ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why You Should Reconsider Your Best Practices

Tip of the Week: Why You Should Reconsider Your Best Practices

The term “best practice” has been used by businesses for years to describe the optimal way of performing a particular task. However, before fully adopting them into business operations, it is important for these practices to be examined and deemed to be beneficial to an individual company’s circumstances. If they are not, a company risks much by adopting a misplaced best practice.

The major problem is that “best practices,” while useful if applied properly, is a term that has largely become a buzzword for businesses to use in their communications. This is dangerous, as there is a lot put at stake based on the term “best practice” alone. Therefore, it is crucial that so-called best practices are reviewed and examined before a business puts strategies based on these practices into place.

This was the argument made by Professor Freek Vermeulen in his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business. An interview with the Harvard Business Review allowed him to discuss the phenomenon further.

To provide an example of how best practices may not always be of a business’ best interest to follow, Vermeulen discussed a South African bank called Capitec and how they relied on reverse benchmarking to identify how to become an outlier in their industry.

The practice of reverse benchmarking can be summed up as the process of examining how one’s industry typically operates in order to identity weak spots in accepted practices and improve internal business operations. This can often lead to the abandonment of what is considered the status quo, if not heavily modifying it.

Capitec’s examinations revealed that other banks in South Africa had a tendency to close at four o’clock in the afternoon. To abandon this status quo, industry-standard practice, Capitec not only extended their hours to enable those who worked during the day to see to their banking needs once their work day was over, they even implemented Saturday hours in many of their branches. As a result, Capitec has since carved out a healthy market share for themselves.

This account is just one example that shows how what is standard practice might not be what is best for the business following it. However, many businesses give some push back when directly asked why they follow the practices they follow. These businesses often will respond with some statement that essentially says “this is what is comfortable” or “this is how it has always been done.” These answers are a good sign that, according to Vermeulen, an organization needs to run a self-audit to determine if they are enacting practices because they benefit the organization, or if they are simply resisting change.

Furthermore, there is the risk inherent in assuming that something that made a business successful is automatically a best practice. As Vermeulen mentioned in his interview, many companies who have reached the top may have simply been lucky as they enacted risk-laden strategies, and most of the companies who tried similar strategies have long since failed and been forgotten.

Of course, changing established practices and patterns is not easy for businesses to do. Vermeulen notes this, stating that many companies will hold out until they have no choice but to make a change. This is usually done at the point where their profits and productivity take a hit. However, waiting until this point often makes change more difficult for these companies. According to Vermeulen, the key to avoiding unnecessary difficulty is simple: “Be proactive.”

By taking the opportunity to audit your business practices before your company is stuck in a life or death situation, you can more clearly see where your company is weakest. Better yet, you will be able to remedy these weaknesses before your company is at risk.

