crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why You Should Reexamine Your Business Practices

As a business adopts certain “best practices,” it is important for business leaders to consider why they are adopted, and more importantly, are they really for the best? There are many problems that subscribing to false best practices can produce, and so it becomes important to identify, adjust, and resolve them.

The term “best practices” is used exceptionally often in business communications, blogs, and other messages, to the point that it is fair to say that the term is bandied about just for the sake of using it. However, so much stake is placed in what is considered “best practice” that whatever is purported to be best is accepted without any further examination.

In his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business, and in an interview with the Harvard Business Review discussing this publication, Professor Freek Vermeulen discusses this phenomenon.

In the interview, the subject of reverse benchmarking is brought up, and with it, the example presented by Capitec. Capitec is a bank in South Africa that leveraged reverse benchmarking in order to cement their place in their market.

Reverse benchmarking is where you examine the standard practices of your particular industry in order to determine how one can do better, often by abandoning what other businesses treat as status quo. Returning to the Capitec example, Capitec observed that the other banks in South Africa were closing at 4 o’clock in the afternoon. In response to this, Capitec extended their hours to allow those who are employed to attend to their banking after work, and many of their branches have Saturday hours as well.

This is just one example of how “best practices” may not always be “best” for all businesses. However, when many businesses are questioned specifically regarding their supposed best practices, the response is often some variation of “this is what is safe and/or comfortable, and this is the way it has always been done.” According to Vermeulen, this is a good sign that there needs to be an examination into whether or not an organization is subscribing to practices because they are truly helpful, or if they are just stuck to the status quo.

There is also the danger of assuming that, because a company became successful by doing something, that something is a best practice. Vermeulen brought up the possibility that the companies who have reached the top have done so by following risky strategies and lucked out, while the vast majority of companies who did the same thing they did ultimately failed and died out in obscurity.

Vermeulen also acknowledges that changing an established practice is not an easy conclusion for many businesses to come to. According to him, companies will wait as long as they can before they make a change out of necessity--when they begin to see productivity and profitability suffer--but by then, change is more difficult to make.

This is why Vermeulen offers this advice: “Be proactive.”

By evaluating your business and establishing what actually works and--more importantly--what doesn’t, you can identify weak points and resolve them before they cause your business too much trouble.

Integrated Business Technologies can do the same for your IT, evaluating your systems and network to ensure that everything is up to standard. Give us a call at (918) 770-8738 for more information.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 20 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Business Management Privacy Managed Service Provider Cloud Internet Microsoft Saving Money Business Computing Productivity Best Practices Workplace Tips IT Services Backup Hackers Hosted Solutions Malware Mobile Devices Email IT Support Business Software Small Business Hardware Network Communication Server Smartphones Data Upgrade Windows Business Continuity Mobile Device Management VoIP Computer Efficiency Microsoft Office Disaster Recovery Google Virtualization Vendor Management Miscellaneous Mobile Office Gadgets Holiday Innovation Social Media Android Smartphone Quick Tips Outsourced IT User Tips Mobile Computing BYOD Windows 10 Passwords Browser WiFi Best Practice Remote Monitoring Network Security Ransomware Bring Your Own Device Spam Users Internet of Things Wireless Technology Data Management The Internet of Things Managed IT services Trending Operating System Apple Remote Computing History Firewall Alert Data Backup Going Green Content Filtering Artificial Intelligence Gmail Managed IT Unified Threat Management Big Data Office Analytics IT Solutions Lithium-ion Battery Save Money IT Consultant Printer Tech Support Current Events Information Technology Avoiding Downtime Maintenance Hard Drives App Customer Relationship Management Windows 8 Facebook Encryption Humor Antivirus Saving Time Virus Business Growth VPN Risk Management Fax Server Employer-Employee Relationship Outlook Customer Service Health Hacking Computers Phone System Marketing Collaboration Cloud Computing Two-factor Authentication Excel Data Recovery Router Automation Office Tips Retail Phishing Document Management Apps Application IT service Digital Payment Mobile Device Managed IT Services Chrome PowerPoint Social Networking User Error Tablet Data Security Co-Managed IT Website Office 365 Cybersecurity Password iPhone Tech Term Government Administration Applications Presentation Augmented Reality Inbound Marketing Budget Computer Repair Proactive IT Recovery Mouse Infrastructure Money Social Net Neutrality Running Cable Licensing Project Management Training Wireless Data storage File Sharing Save Time Paperless Office Cybercrime Wearable Technology Data loss Mobile Security Wi-Fi Robot Help Desk Hiring/Firing Unified Communications Printing Display Alerts End of Support LiFi Computing Statistics Intranet Tip of the week Competition Business Intelligence Network Congestion Mobility Downtime Search Scam Virtual Desktop USB Piracy Files Business Owner Compliance Sports Hacker Point of Sale Programming HIPAA Regulations User Analyitcs Education Redundancy Bandwidth Safety Specifications IBM Settings Flexibility Hosted Solution Internet Exlporer Memory Business Technology Storage Laptop communications Hacks Productivity Smart Technology Documents Conferencing Networking Migration Gaming Console Halloween Downloads Entrepreneur Undo PC Care Travel Distributed Denial of Service IT Management Hotspot 5G PDF Value People eBay Chatbots Scary Stories Virtual Reality Multi-Factor Security Managed IT Service Remote Support Leadership Identity Theft New Additions Windows 10 Language Monitors Skype Streaming Media Print Server Text Messaging Techology Identity SaaS Google Calendar Deep Learning Break Fix Domains Google Wallet Work Station Congratulations Computing Infrastructure Adminstration Fun Writing LinkedIn Word Law Firm IT Video Surveillance Disaster Resistance 3D Legislation Dark Web Public Speaking Drones Windows 8.1 Update Recycling Server Management Cooperation Cortana Social Engineering Best Available eWaste Buisness Identities IT Consulting Motherboard Telephony Data Warehousing Backups Staff Knowledge Environment CIO Solid State Drive Bluetooth Data Breach Modem Software as a Service Software Tips Microsoft Excel Scheduling Legal Online Currency Samsung Debate Vulnerability Operations Experience Troubleshooting Heating/Cooling Alt Codes Computer Accessories Technology Laws Cookies Private Cloud Technology Tips Blockchain Consumers Crowdfunding Virtual Private Network YouTube Typing Unified Threat Management Nanotechnology Public Cloud Comparison Permissions IP Address Google Drive Company Culture Twitter IT Technicians How To Refrigeration Cryptocurrency Disaster Touchscreen Access Control Sync Black Friday IT Support Fraud Google Docs Mirgation Macro Cost Management Bitcoin Digital Signature SharePoint Mobile Device Managment Cyber Monday

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...