Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why You Should Reexamine Your Business Practices

Tip of the Week: Why You Should Reexamine Your Business Practices

As a business adopts certain “best practices,” it is important for business leaders to consider why they are adopted, and more importantly, are they really for the best? There are many problems that subscribing to false best practices can produce, and so it becomes important to identify, adjust, and resolve them.

The term “best practices” is used exceptionally often in business communications, blogs, and other messages, to the point that it is fair to say that the term is bandied about just for the sake of using it. However, so much stake is placed in what is considered “best practice” that whatever is purported to be best is accepted without any further examination.

In his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business, and in an interview with the Harvard Business Review discussing this publication, Professor Freek Vermeulen discusses this phenomenon.

In the interview, the subject of reverse benchmarking is brought up, and with it, the example presented by Capitec. Capitec is a bank in South Africa that leveraged reverse benchmarking in order to cement their place in their market.

Reverse benchmarking is where you examine the standard practices of your particular industry in order to determine how one can do better, often by abandoning what other businesses treat as status quo. Returning to the Capitec example, Capitec observed that the other banks in South Africa were closing at 4 o’clock in the afternoon. In response to this, Capitec extended their hours to allow those who are employed to attend to their banking after work, and many of their branches have Saturday hours as well.

This is just one example of how “best practices” may not always be “best” for all businesses. However, when many businesses are questioned specifically regarding their supposed best practices, the response is often some variation of “this is what is safe and/or comfortable, and this is the way it has always been done.” According to Vermeulen, this is a good sign that there needs to be an examination into whether or not an organization is subscribing to practices because they are truly helpful, or if they are just stuck to the status quo.

There is also the danger of assuming that, because a company became successful by doing something, that something is a best practice. Vermeulen brought up the possibility that the companies who have reached the top have done so by following risky strategies and lucked out, while the vast majority of companies who did the same thing they did ultimately failed and died out in obscurity.

Vermeulen also acknowledges that changing an established practice is not an easy conclusion for many businesses to come to. According to him, companies will wait as long as they can before they make a change out of necessity--when they begin to see productivity and profitability suffer--but by then, change is more difficult to make.

This is why Vermeulen offers this advice: “Be proactive.”

By evaluating your business and establishing what actually works and--more importantly--what doesn’t, you can identify weak points and resolve them before they cause your business too much trouble.

