Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why You Should Reexamine Your Business Practices

Tip of the Week: Why You Should Reexamine Your Business Practices

As a business adopts certain “best practices,” it is important for business leaders to consider why they are adopted, and more importantly, are they really for the best? There are many problems that subscribing to false best practices can produce, and so it becomes important to identify, adjust, and resolve them.

The term “best practices” is used exceptionally often in business communications, blogs, and other messages, to the point that it is fair to say that the term is bandied about just for the sake of using it. However, so much stake is placed in what is considered “best practice” that whatever is purported to be best is accepted without any further examination.

In his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business, and in an interview with the Harvard Business Review discussing this publication, Professor Freek Vermeulen discusses this phenomenon.

In the interview, the subject of reverse benchmarking is brought up, and with it, the example presented by Capitec. Capitec is a bank in South Africa that leveraged reverse benchmarking in order to cement their place in their market.

Reverse benchmarking is where you examine the standard practices of your particular industry in order to determine how one can do better, often by abandoning what other businesses treat as status quo. Returning to the Capitec example, Capitec observed that the other banks in South Africa were closing at 4 o’clock in the afternoon. In response to this, Capitec extended their hours to allow those who are employed to attend to their banking after work, and many of their branches have Saturday hours as well.

This is just one example of how “best practices” may not always be “best” for all businesses. However, when many businesses are questioned specifically regarding their supposed best practices, the response is often some variation of “this is what is safe and/or comfortable, and this is the way it has always been done.” According to Vermeulen, this is a good sign that there needs to be an examination into whether or not an organization is subscribing to practices because they are truly helpful, or if they are just stuck to the status quo.

There is also the danger of assuming that, because a company became successful by doing something, that something is a best practice. Vermeulen brought up the possibility that the companies who have reached the top have done so by following risky strategies and lucked out, while the vast majority of companies who did the same thing they did ultimately failed and died out in obscurity.

Vermeulen also acknowledges that changing an established practice is not an easy conclusion for many businesses to come to. According to him, companies will wait as long as they can before they make a change out of necessity--when they begin to see productivity and profitability suffer--but by then, change is more difficult to make.

This is why Vermeulen offers this advice: “Be proactive.”

By evaluating your business and establishing what actually works and--more importantly--what doesn’t, you can identify weak points and resolve them before they cause your business too much trouble.

Telesys Voice and Data can do the same for your IT, evaluating your systems and network to ensure that everything is up to standard. Give us a call at (800) 588-4430 for more information.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Tuesday, 23 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Best Practices Hackers Cloud Privacy Productivity Malware Business Computing Business Microsoft Email Internet Windows 10 Backup IT Services Hosted Solutions Computer Android Network Security Smartphone Managed Service Provider Software User Tips Workplace Tips Ransomware Google IT Support Mobile Devices Hardware Browser Communication Managed IT services Social Media Business Continuity Efficiency Disaster Recovery Smartphones App Data Office Outsourced IT Holiday Business Management Remote Monitoring Office 365 Innovation Windows Miscellaneous WiFi Data Management Facebook Microsoft Office Upgrade Small Business Data Backup Big Data Internet of Things Network Artificial Intelligence Data Recovery Gmail Spam Firewall Apps Phishing Encryption Hosted Solution Recovery Robot Password Risk Management Productivity Word Hacker Unified Threat Management Tip of the week Content Filtering Cloud Computing Apple Avoiding Downtime How To Cybersecurity Save Money Money Office Tips Customer Service Mobile Device Management Work/Life Balance Employer-Employee Relationship Server Saving Money Analytics VoIP Remote Computing The Internet of Things Presentation Business Growth Managed IT Computers Customer Relationship Management Bandwidth Outlook Alert Education Windows 10 Passwords Chrome Data storage Cybercrime Telephone Systems Computing Health Social Hacking IT Support Government Wi-Fi Managed IT Services SaaS Operating System Two-factor Authentication Settings Antivirus Analyitcs Collaboration Legal Mobile Device File Sharing Data loss Twitter IBM Running Cable Politics Tablet Monitors Vendor Management Specifications Travel Google Drive Websites Automation Physical Security Bring Your Own Device Going Green Search User Taxes Sports IT service Botnet Printing Cortana Scam Virtualization Retail Samsung Administration Best Practice Vulnerability Lithium-ion battery IT solutions Safety Business Owner Data Security Wireless Technology Computer Care Wireless Marketing Virtual Reality Virtual Private Network Downtime Website Training Mobile Computing communications Competition Paperless Office Tech Support YouTube BYOD Upgrades Unified Communications Automobile Licensing Maintenance Information Technology Budget IT Management Digital Payment End of Support LiFi Humor Applications Mouse IT Consulting Quick Tips Law Enforcement Smart Technology Network Congestion Internet Exlporer Unsupported Software Project Management Hard Drives Troubleshooting CCTV WannaCry Emoji Software as a Service Laptop Virtual Desktop Data Breach Time Management Gadget Distributed Denial of Service Display Cabling Mobile Security Mobile Data Hacks Augmented Reality Business Technology Refrigeration Phone System Technology Tips Halloween Technology Laws Network Management Managed IT Service Infrastructure Hotspot Deep Learning Current Events Fun Lenovo G Suite VoIP Processors Staffing Comparison Scary Stories Unified Threat Management Touchscreen BDR Break Fix Motion Sickness Disaster Language Printer Shortcut Superfish Undo Digital GPS Black Friday Google Docs Writing business communications systems IP Address Google Maps Dark Web Uninterrupted Power Supply Computing Infrastructure Personal Information Access Control Alt Codes Patch Management iPhone IT Consultant Spyware Tracking Cyber Monday Social Engineering Internet Protocol Mobile Office Machine Learning Data Warehousing Meetings Solid State Drive Alerts Computer Repair SharePoint Typing Networking Cleaning How To Notifications Document Management flu season Storage Buisness VoIP streamlines Heating/Cooling Relocation Microsoft Excel Webcam Hard Disk Drive Cooperation Electronic Medical Records Downloads Cryptocurrency Google Wallet Knowledge VPN Firefox Crowdsourcing Identity Theft Fort Worth Dark Data business network infrastructure Servers Private Cloud Blockchain Point of Sale Staff PowerPoint Multi-Factor Security Bitcoin Drones Experience Techology Assessment Supercomputer flu shot data services Server Management Consumers Error Help Desk Permissions Google Calendar Windows 8 Mail Merge Disaster Resistance Domains Consultation IT Budget Fort Worth IT User Error 5G Statistics Entrepreneur Fraud Application eWaste Web Server Update Legislation Address Users Proactive IT Public Speaking DFW IT Service IT Sevices 3D Printing Bluetooth Administrator Software Tips Net Neutrality Environment Cameras Corporate Profile Chromebook Redundancy

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code