Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why You Should Reexamine Your Business Practices

Tip of the Week: Why You Should Reexamine Your Business Practices

As a business adopts certain “best practices,” it is important for business leaders to consider why they are adopted, and more importantly, are they really for the best? There are many problems that subscribing to false best practices can produce, and so it becomes important to identify, adjust, and resolve them.

The term “best practices” is used exceptionally often in business communications, blogs, and other messages, to the point that it is fair to say that the term is bandied about just for the sake of using it. However, so much stake is placed in what is considered “best practice” that whatever is purported to be best is accepted without any further examination.

In his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business, and in an interview with the Harvard Business Review discussing this publication, Professor Freek Vermeulen discusses this phenomenon.

In the interview, the subject of reverse benchmarking is brought up, and with it, the example presented by Capitec. Capitec is a bank in South Africa that leveraged reverse benchmarking in order to cement their place in their market.

Reverse benchmarking is where you examine the standard practices of your particular industry in order to determine how one can do better, often by abandoning what other businesses treat as status quo. Returning to the Capitec example, Capitec observed that the other banks in South Africa were closing at 4 o’clock in the afternoon. In response to this, Capitec extended their hours to allow those who are employed to attend to their banking after work, and many of their branches have Saturday hours as well.

This is just one example of how “best practices” may not always be “best” for all businesses. However, when many businesses are questioned specifically regarding their supposed best practices, the response is often some variation of “this is what is safe and/or comfortable, and this is the way it has always been done.” According to Vermeulen, this is a good sign that there needs to be an examination into whether or not an organization is subscribing to practices because they are truly helpful, or if they are just stuck to the status quo.

There is also the danger of assuming that, because a company became successful by doing something, that something is a best practice. Vermeulen brought up the possibility that the companies who have reached the top have done so by following risky strategies and lucked out, while the vast majority of companies who did the same thing they did ultimately failed and died out in obscurity.

Vermeulen also acknowledges that changing an established practice is not an easy conclusion for many businesses to come to. According to him, companies will wait as long as they can before they make a change out of necessity--when they begin to see productivity and profitability suffer--but by then, change is more difficult to make.

This is why Vermeulen offers this advice: “Be proactive.”

By evaluating your business and establishing what actually works and--more importantly--what doesn’t, you can identify weak points and resolve them before they cause your business too much trouble.

Telesys Voice and Data can do the same for your IT, evaluating your systems and network to ensure that everything is up to standard. Give us a call at (800) 588-4430 for more information.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Saturday, 20 October 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Malware Privacy Business Computing Productivity Email Business Microsoft Internet Hosted Solutions Software Windows 10 Backup Managed Service Provider Computer Ransomware IT Services Network Security Mobile Devices Android Smartphone Managed IT services User Tips Outsourced IT Hardware Google Browser IT Support Workplace Tips Social Media Efficiency Innovation Communication Disaster Recovery Business Continuity Data Backup Data App Business Management Smartphones Data Management Small Business Office Upgrade Productivity Cloud Computing Holiday Remote Monitoring Data Recovery Server Office 365 Miscellaneous WiFi Windows Microsoft Office Network Internet of Things Facebook Phishing Encryption Tech Term Spam Artificial Intelligence Gmail Big Data Hosted Solution Password Recovery Robot Save Money Paperless Office Customer Relationship Management Bandwidth Firewall Unified Threat Management Apps Mobile Device Management Customer Service How To Government Wi-Fi Office Tips Saving Money Money Remote Computing Work/Life Balance Employer-Employee Relationship Infrastructure Risk Management Chrome Passwords Document Management Tip of the week Word Cybersecurity Hacker Apple Avoiding Downtime Content Filtering Managed IT Services IT Management Social Operating System Virtual Reality Mobile Device Website Antivirus Project Management SaaS VoIP BYOD Managed IT Business Growth Presentation Data loss BDR Two-factor Authentication Settings Compliance Analytics Outlook Telephone Systems The Internet of Things Windows 10 File Sharing Computers Vendor Management Applications Health Data Security Alert Education IT Support Data storage Hacking Mobile Computing Cybercrime Computing Tech Support IT solutions Safety Maintenance Computer Care Information Technology Wireless Technology Wireless Humor Downtime Training communications Analyitcs Tablet YouTube Automobile Upgrades Unified Communications Business Technology Budget End of Support Healthcare LiFi Specifications Mouse Collaboration Legal User Regulations Augmented Reality Patch Management Scam Twitter Running Cable Monitors Retail IBM Politics Travel Vulnerability Best Practice Google Drive Identity Theft Websites Smart Technology Automation Lithium-ion battery Business Owner Search VPN Physical Security Going Green Bring Your Own Device Sports Taxes HIPAA Botnet IT service Router Marketing Cortana Virtual Private Network Mobile Security Printing Virtualization Samsung Assessment Server Management Licensing Administration Meetings Storage Digital Payment Competition Relocation Statistics Break Fix Software Tips Cookies Cryptocurrency Cables Knowledge Webcam Address Language Electronic Medical Records Printer Google Wallet Dark Data eWaste Bookmarks Proactive IT Migration Crowdsourcing Black Friday Private Cloud Bluetooth IT Sevices Dark Web Nanotechnology Bitcoin Wires Experience Point of Sale Redundancy Computing Infrastructure Corporate Profile Access Control Drones Environment Favorites IT Consulting Chatbots Quick Tips Cyber Monday IoT Error Data Warehousing History Windows 8 MSP Alerts WannaCry SharePoint flu season Troubleshooting Conferencing Data Breach Identity Domains Time Management Utility Computing 5G Microsoft Excel Entrepreneur Cabling Proactive Web Server Cooperation Application Update Downloads Staffing Fort Worth Users Technology Laws Phone System Public Speaking Network Management Administrator Blockchain 3D Printing Remote Monitoring and Management Cameras Lenovo Staff Chromebook VoIP Multi-Factor Security GPS flu shot Network Congestion Google Maps Unified Threat Management Law Enforcement Touchscreen Cost Management Shortcut Permissions Unsupported Software Disaster WPA3 Laptop CCTV Superfish Flexibility Hard Drives Emoji Digital Google Calendar Tracking Fort Worth IT Display Virtual Desktop business communications systems Gadget Management Fraud Mobile Data Uninterrupted Power Supply Hacks Fleet Tracking Halloween Operations Refrigeration Spyware Legislation DFW IT Service iPhone Internet Protocol Social Networking Enterprise Resource Planning Fun Net Neutrality Solid State Drive Current Events Deep Learning Asset Tracking Scary Stories G Suite Networking Wearable Technology Processors How To Heating/Cooling VoIP streamlines Motherboard Mobile Motion Sickness Internet Exlporer Hard Disk Drive Google Docs Supercomputer Remote Workers Undo Firefox Software as a Service Servers Distributed Denial of Service Writing Help Desk business network infrastructure IP Address Vulnerabilities Personal Information Alt Codes IT Budget Electronic Health Records IT Consultant Techology PowerPoint IT Technicians Technology Tips Machine Learning Managed IT Service Social Engineering data services Modem Mobile Office Consumers Geography Mail Merge Hotspot Computer Repair User Error Typing Cyberattacks Buisness Cleaning Disaster Resistance Mirgation Notifications Consultation Comparison

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code