KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why You Should Reconsider Your Best Practices

Tip of the Week: Why You Should Reconsider Your Best Practices

The term “best practice” has been used by businesses for years to describe the optimal way of performing a particular task. However, before fully adopting them into business operations, it is important for these practices to be examined and deemed to be beneficial to an individual company’s circumstances. If they are not, a company risks much by adopting a misplaced best practice.

The major problem is that “best practices,” while useful if applied properly, is a term that has largely become a buzzword for businesses to use in their communications. This is dangerous, as there is a lot put at stake based on the term “best practice” alone. Therefore, it is crucial that so-called best practices are reviewed and examined before a business puts strategies based on these practices into place.

This was the argument made by Professor Freek Vermeulen in his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business. An interview with the Harvard Business Review allowed him to discuss the phenomenon further.

To provide an example of how best practices may not always be of a business’ best interest to follow, Vermeulen discussed a South African bank called Capitec and how they relied on reverse benchmarking to identify how to become an outlier in their industry.

The practice of reverse benchmarking can be summed up as the process of examining how one’s industry typically operates in order to identity weak spots in accepted practices and improve internal business operations. This can often lead to the abandonment of what is considered the status quo, if not heavily modifying it.

Capitec’s examinations revealed that other banks in South Africa had a tendency to close at four o’clock in the afternoon. To abandon this status quo, industry-standard practice, Capitec not only extended their hours to enable those who worked during the day to see to their banking needs once their work day was over, they even implemented Saturday hours in many of their branches. As a result, Capitec has since carved out a healthy market share for themselves.

This account is just one example that shows how what is standard practice might not be what is best for the business following it. However, many businesses give some push back when directly asked why they follow the practices they follow. These businesses often will respond with some statement that essentially says “this is what is comfortable” or “this is how it has always been done.” These answers are a good sign that, according to Vermeulen, an organization needs to run a self-audit to determine if they are enacting practices because they benefit the organization, or if they are simply resisting change.

Furthermore, there is the risk inherent in assuming that something that made a business successful is automatically a best practice. As Vermeulen mentioned in his interview, many companies who have reached the top may have simply been lucky as they enacted risk-laden strategies, and most of the companies who tried similar strategies have long since failed and been forgotten.

Of course, changing established practices and patterns is not easy for businesses to do. Vermeulen notes this, stating that many companies will hold out until they have no choice but to make a change. This is usually done at the point where their profits and productivity take a hit. However, waiting until this point often makes change more difficult for these companies. According to Vermeulen, the key to avoiding unnecessary difficulty is simple: “Be proactive.”

By taking the opportunity to audit your business practices before your company is stuck in a life or death situation, you can more clearly see where your company is weakest. Better yet, you will be able to remedy these weaknesses before your company is at risk.

