ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why You Should Reconsider Your Best Practices

Tip of the Week: Why You Should Reconsider Your Best Practices

The term “best practice” has been used by businesses for years to describe the optimal way of performing a particular task. However, before fully adopting them into business operations, it is important for these practices to be examined and deemed to be beneficial to an individual company’s circumstances. If they are not, a company risks much by adopting a misplaced best practice.

The major problem is that “best practices,” while useful if applied properly, is a term that has largely become a buzzword for businesses to use in their communications. This is dangerous, as there is a lot put at stake based on the term “best practice” alone. Therefore, it is crucial that so-called best practices are reviewed and examined before a business puts strategies based on these practices into place.

This was the argument made by Professor Freek Vermeulen in his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business. An interview with the Harvard Business Review allowed him to discuss the phenomenon further.

To provide an example of how best practices may not always be of a business’ best interest to follow, Vermeulen discussed a South African bank called Capitec and how they relied on reverse benchmarking to identify how to become an outlier in their industry.

The practice of reverse benchmarking can be summed up as the process of examining how one’s industry typically operates in order to identity weak spots in accepted practices and improve internal business operations. This can often lead to the abandonment of what is considered the status quo, if not heavily modifying it.

Capitec’s examinations revealed that other banks in South Africa had a tendency to close at four o’clock in the afternoon. To abandon this status quo, industry-standard practice, Capitec not only extended their hours to enable those who worked during the day to see to their banking needs once their work day was over, they even implemented Saturday hours in many of their branches. As a result, Capitec has since carved out a healthy market share for themselves.

This account is just one example that shows how what is standard practice might not be what is best for the business following it. However, many businesses give some push back when directly asked why they follow the practices they follow. These businesses often will respond with some statement that essentially says “this is what is comfortable” or “this is how it has always been done.” These answers are a good sign that, according to Vermeulen, an organization needs to run a self-audit to determine if they are enacting practices because they benefit the organization, or if they are simply resisting change.

Furthermore, there is the risk inherent in assuming that something that made a business successful is automatically a best practice. As Vermeulen mentioned in his interview, many companies who have reached the top may have simply been lucky as they enacted risk-laden strategies, and most of the companies who tried similar strategies have long since failed and been forgotten.

Of course, changing established practices and patterns is not easy for businesses to do. Vermeulen notes this, stating that many companies will hold out until they have no choice but to make a change. This is usually done at the point where their profits and productivity take a hit. However, waiting until this point often makes change more difficult for these companies. According to Vermeulen, the key to avoiding unnecessary difficulty is simple: “Be proactive.”

By taking the opportunity to audit your business practices before your company is stuck in a life or death situation, you can more clearly see where your company is weakest. Better yet, you will be able to remedy these weaknesses before your company is at risk.