ClearView IT can help you evaluate your IT solutions to ensure that they are not contributing to any weaknesses that your company may suffer from. Call us at 866-326-7214 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 06 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Data Backup Ransomware Smartphone communications Smartphones Small Business Upgrade Microsoft Office Network Mobile Devices Data Recovery Managed IT Services Communication Productivity Quick Tips Social Media Users VoIP Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Passwords Holiday Covid-19 Disaster Recovery Apps IT Support Browser Windows 10 Managed Service Cloud Computing Outsourced IT Miscellaneous Internet of Things Managed Service Provider Remote Work Data Management Government Saving Money Operating System Workplace Strategy Networking Artificial Intelligence Windows Managed IT services Gadgets Blockchain Bandwidth Encryption Server WiFi Information App Virtualization Remote Spam Business Technology Mobile Device Management Apple Information Technology Gmail Office Two-factor Authentication Office 365 Employee/Employer Relationship Budget History Health Cybercrime Analytics Access Control Conferencing Data Security Big Data BDR Wi-Fi Voice over Internet Protocol Cost Management Compliance Remote Computing Patch Management Document Management Help Desk Hacking Save Money Vendor Remote Monitoring Hacker IT Management Employer-Employee Relationship Training Vendor Management Firewall Retail Hard Drive Alert Mobile Office Data loss Augmented Reality Word Hiring/Firing Managed Services IBM Outlook Password Legal Website Data storage Project Management Applications Vulnerabilities Search... Money BYOD Best Practice Computing Customer Service Unified Threat Management Remote Workers VPN iPhone Cortana Twitter Education Windows 7 Free Resource Update User Content Filtering Law Enforcement End of Support How To Printer Router Chrome Paperless Office Antivirus The Internet of Things Data Breach Maintenance Windows 11 YouTube Travel Virtual Reality Social Engineering Mobile Computing Laptop Cryptocurrency Black Market Websites Marketing Monitoring Cleaning Meetings Running Cable Mobility Robot Healthcare Google Maps Storage Social Scam Sports DDoS SaaS Telephone Chromebook Drones Disaster Automobile Managed Services Provider Tech Terms Excel HIPAA Managed IT Virtual Private Network Lithium-ion battery How To Digital Microchip Current Events Flexibility Taxes Processors Virtual Assistant Solutions Hack Identity Theft Images 101 Notifications Integration Display Unified Communications Physical Security Google Docs PowerPoint Processor Bluetooth Administration Employees Distributed Denial of Service Avoiding Downtime Office Tips Wireless Technology Presentation Private Cloud Memory Start Menu Specifications eWaste Computer Care IT Consultant Holidays Downloads Vulnerability Downtime Multi-factor Authentication Safety Customer Relationship Management Cooperation Software as a Service Video Conferencing Politics Co-Managed IT Machine Learning Settings Data Protection Entertainment Virtual Machines Saving Time Virtual Desktop Experience Computer Repair Solid State Drive Bitcoin Professional Services Computers Term Azure Download Staffing Piracy Business Communications Internet Service Provider Books Regulations Compliance Managed IT Service Language Knowledge Shortcuts Society Corporate Profile HTML IP Address Nanotechnology Employer Employee Relationship Memes Television Browsers Telephony Google Play Monitors Upload Visible Light Communication Cabling Software License Human Resources Troubleshooting Net Neutrality Reading Financial Data Be Proactive Social Network Windows 8 Tablet G Suite Screen Reader Tracking Risk Management IT Mouse Data Analysis VoIP Security Cameras Displays Trends Recovery Advertising Mobile Technology Competition Google Apps Relocation Telework Work/Life Balance Workplace Strategies Customer Resource management Tech Support Devices Web Server Digital Payment Tip of the week Entrepreneur Smartwatch Communitications SharePoint Fileless Malware LiFi Microsoft 365 Gamification Documents Worker Company Culture Application Business Owner Procurement Business Intelligence FinTech In Internet of Things Telephone System Access Regulations Backup and Disaster Recovery Public Cloud CES IT Assessment Hacks Directions Network Congestion Time Management Value Writing Content Securty Desktop Supply Chain Management Reliable Computing Organization Cyber security Audit Smart Technology Electronic Medical Records Spyware Accountants Domains Database File Sharing Smart Devices Scalability Redundancy Inbound Marketing Remote Working AI Administrator Trend Micro Text Messaging Health IT Proactive IT Cache Equifax Unified Threat Management Tactics Workers Hard Drive Disposal Digital Security Cameras Electronic Health Records Bring Your Own Device Transportation Wasting Time Username Public Speaking CCTV Electronic Payment Freedom of Information eCommerce Printing Supply Chain Streaming Media Modem Music Startup Touchscreen Addiction email scam Keyboard Videos Surveillance Navigation Managing Costs Emergency Mobile Security Hard Drives Computer Malfunction News intranet Botnet Phone System Workplace User Tip SSID Vendor Mangement Legislation Employer/Employee Relationships Micrsooft Network Management Wireless Samsung Shortcut Media Development Rental Service Evernote Virtual Machine Flash Uninterrupted Power Supply Heating/Cooling Webcam Environment Fake News Social Networking Reviews Optimization Telephone Systems Scams Proxy Server Windows XP Business Growth Business Mangement Emails Teamwork Service Level Agreement Tablets Computing Infrastructure 2FA Data Storage Computer Accessories Hypervisor Management Device security Supercomputer Microsoft Excel Shopping Banking Google Calendar Cables Medical IT Google Wallet Wireless Headphones SQL Server Deep Learning Virus Going Green Business Cards Paperless Messenger Tech PCI DSS Licensing Error Motion Sickness Gig Economy Humor Business Metrics Comparison Point of Sale Bookmark Hosted Solution Google Drive

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?