crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why You Should Reexamine Your Business Practices

As a business adopts certain “best practices,” it is important for business leaders to consider why they are adopted, and more importantly, are they really for the best? There are many problems that subscribing to false best practices can produce, and so it becomes important to identify, adjust, and resolve them.

The term “best practices” is used exceptionally often in business communications, blogs, and other messages, to the point that it is fair to say that the term is bandied about just for the sake of using it. However, so much stake is placed in what is considered “best practice” that whatever is purported to be best is accepted without any further examination.

In his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business, and in an interview with the Harvard Business Review discussing this publication, Professor Freek Vermeulen discusses this phenomenon.

In the interview, the subject of reverse benchmarking is brought up, and with it, the example presented by Capitec. Capitec is a bank in South Africa that leveraged reverse benchmarking in order to cement their place in their market.

Reverse benchmarking is where you examine the standard practices of your particular industry in order to determine how one can do better, often by abandoning what other businesses treat as status quo. Returning to the Capitec example, Capitec observed that the other banks in South Africa were closing at 4 o’clock in the afternoon. In response to this, Capitec extended their hours to allow those who are employed to attend to their banking after work, and many of their branches have Saturday hours as well.

This is just one example of how “best practices” may not always be “best” for all businesses. However, when many businesses are questioned specifically regarding their supposed best practices, the response is often some variation of “this is what is safe and/or comfortable, and this is the way it has always been done.” According to Vermeulen, this is a good sign that there needs to be an examination into whether or not an organization is subscribing to practices because they are truly helpful, or if they are just stuck to the status quo.

There is also the danger of assuming that, because a company became successful by doing something, that something is a best practice. Vermeulen brought up the possibility that the companies who have reached the top have done so by following risky strategies and lucked out, while the vast majority of companies who did the same thing they did ultimately failed and died out in obscurity.

Vermeulen also acknowledges that changing an established practice is not an easy conclusion for many businesses to come to. According to him, companies will wait as long as they can before they make a change out of necessity--when they begin to see productivity and profitability suffer--but by then, change is more difficult to make.

This is why Vermeulen offers this advice: “Be proactive.”

By evaluating your business and establishing what actually works and--more importantly--what doesn’t, you can identify weak points and resolve them before they cause your business too much trouble.

Integrated Business Technologies can do the same for your IT, evaluating your systems and network to ensure that everything is up to standard. Give us a call at (918) 770-8738 for more information.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 23 October 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Cloud Internet Business Computing Microsoft Best Practices Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Backup Email Malware Business Mobile Devices Software Data IT Support Hardware Small Business Network Communication Server Smartphones Computer VoIP Upgrade Business Continuity Google Windows Efficiency Disaster Recovery Mobile Device Management Innovation Virtualization Microsoft Office Miscellaneous Mobile Office Data Backup Vendor Management Tech Term Outsourced IT Gadgets Holiday Social Media BYOD User Tips Quick Tips Passwords Network Security Browser Mobile Computing Smartphone Android Productivity Internet of Things WiFi Bring Your Own Device Managed IT services Windows 10 The Internet of Things Best Practice Ransomware Data Recovery Spam Remote Monitoring Alert Data Management Save Money Trending Operating System Users Apple Remote Computing Artificial Intelligence Wireless Technology Office Collaboration Going Green Firewall Content Filtering Customer Relationship Management Unified Threat Management Gmail Encryption History Router Big Data Printer Tech Support Cloud Computing Information Technology Current Events Managed IT Analytics IT Solutions Lithium-ion Battery Facebook IT Consultant App IT Support Website Humor Two-factor Authentication Paperless Office Saving Time Avoiding Downtime Phishing Maintenance Applications Hard Drives Antivirus Document Management Mobile Device Employer-Employee Relationship Windows 8 VPN Customer Service Marketing Hacking Risk Management Excel Computers Bandwidth Project Management Cybersecurity Phone System Apps Application Automation Virus Office Tips Retail Fax Server IT service Outlook Government Chrome Health Managed IT Services Business Growth Wi-Fi Digital Payment Compliance PowerPoint Regulations Social Networking Office 365 Files Inbound Marketing Password Tablet iPhone Presentation Unified Communications Budget Data Security Administration Augmented Reality Training Recovery Money Healthcare Help Desk Infrastructure User Error Running Cable Computer Repair Proactive IT Licensing Point of Sale Co-Managed IT Mouse Net Neutrality Social Managed Service File Sharing Wearable Technology Statistics Conferencing Redundancy Scam Alerts Display Machine Learning Competition Internet Exlporer Network Congestion Storage Hosted Solution Smart Technology Flexibility eWaste Downtime Mobile Security Mobility Data storage Intranet IoT Search Business Intelligence Virtual Desktop Robot USB Recycling Windows 10 Business Owner Printing End of Support LiFi Tip of the week Hacker User Computing Programming Piracy Analyitcs Education Sports Safety Specifications Settings Cost Management Remote Workers Company Culture Twitter Wireless Cybercrime Save Time Information Blockchain Vulnerability Hiring/Firing HIPAA IBM Data loss BDR Black Friday How To Electronic Health Records Screen Reader YouTube Mobile Typing Fraud Identity Theft Proactive Google Drive Mirgation Access Control Cyber Monday PC Care Assessment Domains How To Cyberattacks Smart Tech Managing Stress Cryptocurrency Value Fun Scheduling Word Remote Monitoring and Management Google Docs eBay SharePoint Remote Support Leadership IT Management Public Speaking Read Only Connectivity Private Cloud Skype Enterprise Content Management Bitcoin Streaming Media New Additions Business Technology Cortana WPA3 Print Server Migration Text Messaging Downloads communications Work Station Distributed Denial of Service Network Management Bookmarks Public Cloud Environment LinkedIn Vulnerabilities Hacks Hotspot Congratulations Networking Knowledge Fleet Tracking Law Firm IT Chatbots Video Surveillance Multi-Factor Security Samsung Managed IT Service Windows 8.1 Update Favorites Star Wars Sync Troubleshooting Best Available Geography Debate Language Experience Software Tips Heating/Cooling Asset Tracking Identity Google Calendar Crowdfunding Break Fix Macro Virtual Reality Consumers Instant Messaging Utility Computing Mobile Device Managment High-Speed Internet Computing Infrastructure Techology OneNote Monitors Bluetooth Legislation Deep Learning Dark Web Server Management IP Address SaaS Online Currency Development Google Wallet Cooperation Disaster Resistance Gaming Console Refrigeration Employee-Employer Relationship Writing Disaster Consulting Motherboard Computer Accessories Hard Drive Data Warehousing Chromebook G Suite Cables Drones Staff IT Consulting Software as a Service Social Engineering Digital Signature Managed Services Provider Modem Buisness Cache Identities Memory Microsoft Excel Patch Management Travel Wires Backups Operations Data Breach Laptop Touchscreen Technology Tips E-Commerce Cookies CIO Management Solid State Drive Politics Documents Adminstration Meetings Entrepreneur Legal Technology Laws Halloween Comparison 3D Undo Monitoring Features Nanotechnology Enterprise Resource Planning Alt Codes People Permissions Virtual Private Network 5G Telephony PDF Scary Stories MSP IT Technicians Unified Threat Management

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...