Telesys Voice and Data can do the same for your IT, evaluating your systems and network to ensure that everything is up to standard. Give us a call at (800) 588-4430 for more information.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Sunday, 15 September 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Productivity Business Hosted Solutions Microsoft Software Internet Network Security IT Services Computer Windows 10 Managed Service Provider Productivity Backup Ransomware Innovation Outsourced IT Mobile Devices Smartphone Data Backup Android Hardware User Tips Google Managed IT services Social Media Business Continuity Efficiency Browser Communication IT Support Disaster Recovery Workplace Tips Upgrade Data Recovery Data Managed IT Services Small Business Business Management Cloud Computing IT Support Data Management Smartphones App Holiday Internet of Things Microsoft Office Phishing Office Server Remote Monitoring Windows Miscellaneous WiFi Facebook Paperless Office Network Office 365 Artificial Intelligence Spam Gmail Big Data Passwords Save Money Encryption communications Password Tech Term VoIP Customer Relationship Management Unified Threat Management Bandwidth Firewall Apps Robot Hosted Solution Recovery Collaboration Employer-Employee Relationship Saving Money Document Management Risk Management Cybersecurity Word Hacker Chrome How To Content Filtering Government Apple Avoiding Downtime Money Work/Life Balance Downtime Wi-Fi Customer Service Managed IT Mobile Device Management Infrastructure Office Tips Operating System Windows 10 Tip of the week Remote Computing Analytics Vendor Management Compliance The Internet of Things Automation Going Green Computers Vulnerability Alert Help Desk Printing Outlook Data storage Data Security Applications Computing Education IT Management Cybercrime Virtual Reality Health Training Mobile Device Antivirus SaaS BYOD Hacking Social Mobile Computing Data loss Project Management Website Tech Support BDR Business Technology Telephone Systems Two-factor Authentication File Sharing Settings Healthcare Presentation Business Growth Identity Theft Google Drive Scam Websites Physical Security Augmented Reality Regulations Taxes Specifications Proactive IBM Running Cable Botnet VPN Net Neutrality Assessment Samsung Remote Monitoring and Management User Server Management Licensing Bring Your Own Device Search Windows 7 Virtual Private Network Smart Technology Meetings Consultation Digital Payment Sports Storage HIPAA Retail IT service Software as a Service Maintenance Cortana Router Mobile Security Best Practice Computer Care Virtualization Administration Lithium-ion battery Business Owner IT solutions Safety Marketing Wireless Technology Tablet Upgrades Wireless Automobile Budget Laptops Access Control End of Support Competition Mouse Information Technology YouTube Unified Communications Legal Humor Display LiFi Twitter Analyitcs Politics Monitors Managed Service Patch Management Travel G Suite How To Processors Laptop Cost Management Batteries Hard Drives Permissions Internet Protocol Flexibility Phone System Heating/Cooling Google Calendar Virtual Desktop MSP Virtual Assistant Fort Worth IT Motion Sickness Hard Disk Drive Firefox Supercomputer Halloween Google Docs Recycling Remote Work Refrigeration Networking Fraud VoIP streamlines Operations Bookmarks Servers Legislation Writing Deep Learning Personal Information Fun Social Networking Voice over Internet Protocol DFW IT Service IT Consultant IT Budget Scary Stories Management File Management business network infrastructure Wearable Technology Favorites Machine Learning Social Engineering Computer Repair Motherboard Techology Internet Exlporer Cleaning Notifications Enterprise Resource Planning Undo WPA3 iPhone IP Address Conferencing Statistics Relocation Software Tips Webcam Alt Codes Electronic Medical Records Google Wallet Manufacturing Mail Merge Distributed Denial of Service Disaster Resistance data services Crowdsourcing Dark Data Mobile Fleet Tracking Mobile Office IT Technicians Employees Bluetooth Technology Tips Private Cloud Point of Sale Corporate Profile Typing Drones Modem Proactive Maintenance Address Managed IT Service Proactive IT Hotspot Quick Tips User Error Buisness Company Culture Asset Tracking Mirgation Zero-Day Threat Comparison Error History WannaCry Cryptocurrency Knowledge Cookies Processor Redundancy Break Fix IT Consulting Language PowerPoint Time Management Printer Vulnerabilities Remote Workers Migration Backup and Disaster Recovery Mobility Black Friday Cabling Web Server Bitcoin Update Staffing Experience Nanotechnology Consumers Dark Web Data Breach Computing Infrastructure Network Management Geography 3D Printing Information Chatbots RMM Cyber Monday Administrator Cameras VoIP Windows 8 Chromebook GPS IoT Active Directory Data Warehousing Domains Technology Laws Alerts Touchscreen SharePoint Law Enforcement Google Maps Network Congestion Cables eWaste Unsupported Software Monitoring 5G Identity Procurement Entrepreneur flu season IT Sevices Disaster CCTV Digital Emoji Tracking Utility Computing Windows Server Application Lenovo Microsoft Excel Public Speaking Unified Threat Management Cooperation Downloads Gadget Users Wires Environment Mobile Data Electronic Health Records Hacks Remote Worker Shortcut Fort Worth Uninterrupted Power Supply Spyware User Management Superfish Blockchain business communications systems Staff Multi-Factor Security Troubleshooting Cyberattacks Current Events Professional Services flu shot Solid State Drive

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To Telesys Voice and Data, a disaster is anything that involves a major loss of data or major downt...
QR-Code