Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why You Should Reexamine Your Business Practices

Tip of the Week: Why You Should Reexamine Your Business Practices

As a business adopts certain “best practices,” it is important for business leaders to consider why they are adopted, and more importantly, are they really for the best? There are many problems that subscribing to false best practices can produce, and so it becomes important to identify, adjust, and resolve them.

The term “best practices” is used exceptionally often in business communications, blogs, and other messages, to the point that it is fair to say that the term is bandied about just for the sake of using it. However, so much stake is placed in what is considered “best practice” that whatever is purported to be best is accepted without any further examination.

In his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business, and in an interview with the Harvard Business Review discussing this publication, Professor Freek Vermeulen discusses this phenomenon.

In the interview, the subject of reverse benchmarking is brought up, and with it, the example presented by Capitec. Capitec is a bank in South Africa that leveraged reverse benchmarking in order to cement their place in their market.

Reverse benchmarking is where you examine the standard practices of your particular industry in order to determine how one can do better, often by abandoning what other businesses treat as status quo. Returning to the Capitec example, Capitec observed that the other banks in South Africa were closing at 4 o’clock in the afternoon. In response to this, Capitec extended their hours to allow those who are employed to attend to their banking after work, and many of their branches have Saturday hours as well.

This is just one example of how “best practices” may not always be “best” for all businesses. However, when many businesses are questioned specifically regarding their supposed best practices, the response is often some variation of “this is what is safe and/or comfortable, and this is the way it has always been done.” According to Vermeulen, this is a good sign that there needs to be an examination into whether or not an organization is subscribing to practices because they are truly helpful, or if they are just stuck to the status quo.

There is also the danger of assuming that, because a company became successful by doing something, that something is a best practice. Vermeulen brought up the possibility that the companies who have reached the top have done so by following risky strategies and lucked out, while the vast majority of companies who did the same thing they did ultimately failed and died out in obscurity.

Vermeulen also acknowledges that changing an established practice is not an easy conclusion for many businesses to come to. According to him, companies will wait as long as they can before they make a change out of necessity--when they begin to see productivity and profitability suffer--but by then, change is more difficult to make.

This is why Vermeulen offers this advice: “Be proactive.”

By evaluating your business and establishing what actually works and--more importantly--what doesn’t, you can identify weak points and resolve them before they cause your business too much trouble.

Telesys Voice and Data can do the same for your IT, evaluating your systems and network to ensure that everything is up to standard. Give us a call at (800) 588-4430 for more information.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Wednesday, 18 July 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Privacy Malware Business Computing Productivity Business Email Microsoft Internet Windows 10 Hosted Solutions Software Backup IT Services Managed Service Provider Ransomware Computer Mobile Devices Network Security Smartphone Android User Tips Managed IT services Google IT Support Workplace Tips Social Media Browser Communication Outsourced IT Hardware Disaster Recovery Business Continuity Efficiency Data Management Data Backup Smartphones App Innovation Holiday Upgrade Small Business Office Business Management Data Cloud Computing Windows Miscellaneous WiFi Internet of Things Facebook Microsoft Office Data Recovery Remote Monitoring Server Office 365 Artificial Intelligence Gmail Spam Big Data Network Encryption Bandwidth Firewall Apps Robot Save Money Paperless Office Phishing Hosted Solution Recovery Password Productivity Customer Relationship Management Unified Threat Management Managed IT Services Word Hacker Passwords Chrome How To Content Filtering Government Apple Avoiding Downtime Money Infrastructure Work/Life Balance Tech Term Customer Service Mobile Device Management Office Tips Tip of the week Employer-Employee Relationship Saving Money Document Management Remote Computing Risk Management Cybersecurity IT Support Computers Alert Outlook Data storage Computing IT Management Education Cybercrime Antivirus Virtual Reality Health Mobile Device Managed IT Data loss SaaS BYOD Hacking Social Mobile Computing Website Tech Support BDR Wi-Fi Windows 10 Compliance Operating System Telephone Systems Two-factor Authentication File Sharing Settings VoIP Analytics Vendor Management Presentation Business Growth Data Security The Internet of Things Applications Physical Security Going Green Augmented Reality Virtual Private Network Smart Technology Taxes Assessment Specifications IBM HIPAA Running Cable Server Management Botnet Printing Mobile Security Samsung User Licensing Maintenance Bring Your Own Device Search Digital Payment Storage Sports Retail IT service Cortana Virtualization Best Practice Computer Care Administration Lithium-ion battery Business Owner Project Management Training IT solutions Safety Marketing Business Technology Wireless Technology Tablet Upgrades Wireless Automobile Budget Competition End of Support Downtime communications Mouse Information Technology YouTube Unified Communications Patch Management Collaboration Legal Humor Scam LiFi Regulations Vulnerability Twitter Analyitcs Politics Monitors Travel VPN Identity Theft Google Drive Automation Websites Motion Sickness Motherboard Refrigeration Techology Internet Exlporer Supercomputer Google Docs Halloween Mobile Writing data services Software as a Service Help Desk Deep Learning Personal Information Fun Router Mail Merge Distributed Denial of Service Disaster Resistance IT Consultant Consultation IT Budget Scary Stories Vulnerabilities Social Engineering User Error IT Technicians Statistics Technology Tips Machine Learning Meetings Computer Repair Modem Address Managed IT Service Undo Proactive IT Hotspot Cleaning Notifications Geography iPhone IP Address Mirgation Bluetooth Comparison Relocation Software Tips Webcam Corporate Profile Alt Codes Electronic Medical Records Google Wallet Cookies Redundancy Break Fix IT Consulting Language Quick Tips Printer Crowdsourcing Dark Data Cables Mobile Office Migration Black Friday Private Cloud Point of Sale WannaCry Typing Drones Nanotechnology Dark Web Data Breach Computing Infrastructure Time Management Access Control Buisness Wires Chatbots Cyber Monday Error Cabling Cryptocurrency Knowledge IoT Data Warehousing Technology Laws Alerts PowerPoint Network Management SharePoint Identity flu season Web Server VoIP Bitcoin Update Staffing Experience Utility Computing Consumers Lenovo Microsoft Excel Unified Threat Management Cooperation Touchscreen Downloads 3D Printing Shortcut Fort Worth Administrator Disaster Cameras Digital Windows 8 Chromebook GPS Healthcare Superfish Blockchain eWaste Domains business communications systems Staff Multi-Factor Security Law Enforcement Google Maps Network Congestion Unsupported Software 5G Entrepreneur flu shot IT Sevices Uninterrupted Power Supply Permissions CCTV Spyware Emoji Tracking Cost Management Application Environment Public Speaking Internet Protocol Flexibility Google Calendar Gadget Display Users Mobile Data Hacks Fort Worth IT Solid State Drive Networking Fraud How To Management Troubleshooting VoIP streamlines Operations Heating/Cooling Legislation Hard Disk Drive Current Events Social Networking DFW IT Service Net Neutrality G Suite Firefox Processors Laptop Enterprise Resource Planning Hard Drives Virtual Desktop business network infrastructure Wearable Technology Phone System Servers

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code