Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why You Should Reexamine Your Business Practices

Tip of the Week: Why You Should Reexamine Your Business Practices

As a business adopts certain “best practices,” it is important for business leaders to consider why they are adopted, and more importantly, are they really for the best? There are many problems that subscribing to false best practices can produce, and so it becomes important to identify, adjust, and resolve them.

The term “best practices” is used exceptionally often in business communications, blogs, and other messages, to the point that it is fair to say that the term is bandied about just for the sake of using it. However, so much stake is placed in what is considered “best practice” that whatever is purported to be best is accepted without any further examination.

In his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business, and in an interview with the Harvard Business Review discussing this publication, Professor Freek Vermeulen discusses this phenomenon.

In the interview, the subject of reverse benchmarking is brought up, and with it, the example presented by Capitec. Capitec is a bank in South Africa that leveraged reverse benchmarking in order to cement their place in their market.

Reverse benchmarking is where you examine the standard practices of your particular industry in order to determine how one can do better, often by abandoning what other businesses treat as status quo. Returning to the Capitec example, Capitec observed that the other banks in South Africa were closing at 4 o’clock in the afternoon. In response to this, Capitec extended their hours to allow those who are employed to attend to their banking after work, and many of their branches have Saturday hours as well.

This is just one example of how “best practices” may not always be “best” for all businesses. However, when many businesses are questioned specifically regarding their supposed best practices, the response is often some variation of “this is what is safe and/or comfortable, and this is the way it has always been done.” According to Vermeulen, this is a good sign that there needs to be an examination into whether or not an organization is subscribing to practices because they are truly helpful, or if they are just stuck to the status quo.

There is also the danger of assuming that, because a company became successful by doing something, that something is a best practice. Vermeulen brought up the possibility that the companies who have reached the top have done so by following risky strategies and lucked out, while the vast majority of companies who did the same thing they did ultimately failed and died out in obscurity.

Vermeulen also acknowledges that changing an established practice is not an easy conclusion for many businesses to come to. According to him, companies will wait as long as they can before they make a change out of necessity--when they begin to see productivity and profitability suffer--but by then, change is more difficult to make.

This is why Vermeulen offers this advice: “Be proactive.”

By evaluating your business and establishing what actually works and--more importantly--what doesn’t, you can identify weak points and resolve them before they cause your business too much trouble.

Telesys Voice and Data can do the same for your IT, evaluating your systems and network to ensure that everything is up to standard. Give us a call at (800) 588-4430 for more information.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Tuesday, 25 June 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Software Internet Network Security IT Services Windows 10 Managed Service Provider Backup Computer Ransomware Productivity Innovation Mobile Devices Android Outsourced IT Smartphone Managed IT services Data Backup Hardware User Tips Google Social Media Business Continuity Efficiency Browser Communication IT Support Data Disaster Recovery Workplace Tips Data Recovery Business Management Upgrade Cloud Computing Data Management Small Business App Smartphones Managed IT Services Internet of Things Office Remote Monitoring Server Holiday Microsoft Office Facebook Phishing Miscellaneous WiFi Office 365 Network Windows IT Support Gmail Big Data Password Save Money Paperless Office Encryption Spam Tech Term Passwords Artificial Intelligence Bandwidth Firewall Apps Robot VoIP Hosted Solution Recovery communications Customer Relationship Management Collaboration Employer-Employee Relationship Risk Management Unified Threat Management Hacker Mobile Device Management Customer Service How To Content Filtering Saving Money Government Remote Computing Money Work/Life Balance Downtime Wi-Fi Infrastructure Office Tips Chrome Compliance Document Management Tip of the week Analytics Vendor Management Apple Cybersecurity Avoiding Downtime Word Data storage Tech Support Computing Education Operating System IT Management Cybercrime Virtual Reality Mobile Device Antivirus Business Growth SaaS Presentation Project Management BYOD Social Managed IT Data loss Business Technology Website BDR Outlook Windows 10 Telephone Systems File Sharing Two-factor Authentication Settings Vulnerability Health Automation The Internet of Things Computers Data Security Alert Hacking Applications Mobile Computing Printing Assessment Samsung Competition HIPAA Server Management Software as a Service Licensing Meetings Bring Your Own Device Search Router Mobile Security Consultation Digital Payment Sports Storage Information Technology IT service Maintenance Cortana Humor Virtualization Computer Care Administration Analyitcs Training IT solutions Safety Wireless Technology Tablet Upgrades Wireless Automobile Budget Specifications End of Support Mouse Managed Service YouTube Unified Communications User Legal Healthcare LiFi Retail Patch Management Scam Twitter Monitors Proactive Best Practice Politics Travel Lithium-ion battery Regulations Business Owner Identity Theft Google Drive Remote Monitoring and Management Websites Physical Security Augmented Reality Going Green VPN Marketing Net Neutrality Taxes IBM Running Cable Botnet Help Desk Virtual Private Network Smart Technology Consumers Techology Internet Exlporer IT Consultant IT Budget Scary Stories Mobile Social Engineering Fleet Tracking data services Zero-Day Threat Machine Learning Computer Repair Mail Merge Distributed Denial of Service Undo Disaster Resistance Cleaning Notifications Company Culture Asset Tracking eWaste IP Address IT Technicians Backup and Disaster Recovery Statistics Technology Tips Relocation Software Tips IT Sevices Webcam Alt Codes Electronic Medical Records Google Wallet Modem Address Managed IT Service Proactive IT Hotspot User Error Crowdsourcing Dark Data Vulnerabilities Remote Workers Environment Mobile Office Mirgation Procurement Bluetooth Comparison Private Cloud Point of Sale Corporate Profile Typing Drones Cookies Redundancy Break Fix IT Consulting Language Quick Tips Printer Buisness Geography Information Troubleshooting Migration Remote Worker Black Friday Error History WannaCry Cryptocurrency Knowledge Nanotechnology Dark Web Cables Data Breach Computing Infrastructure Time Management Access Control Electronic Health Records Chatbots Virtual Assistant Phone System Cyber Monday Cabling Data Warehousing Web Server Bitcoin Update Staffing Experience IoT Wires Technology Laws Alerts Network Management SharePoint 3D Printing Cyberattacks Identity Voice over Internet Protocol flu season Administrator Lenovo Microsoft Excel Cameras VoIP Windows 8 Chromebook GPS Utility Computing Domains Unified Threat Management Cooperation Touchscreen Downloads Law Enforcement Google Maps Network Congestion Disaster Unsupported Software Bookmarks 5G Manufacturing Entrepreneur Shortcut Fort Worth Superfish Blockchain CCTV Digital Emoji Tracking Application MSP Public Speaking business communications systems Staff Multi-Factor Security Gadget Users Display Uninterrupted Power Supply Mobile Data Favorites iPhone Hacks Proactive Maintenance flu shot Permissions Spyware Cost Management Internet Protocol Flexibility Google Calendar Solid State Drive Conferencing Current Events Fort Worth IT Hard Drives Networking Fraud G Suite How To Processors Laptop Management Virtual Desktop VoIP streamlines Operations Heating/Cooling Legislation Motion Sickness Hard Disk Drive Social Networking DFW IT Service Refrigeration Firefox Supercomputer Halloween Google Docs Enterprise Resource Planning Writing WPA3 business network infrastructure Wearable Technology Employees PowerPoint Servers Deep Learning Personal Information Fun Motherboard

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To Telesys Voice and Data, a disaster is anything that involves a major loss of data or major downt...
QR-Code