Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

Tip of the Week: Why You Should Reconsider Your Best Practices

Tip of the Week: Why You Should Reconsider Your Best Practices

The term “best practice” has been used by businesses for years to describe the optimal way of performing a particular task. However, before fully adopting them into business operations, it is important for these practices to be examined and deemed to be beneficial to an individual company’s circumstances. If they are not, a company risks much by adopting a misplaced best practice.

The major problem is that “best practices,” while useful if applied properly, is a term that has largely become a buzzword for businesses to use in their communications. This is dangerous, as there is a lot put at stake based on the term “best practice” alone. Therefore, it is crucial that so-called best practices are reviewed and examined before a business puts strategies based on these practices into place.

This was the argument made by Professor Freek Vermeulen in his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business. An interview with the Harvard Business Review allowed him to discuss the phenomenon further.

To provide an example of how best practices may not always be of a business’ best interest to follow, Vermeulen discussed a South African bank called Capitec and how they relied on reverse benchmarking to identify how to become an outlier in their industry.

The practice of reverse benchmarking can be summed up as the process of examining how one’s industry typically operates in order to identity weak spots in accepted practices and improve internal business operations. This can often lead to the abandonment of what is considered the status quo, if not heavily modifying it.

Capitec’s examinations revealed that other banks in South Africa had a tendency to close at four o’clock in the afternoon. To abandon this status quo, industry-standard practice, Capitec not only extended their hours to enable those who worked during the day to see to their banking needs once their work day was over, they even implemented Saturday hours in many of their branches. As a result, Capitec has since carved out a healthy market share for themselves.

This account is just one example that shows how what is standard practice might not be what is best for the business following it. However, many businesses give some push back when directly asked why they follow the practices they follow. These businesses often will respond with some statement that essentially says “this is what is comfortable” or “this is how it has always been done.” These answers are a good sign that, according to Vermeulen, an organization needs to run a self-audit to determine if they are enacting practices because they benefit the organization, or if they are simply resisting change.

Furthermore, there is the risk inherent in assuming that something that made a business successful is automatically a best practice. As Vermeulen mentioned in his interview, many companies who have reached the top may have simply been lucky as they enacted risk-laden strategies, and most of the companies who tried similar strategies have long since failed and been forgotten.

Of course, changing established practices and patterns is not easy for businesses to do. Vermeulen notes this, stating that many companies will hold out until they have no choice but to make a change. This is usually done at the point where their profits and productivity take a hit. However, waiting until this point often makes change more difficult for these companies. According to Vermeulen, the key to avoiding unnecessary difficulty is simple: “Be proactive.”

By taking the opportunity to audit your business practices before your company is stuck in a life or death situation, you can more clearly see where your company is weakest. Better yet, you will be able to remedy these weaknesses before your company is at risk.

Tekie Geek can help you evaluate your IT solutions to ensure that they are not contributing to any weaknesses that your company may suffer from. Call us at (347) 830-7322 for more information.

