Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why You Should Reexamine Your Business Practices

Tip of the Week: Why You Should Reexamine Your Business Practices

As a business adopts certain “best practices,” it is important for business leaders to consider why they are adopted, and more importantly, are they really for the best? There are many problems that subscribing to false best practices can produce, and so it becomes important to identify, adjust, and resolve them.

The term “best practices” is used exceptionally often in business communications, blogs, and other messages, to the point that it is fair to say that the term is bandied about just for the sake of using it. However, so much stake is placed in what is considered “best practice” that whatever is purported to be best is accepted without any further examination.

In his recent book, Breaking Bad Habits: Defy Industry Norms and Reinvigorate Your Business, and in an interview with the Harvard Business Review discussing this publication, Professor Freek Vermeulen discusses this phenomenon.

In the interview, the subject of reverse benchmarking is brought up, and with it, the example presented by Capitec. Capitec is a bank in South Africa that leveraged reverse benchmarking in order to cement their place in their market.

Reverse benchmarking is where you examine the standard practices of your particular industry in order to determine how one can do better, often by abandoning what other businesses treat as status quo. Returning to the Capitec example, Capitec observed that the other banks in South Africa were closing at 4 o’clock in the afternoon. In response to this, Capitec extended their hours to allow those who are employed to attend to their banking after work, and many of their branches have Saturday hours as well.

This is just one example of how “best practices” may not always be “best” for all businesses. However, when many businesses are questioned specifically regarding their supposed best practices, the response is often some variation of “this is what is safe and/or comfortable, and this is the way it has always been done.” According to Vermeulen, this is a good sign that there needs to be an examination into whether or not an organization is subscribing to practices because they are truly helpful, or if they are just stuck to the status quo.

There is also the danger of assuming that, because a company became successful by doing something, that something is a best practice. Vermeulen brought up the possibility that the companies who have reached the top have done so by following risky strategies and lucked out, while the vast majority of companies who did the same thing they did ultimately failed and died out in obscurity.

Vermeulen also acknowledges that changing an established practice is not an easy conclusion for many businesses to come to. According to him, companies will wait as long as they can before they make a change out of necessity--when they begin to see productivity and profitability suffer--but by then, change is more difficult to make.

This is why Vermeulen offers this advice: “Be proactive.”

By evaluating your business and establishing what actually works and--more importantly--what doesn’t, you can identify weak points and resolve them before they cause your business too much trouble.

Voyage Technology can do the same for your IT, evaluating your systems and network to ensure that everything is up to standard. Give us a call at 800.618.9844 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 02 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Training Covid-19 Compliance Gadgets Server Managed Service Provider Remote Work Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Apps Vendor Two-factor Authentication Mobile Office Data Security Managed Services Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking Voice over Internet Protocol App HIPAA Computing Hacker Physical Security Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing Managed IT Services How To BDR Healthcare Operating System Computers Router Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Password 2FA Bring Your Own Device Big Data Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Cybercrime Free Resource Project Management Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Solutions Monitoring Firewall Document Management Managed IT Service Windows 11 Telephone The Internet of Things Scam Data loss Excel Social Cooperation Remote Workers Robot Telephone System Customer Relationship Management Cost Management iPhone Settings Printing Wireless Content Filtering Vulnerabilities Hacking IT Management Presentation VPN YouTube Meetings Data Privacy Cryptocurrency Images 101 Wireless Technology User Tip Modem Mobility Processor Computer Repair Mobile Security Multi-Factor Authentication Virtual Desktop Data storage LiFi Word Smart Technology Outlook Employees Machine Learning Integration Money Saving Time Humor Holidays Safety Maintenance Sports Downloads Antivirus Mouse Data Storage Supply Chain Licensing Video Conferencing Entertainment Administration Managed Services Provider Virtual Machines Professional Services Travel Social Networking Net Neutrality Legislation SQL Server Technology Care Business Communications Techology Fileless Malware Google Maps Financial Data Cortana History IT Scams Alt Codes Content Smartwatch Wearable Technology Competition Health IT Downtime Unified Threat Management Motherboard Procurement Comparison Azure Hybrid Work Tech Human Resources Unified Threat Management Directions Hosted Solution Assessment Telework Permissions Cyber security Communitications Cables Typing CES Supply Chain Management Network Congestion Specifications Term Google Apps Google Drive User Error Microchip User Internet Exlporer FinTech Knowledge Fraud IT Assessment IT Maintenance Username Point of Sale Flexibility 5G Black Friday Value Business Intelligence Shortcuts IP Address Google Docs Unified Communications Database Organization Experience Running Cable Tech Support IT Technicians Smart Devices Ransmoware Bitcoin Network Management Digital Security Cameras Google Wallet Proxy Server Cookies Remote Working Monitors Cyber Monday Memory Vendors Google Play Be Proactive Recovery Tactics Hotspot Data Breach Laptop Websites Mirgation Electronic Health Records Workforce Hard Drives Windows 8 Videos Domains Drones Nanotechnology Wasting Time Threats Security Cameras Workplace Strategies SharePoint Addiction Electronic Medical Records Language Trend Micro Halloween Chatbots Software as a Service Meta Refrigeration Management Public Speaking Lenovo Screen Reader Writing Distributed Denial of Service Managing Costs Amazon eCommerce SSID Lithium-ion battery Service Level Agreement Virtual Reality Computing Infrastructure Entrepreneur Scary Stories Private Cloud Identity Surveillance Virtual Assistant Outsource IT Hacks Server Management Media Superfish Bookmark Identity Theft Smart Tech Fun Virtual Machine Environment Medical IT Deep Learning Download Reviews Twitter Alerts Error Development Transportation Small Businesses Undo Browsers Education Connectivity Social Engineering Break Fix Hypervisor Displays Optimization PowerPoint Upload Shopping Remote Computing Multi-Factor Security Employer/Employee Relationships Outsourcing Mobile Computing Social Network Navigation Tablet IoT PCI DSS Search Dark Web Workplace Application Best Practice Trends Gig Economy Alert Buisness File Sharing Regulations Internet Service Provider Dark Data Google Calendar Teamwork Hiring/Firing Managed IT Customer Resource management Evernote Paperless IBM Legal Data Analysis IT solutions Star Wars Regulations Compliance How To Microsoft Excel Memes Co-managed IT Business Growth Gamification Notifications Staff

Blog Archive