Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why You Should Reexamine Your Business Practices

Tip of the Week: Why You Should Reexamine Your Business Practices

As a business adopts certain “best practices,” it is important for business leaders to consider why they are adopted, and more importantly, are they really for the best? There are many problems that subscribing to false best practices can produce, and so it becomes important to identify, adjust, and resolve them.

The term “best practices” is used exceptionally often in business communications, blogs, and other messages, to the point that it is fair to say that the term is bandied about just for the sake of using it. However, so much stake is placed in what is considered “best practice” that whatever is purported to be best is accepted without any further examination.

In his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business, and in an interview with the Harvard Business Review discussing this publication, Professor Freek Vermeulen discusses this phenomenon.

In the interview, the subject of reverse benchmarking is brought up, and with it, the example presented by Capitec. Capitec is a bank in South Africa that leveraged reverse benchmarking in order to cement their place in their market.

Reverse benchmarking is where you examine the standard practices of your particular industry in order to determine how one can do better, often by abandoning what other businesses treat as status quo. Returning to the Capitec example, Capitec observed that the other banks in South Africa were closing at 4 o’clock in the afternoon. In response to this, Capitec extended their hours to allow those who are employed to attend to their banking after work, and many of their branches have Saturday hours as well.

This is just one example of how “best practices” may not always be “best” for all businesses. However, when many businesses are questioned specifically regarding their supposed best practices, the response is often some variation of “this is what is safe and/or comfortable, and this is the way it has always been done.” According to Vermeulen, this is a good sign that there needs to be an examination into whether or not an organization is subscribing to practices because they are truly helpful, or if they are just stuck to the status quo.

There is also the danger of assuming that, because a company became successful by doing something, that something is a best practice. Vermeulen brought up the possibility that the companies who have reached the top have done so by following risky strategies and lucked out, while the vast majority of companies who did the same thing they did ultimately failed and died out in obscurity.

Vermeulen also acknowledges that changing an established practice is not an easy conclusion for many businesses to come to. According to him, companies will wait as long as they can before they make a change out of necessity--when they begin to see productivity and profitability suffer--but by then, change is more difficult to make.

This is why Vermeulen offers this advice: “Be proactive.”

By evaluating your business and establishing what actually works and--more importantly--what doesn’t, you can identify weak points and resolve them before they cause your business too much trouble.

Voyage Technology can do the same for your IT, evaluating your systems and network to ensure that everything is up to standard. Give us a call at 800.618.9844 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 09 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Phishing Privacy Google Email Workplace Tips Computer Workplace Strategy Backup Collaboration Small Business Hosted Solutions Ransomware Users AI Managed Service Mobile Device Productivity Saving Money Microsoft Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Artificial Intelligence Automation Facebook Holiday Compliance Gadgets Cloud Computing Covid-19 Training Managed Service Provider Outsourced IT Remote Work Server IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Vendor Managed Services Data Security Apps Two-factor Authentication Mobile Office Chrome Mobile Device Management Budget Tip of the week Gmail Voice over Internet Protocol Apple WiFi Networking App Employer-Employee Relationship BYOD Password Conferencing Managed IT Services How To BDR Computing Information Technology HIPAA Physical Security Hacker Applications Avoiding Downtime Office 365 Marketing Access Control Augmented Reality 2FA Help Desk Storage Bring Your Own Device Retail Healthcare Big Data Operating System Risk Management Router Computers Virtual Private Network Analytics Website Office Tips Health Monitoring Excel Document Management Firewall Remote Workers Managed IT Service Telephone Scam The Internet of Things Data loss Cooperation Free Resource Social Going Green Project Management Windows 7 Patch Management Save Money Microsoft 365 Cybercrime Remote Monitoring Vulnerability End of Support Vendor Management Solutions Customer Service Display Printer Paperless Office Windows 11 Infrastructure Money Data Storage Humor Smart Technology Supply Chain Word Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Sports Mouse Maintenance Safety Antivirus Administration Downloads iPhone Licensing Entertainment Vulnerabilities Data Privacy Images 101 Settings Wireless Printing Telephone System Multi-Factor Authentication Content Filtering Robot Mobility Cost Management Customer Relationship Management YouTube Cryptocurrency IT Management Hacking VPN Employees Meetings Presentation Integration Virtual Desktop Data storage User Tip LiFi Modem Wireless Technology Computer Repair Mobile Security Processor Outlook Holidays Websites Mirgation Hypervisor Displays Hard Drives Shopping Nanotechnology Optimization Domains PowerPoint Scary Stories Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Hacks Addiction Management PCI DSS Chatbots Refrigeration Fun Navigation Lenovo Gig Economy Deep Learning Screen Reader Public Speaking Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Lithium-ion battery Server Management Regulations Compliance Education Private Cloud Identity Evernote Paperless Entrepreneur Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Twitter Alerts SQL Server Technology Care Mobile Computing Download Net Neutrality Financial Data Error History Undo Search Business Communications Browsers Smartwatch Best Practice Connectivity IT Social Engineering Break Fix Scams Buisness Remote Computing Azure Hybrid Work Upload Procurement Legal Social Network Telework IT solutions Cyber security Multi-Factor Security Tech Human Resources CES Business Growth Tablet IoT Communitications Dark Web Cables Alert Application Trends Supply Chain Management Managed IT Customer Resource management FinTech File Sharing Regulations Cortana Dark Data Google Calendar Term Google Apps Data Analysis Alt Codes Star Wars IT Assessment IBM How To Microsoft Excel IT Maintenance Gamification Flexibility Downtime Notifications Staff Value Business Intelligence Organization Hosted Solution Travel Social Networking Legislation Shortcuts Ransmoware Techology Fileless Malware Digital Security Cameras Typing Google Maps Smart Devices Content Remote Working Wearable Technology Memory Vendors Google Drive Health IT Unified Threat Management Motherboard Data Breach Competition Knowledge Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Assessment Electronic Health Records Wasting Time Threats 5G Google Docs Unified Communications Trend Micro Experience Network Congestion Specifications Security Cameras Workplace Strategies Running Cable Fraud Meta User User Error Microchip Bitcoin Internet Exlporer Software as a Service Google Wallet Username Managing Costs Amazon Point of Sale eCommerce Black Friday SSID Laptop Virtual Assistant Outsource IT Windows 8 Database Surveillance IP Address Drones Network Management Tech Support IT Technicians Virtual Machine Environment Media Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Halloween Hotspot Transportation Small Businesses Recovery Tactics Development

Blog Archive