Proper Hard Drive Disposal is An Involved Process
Which is More Secure, Your Mobile Network or Wi-Fi...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, January 16, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tablets Tech Term Google Drive Business Mangement Screen Reader Emails Settings Social Education Management Multi-factor Authentication Vulnerabilities Health IT User Tip Alert Music Collaboration Bluetooth Privacy Distributed Denial of Service Laptop Powerful Technology Solutions Government Google Maps IT consulting Staten island Society Fake News Black Market CCTV Websites Lithium-ion battery Paperless Office LiFi Disaster today ’s organizations managed services Tech Terms Holiday Vendor Mangement Mobile Device Management Microsoft Writing Tech Server Robot Save Money Computing G Suite Outsourced IT IT consulting firms Error malware Hard disk Remote Monitoring Travel Security Notifications Start Menu Proxy Server Office Networking Telephone Systems Emergency Law Enforcement Navigation Workers Antivirus Communication Time Management Phishing Apple managed IT services staten island Gadgets BYOD Managed Service Provider Employer-Employee Relationship Help Desk Taxes IT consulting company SaaS Evernote Compliance Staten Island computer support Cloud IT services NYC Efficiency Flash History Bookmark IT support NYC Drones Wireless Technology Congratulations Automobile Big Data Laptops Virtual Assistant Microsoft Office Google Calendar Backup Saving Money Botnet Android 3D Printing Computing Infrastructure Service Level Agreement Blockchain Remote Computing DDoS Processor SharePoint Computer Malfunction Network Management Cabling Budget Proactive IT Webcam IBM Unified Threat Management Deep Learning Cleaning Innovation Flexibility Public Cloud tech support Staten Isalnd Training IT services New York City VoIP Data storage Security Cameras communications eWaste Data Analysis IT support Staten Island Data Protection Windows 8 Hiring/Firing Apps IT consulting Staten Island Hardware Solutions Hardware Private Cloud Content Tactics Accidental deletion Touchscreen Politics Running Cable Best Practice Download Meetings Term Bitcoin Regulations Trends Tracking Supercomputer Healthcare Productivity Bring Your Own Device Administrator Device security Banking Employer Employee Relationship computer services Patch Management Hosted Solution Wireless Headphones Staten Island IT consulting Staten Island tech support Digital Payment Displays Hacker Memory Small Business Hack Disaster Recovery The Internet of Things Television data recovery Staten Island Desktop Rental Service VPN Hard Drive Disposal Hosted Solutions Administration Website Unified Communications Google Docs Virtual Reality Customer Service IT Consultant Data managed IT services NYC IT consulting Worker Google Wallet Outlook Data Breach Business Cards Business Continuity Samsung Best Practices Gmail Upload App Cost Management Tech Support managed services Staten Island Safety Gamification Business Computing Conferencing Browser Information Password Sports Augmented Reality staten island managed services IT consulting NYC Accountants Health Solid State Drive Cortana Legislation Securty Vendor Management Tip of the week PDF Comparison Equifax Twitter Applications Printers Visible Light Communication Unified Threat Management Tablet Retail Work/Life Balance Text Messaging Documents Entertainment Nanotechnology Artificial Intelligence Staffing Mobile Security Productivity Network Security Saving Time Scalability Staten Island IT support Network Google Hacking Telephone System Modem Mobile Technology Addiction Business Business Management Email Customer Resource management Internet ransomware attacks Miscellaneous Printer Company Culture Windows Audit Microchip Recovery Windows XP tech support Username Redundancy Office Tips data recovery Facebook Thank You Managed IT Spam Managed IT Services Domains Cache Social Media Relocation Regulation Software Printing Backup and Disaster Recovery Directions Malware Access Control computer support NYC Cybercrime Mobile Devices Advertising Hackers Automation Experience Multi-Factor Security Router Cryptocurrency Piracy Network Congestion Corporate Profile Social Network Virtual Desktop Scam Social Engineering Specifications Hacks Windows 10 End of Support Office 365 Users Maintenance Google Play HTML User Tips Monitors Hard Drive Business Technology Telephony Monitoring Uninterrupted Power Supply Workstations BDR WiFi Browsers Firewall IT support firms Vulnerability computer repair Staten Island datto Quick Tips Two-factor Authentication Virus Knowledge Ransomware Content Filtering VoIP computer support firms Document Management tech support Staten Island Legal SSID end-user files Mouse Passwords IT Support Lenovo Streaming Media Managing Stress Cybersecurity Devices YouTube Database Reliable Computing Going Green Computer Smartphone IT support Staten Islans IT support New York City computer repair IT services Staten Island Operating System IT consulting firm Chromebook Mobility Computer Care Tip of the Week Workplace Tips Bandwidth Cloud computing Staten Island Downloads Money Physical Security malware worms Mobile Device Business Growth Machine Learning computer support Search Processors Downtime How To Business Metrics Managed IT Services Freedom of Information CryptoLocker CrashOverride Web Server Cloud Computing Identity Theft Digital computer services Staten Island Computers managed it services Information Technology Language Technology Project Management Data Management Update Encryption data loss Data Backup Word Motion Sickness File Sharing Analytics Windows 10 Software as a Service Telephone Managed Service Excel computer support Staten Island IT Management Access Virtualization Data Security IT support it support Spyware Upgrade Wireless Vendor In Internet of Things email scam Microsoft Excel Internet of Things Software License News Startup Fileless Malware Electronic Medical Records Smartphones IT Services Wi-Fi

Newsletter Sign Up