer Relationship Vendor Management Managing Stress Outlook Spam Computing Operating System Development Automation WiFi Paperless Office LiFi VPN End of Support Information Access Control Virtual Reality Data Security Hosted Solution Smart Office Legislation Best Practice Screen Reader Charging Remote Computing Onboarding Current Events Print Toner Wires Network Congestion Microsoft Excel Slack Licensing Dongle SharePoint Managed IT Solar Smart Technology Scary Stories Cryptocurrency Assessment Techology Apps Content Statistics Work Tablet Wi-Fi Running Cable Google Docs Digital Payment How To Smart Tech Lenovo Writing IT solutions Digital Signage Going Green Digital Router Mail Merge Voice over Internet Protocol Computers Blockchain Buisness Monitoring Hacks Disaster Cooperation Service Level Agreement Downloads Streaming Google Wallet Compliance Shortcut Dark Data Distributed Denial of Service Update Sports Bitcoin Collaboration Hotspot VoIP Internet Exlporer Unified Threat Management Virtual Desktop IT Technicians Bluetooth Optimization Comparison Business Growth Firefox Connectivity Superfish Retail Troubleshooting Legal Document Management Spyware Modem Address FinTech Permissions Spying Password Uninterrupted Power Supply Staff Leominster Politics Unified Communications Human Error Drones Computer Care IBM Regulations Patch Management Customer Service Managed IT Service Analysis Windows 8 File Sharing Language Value User Error Solid State Drive Mirgation Recycling Specifications Hacker Customer Relationship Management IoT Office Samsung Tech Support Cybercrime Deep Learning Identity Theft Cookies MSP Downtime Mobile Device Management Augmented Reality Heating/Cooling K-12 Schools Multi-Factor Security Device Training Corporate Profile Social Networking Break Fix Chromebook Marketing Computing Infrastructure Time Management Professional Services Printer Hard Disk Drive Chatbots Search eWaste Black Friday Gadgets Alt Codes Automobile Star Wars Networking Social Engineering LED Websites Bring Your Own Device Nanotechnology Emergency PowerPoint Dell Wearable Technology Servers Network upgrade Google Calendar Mobility Budget WannaCry Motherboard Cables Dark Web Social Cabling Alerts Network Management USB Identity Continuity Cyber Monday Halloween Typing Humor Google Maps Fraud Cost Management Safety Co-Managed IT Information Technology Personal Information Botnet IT Budget Web Server what was your? GPS BDR Cortana 3D Printing IT Consultant Machine Learning Regulation Processors Cameras Tracking Virtualization Meetings Unsupported Software Cleaning Computer Repair Relocation CCTV Webcam Mobile Data Recovery How To Work/Life Balance Health Private Cloud Error Printers Black Market Point of Sale Ben McDonald shares Travel Law Enforcement G Suite Electronic Medical Records Notifications Physical Security Supercomputer CrashOverride Twitter Mobile Computing Staffing Emoji Motion Sickness Upgrades Gadget Taxes Administrator Crowdsourcing

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3