KT Connections can help you evaluate your IT solutions to ensure that they are not contributing to any weaknesses that your company may suffer from. Call us at 605-341-3873 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 23 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy hackers Technology Email malware Internet Business Computing Network Security Cloud Google software User Tips Efficiency Backup Ransomware Business Data Microsoft Computer IT Support Android IT Support Small Business Mobile Device Management Gmail Productivity Money Network Facebook Hardware Managed IT Services Phishing Smartphone Windows Hosted Solutions cybersecurity Mobile Devices VoIP Internet of Things Data Security IT Management Operating System Microsoft Office Alert Artificial Intelligence Business Continuity communications Windows 10 Cloud Computing Data Management Unified Communications Social Media Antivirus data breach End of Support vulnerability Office 365 Apple Update Passwords Managed IT Services Communication Robot Smartphones Outlook Outsourced IT Encryption IT Services Hard Drive Cost Management Data storage Networking Bandwidth Upgrade Nextiva BDR security cameras Business Management Disaster Recovery History YouTube Politics Best Practice News App Data Backup Digital Events Access Control Data Protection Innovation Word Patch Management Event Marketing Spam Local Buzz Law Enforcement botnet South Dakota Browser Project Management Analytics Save Money Automation vulnerabilities Document Management SaaS Saving Money Collaboration Information Technology Cryptocurrency IoT Holiday Server security solutions Remote Monitoring Social Engineering Hacking Google Wallet Big Data Google Docs Firewall Legal The Internet of Things Customer Service Productivity IBM Apps Search BYOD Google Maps Gadgets Scam Windows 10 Lunch and Learn Information Security Bitcoin Data Recovery WiFi Drones Start Menu Workplace Tips Conference Business Comunications Sports Distributed Denial of Service Email Security tool Business Communications Fast food Google Play Store Blockchain Wireless Technology End User Testing VPN Proactive IT Running Cable Press Release Chamber of Commerce user confidence Bluetooth appointment Tech Terms LiFi Quick Tips Uninterrupted Power Supply Vendor Mangement Office Tips Touchscreen Comparison Excel Society Cybercrime Streaming Media Music Cabling Safety Visible Light Communication Business Mangement Websites Webcam Penetration Testing Specifications Government camera Tip of the week Windows 8 Writing Windows XP Access botnet attack LastPass Microsoft Bookings Website Corporate Profile Television Programming Software as a Service Compliance Phishing Scams Budget communication device Remote Computing Virtual Reality macbook Virtual Assistant Tech Support Redundancy Black Market Worker Spyware Rebrand Google Drive Hack booking process Audit Advertising Cloud Backup Mouse Rapid City Virus File Sharing IT Consultation business owner Mobile Device Printer Retail Virtual Desktop Web Servers DDoS attacks Applications Virtual Machines Telephony Local Technology Memory Event Maintenance SharePoint IoT Devices Law IT Workers IT Assessment Solid State Drive Physical Security communication solutions Tips and Tricks DDoS Hard Drive Disposal Managed Service Provider Business Growth Internet 101 Cache Risk Creep VoIP Sales Tax Virtualization security precautions identity theft Mixer Fortinet Network Congestion IT Security Deep Learning Lawyers Samsung IT Strategy Internet Connected Devices Dell ’s Sonicwall Global Management System email scam Microsoft Office 365 Emergency IT for Oil Companies media experience Vendors Business Security Freedom of Information Cleaning Office Laptop IT Solutions Tablets Administration Unified Threat Management How To Password eWaste Microsoft Office 365 features Business Technology Communications Risk Management Time Management Mobility information Community Involvement Printing face Fake News Vendor Management Tablet Attorneys Computing Infrastructure Disaster Phone System Social Kaseya Unified Threat Management Flash Download Downloads enterprise productivity software surveillance cameras Microsoft Excel Monitors SOX Managed Services Content Filtering Cortana Education Hosted Solution Hardware as a Service Kaseya Connect Experience Settings healthcare Google Calendar Trend Micro Displays Sarbanes-Oxley Act Business Cards Computer Care Managed IT password manager LastPass AtomBombing Knowledge HaaS Scalability network security professionals Computing Protection scams G Suite Training Computer Malfunction Travel Playbook Language Processors Employer-Employee Relationship Sync Employer Employee Relationship Messenger Digital Payment Private Cloud breach methods Miscellaneous Microchip Downtime In Internet of Things Books Motion Sickness Public Cloud Taxes Piracy Marketing Telephone Systems Reading Machine Learning Paperless Office Hiring/Firing Health Bring Your Own Device Software License Administrator Banking Relocation Hacker 3D Printing base infrastructure CCTV Hacks Automobile Phone Systen security solution IT service Web Server Work/Life Balance Notifications Meetings Business Metrics end-of-support date Ordinary Computers CrashOverride holiday season Emails Wi-Fi Rental Service collaboration capabilities Chromebook UTM Tracking Flexibility quantum computers holidays Supercomputer Documents Threat management Reliable Computing Text Messaging Users scammers IT Consultant PDF Twitter