ClearView IT can help you evaluate your IT solutions to ensure that they are not contributing to any weaknesses that your company may suffer from. Call us at 866-326-7214 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Data Backup Ransomware communications Smartphone Smartphones Small Business Microsoft Office Upgrade Mobile Devices Network Communication Managed IT Services Data Recovery Productivity Quick Tips Social Media VoIP Users Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Covid-19 Disaster Recovery Passwords Holiday Browser Apps Windows 10 Managed Service IT Support Miscellaneous Cloud Computing Outsourced IT Internet of Things Managed Service Provider Remote Work Data Management Government Saving Money Operating System Artificial Intelligence Managed IT services Networking Gadgets Workplace Strategy Windows WiFi Bandwidth Server Encryption Information Remote App Virtualization Mobile Device Management Spam Business Technology Blockchain Gmail Budget Employee/Employer Relationship Office History Two-factor Authentication Office 365 Apple Information Technology Cybercrime Conferencing Access Control Data Security Wi-Fi Big Data BDR Health Analytics Document Management Compliance Save Money Patch Management Help Desk Vendor Hacking Remote Monitoring Employer-Employee Relationship Voice over Internet Protocol Cost Management IT Management Hacker Remote Computing Training Legal Data loss Firewall Data storage Augmented Reality Word IBM Website Applications Search... Best Practice Project Management BYOD Vulnerabilities Computing Retail Vendor Management Alert Hard Drive Mobile Office Hiring/Firing Money Outlook Managed Services Customer Service Password Unified Threat Management How To Printer Chrome VPN Update iPhone Education Cortana Content Filtering Mobile Computing Travel Virtual Reality Social Engineering Data Breach Cryptocurrency Paperless Office Router Marketing Antivirus Black Market Running Cable Maintenance Cleaning The Internet of Things YouTube Robot Storage Windows 11 Monitoring Websites Laptop Healthcare Mobility Meetings Remote Workers User Windows 7 Twitter Google Maps Free Resource Scam Social Sports Law Enforcement SaaS End of Support DDoS Excel Solutions Tech Terms Hack Identity Theft Disaster Integration Images 101 Notifications Managed IT Digital Display Unified Communications PowerPoint Administration Google Docs Virtual Assistant Lithium-ion battery Bluetooth Taxes Presentation Specifications Distributed Denial of Service Employees Office Tips Avoiding Downtime IT Consultant Private Cloud Memory Processors Holidays Customer Relationship Management Processor Co-Managed IT Physical Security Entertainment Cooperation Video Conferencing Politics Machine Learning Settings Virtual Machines Computer Repair Start Menu Solid State Drive Downloads Multi-factor Authentication Wireless Technology Computer Care Professional Services eWaste Vulnerability Saving Time Chromebook Software as a Service Downtime Drones Data Protection Safety HIPAA Automobile Managed Services Provider Bitcoin Computers Virtual Private Network Virtual Desktop How To Telephone Experience Microchip Flexibility Current Events In Internet of Things Television Social Network FinTech Telephony Staffing Employer Employee Relationship Network Congestion Cabling Point of Sale IP Address Data Analysis CES Hacks Screen Reader IT Assessment Reliable Computing Trends Supply Chain Management Writing Tablet Mobile Technology Value G Suite Security Cameras Mouse Customer Resource management Organization VoIP Devices Cyber security Tracking Shortcuts Inbound Marketing Tip of the week Fileless Malware Smart Devices Scalability Gamification Remote Working Company Culture Web Server Administrator SharePoint Telephone System AI Text Messaging Regulations Trend Micro Recovery Proactive IT Digital Payment Be Proactive Competition Worker Transportation Electronic Payment Directions Digital Security Cameras Bring Your Own Device Backup and Disaster Recovery Electronic Health Records Content LiFi Access Desktop Wasting Time Entrepreneur Electronic Medical Records Time Management Accountants eCommerce Documents Music Public Cloud Modem Workplace Strategies Application Business Intelligence Phone System Videos Database Surveillance Audit Spyware Managing Costs Botnet Health IT Equifax Securty File Sharing SSID Micrsooft Hard Drive Disposal Employer/Employee Relationships Domains Media Rental Service Redundancy Tactics Development Username Flash Cache Virtual Machine Computer Accessories Reviews Telephone Systems Unified Threat Management Startup Optimization Business Growth Workers Freedom of Information Smart Technology Addiction email scam Teamwork Navigation 2FA Printing Data Storage Mobile Security Hypervisor CCTV News Medical IT Public Speaking User Tip Shopping Banking Touchscreen Legislation Google Wallet Network Management Streaming Media Deep Learning SQL Server Computer Malfunction Evernote Paperless Messenger Emergency PCI DSS Vendor Mangement Licensing Keyboard Fake News Supply Chain Hard Drives Proxy Server Gig Economy Business Metrics Emails Humor Hosted Solution Samsung Service Level Agreement Internet Service Provider Uninterrupted Power Supply Computing Infrastructure Azure Webcam intranet Business Communications Books Management Regulations Compliance Language Business Mangement Device security Managed IT Service Wireless Society Shortcut Troubleshooting Microsoft Excel Workplace Heating/Cooling Environment Wireless Headphones Memes Tablets Going Green Net Neutrality Windows XP Monitors Business Cards Visible Light Communication Social Networking Tech Human Resources Reading Google Calendar Error Financial Data Windows 8 Supercomputer Scams Bookmark Risk Management Virus IT Download Displays Piracy Advertising Motion Sickness Term Google Apps Relocation Comparison Telework Work/Life Balance Google Drive HTML Tech Support Business Owner Microsoft 365 Cables Browsers Smartwatch Nanotechnology Communitications Knowledge Upload Procurement Corporate Profile Software License Google Play

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?