• Skip to content
  • Skip to primary sidebar

Header Right

  • Home
  • About
  • Contact

Best Business Practices

Taking on a Larger Competitor and Winning

December 20, 2020 by Admin

Newton Sankey & Co Port Jefferson NYRunning a small business isn’t easy. You probably wouldn’t have it any other way. The ability to survive and thrive is a source of great pride for small business owners. So when a competitor moves in — especially a big one — it can feel like battle lines have been drawn.

Sharpen Your Edge

Before you do anything, accept the fact that you can’t compete on the same level as a large national chain. But that doesn’t mean you can’t win the battle. Study what the competition does and how they do it. Then use that information to define — and sharpen — your company’s competitive edge.

A large competitor will almost certainly have lower prices and a deeper inventory. But you can connect with customers in ways the competition can’t. You can add value to every customer interaction by being attentive and providing expertise and personalized service.

Perhaps your biggest edge is your size. Being small means you can respond to market trends and customer requests more quickly. You can also change and adapt policies and procedures faster.

Rally the Troops

You have another big advantage; you have an established customer base and you know what they need. Establish a timeline to reach out to your customers directly via snail mail or e-mail (or both) with special offers. If you have a loyalty program, consider doubling rewards for a period of time that overlaps with the competition’s opening.

Look for Advantages

Having a big competitor move in may have some unexpected benefits. The new company validates the need for what your business offers and may do a fair amount of advertising. If your marketing budget allows, this could be a good time to do some strategic advertising of your own.

The competition also may create some unexpected opportunities in the future. The new company will change the dynamics of the marketplace, which may lead you to steer your business in a new direction.

Don’t get left behind. Contact us today to discover how we can help you keep your business on the right track. Don’t wait, give us a call today.

Request a free consultation through our website now and we’ll contact you set up an appointment.

Filed Under: Best Business Practices

Hire Nothing But the Best

August 20, 2020 by Admin

BusinessmanHow can your company attract and retain top employees? It’s not always easy, especially for small businesses. Having a streamlined hiring process and ensuring that your salaries and benefits package are comparable to other, similar companies in your area can help make your company an attractive destination for high performers. Here are some pointers to jump-start your thinking.

Simplify the process. Make sure job responsibilities are clearly described when posting your openings. Candidates should be able to easily ascertain if they have the appropriate qualifications for a position. Also, describe any documentation candidates may need to submit with their applications.

Be open and professional. Let candidates know early in the process, preferably in the job posting or during interviews, how much the position pays. Top candidates appreciate candor about such matters. Treat candidates professionally during every stage of the process — it sends a strong signal about your company’s culture.

Evaluate your benefits package. Compensation and benefits are important factors when it comes to attracting and retaining top talent. Salaries should be in line with what other companies in your region pay for specific occupations. Attitudes toward health and retirement benefits can influence employment choices and how committed and engaged employees are after they are hired. Your company will have a leg up on attracting and retaining the employees it needs to succeed and gain a competitive advantage if it can offer the benefit options top performers want.

If you are unsure whether your current benefits package is competitive, please contact your financial professional. An analysis of your current retirement and insurance benefits will help you identify areas that may need to be improved if you are to attract and retain the best employees.

Request a free consultation through our website now and we’ll contact you set up an appointment.

Filed Under: Best Business Practices

Beware the Social Media Swamp – Learn How to Deal with Unhappy Customers

August 18, 2020 by Admin

Business team analyzing market researchThe reach of social media goes beyond sharing family photos. Shoppers are reading product reviews online before deciding what to purchase. And disgruntled customers are sharing their displeasure with anyone who will read their rants.

A New Risk

The benefit of social media to small businesses is considerable. It has leveled the playing field in many ways. But it has also introduced new risks. One of the most critical is that bad reviews or negative comments could ruin your business’s reputation — or worse.

A Proactive Approach

How can you protect your business from online attacks? Here are some suggestions:

Join the conversation. If you’ve been visible on social media, you’ll have more credibility if something erupts. But that’s not the only reason to have a social media presence. Even if your business is never involved in an online dustup, social media offers an opportunity to market and promote your business and engage with your customers. Smartphones and tablets have made it even easier for people to go online.

Pay attention. Monitor the Internet for news about your brand. Routinely check online review sites (if appropriate) and social networking sites for references to your company, and run your company’s name through a search engine.

Be prepared. You can’t draft specific responses ahead of time, but you can identify your vulnerabilities and draft a response strategy. You’ll be well ahead of the game if you do this before a crisis hits rather than during one. You’ll also be able to dial down your emotions and respond more objectively. There’s another upside to identifying your vulnerabilities ahead of time: You have an opportunity to eliminate them.

Respond. Make sure you have the facts straight before you do anything. However, things can escalate rapidly online. So if you’re going to respond, do so quickly and publicly. That said, not every attack warrants a public response. The complaint may not be legitimate or the person complaining may be a troublemaker, in which case responding may be a waste of time.

Half Full

Any time your business is under attack — online or off — try looking at it as an opportunity to change some minds and bolster your reputation.

Request a free consultation through our website now and we’ll contact you set up an appointment.

Filed Under: Best Business Practices

4 Areas to Consider When Transitioning Employees to Working From Home

April 15, 2020 by Admin

women working from homeFor businesses that haven’t traditionally embraced remote employees, it may be difficult to get up to full speed with the current turn of events.  To make the inevitable transition less overwhelming, we assembled a handy checklist of actions to consider while adjusting to the new workplace reality.

Organization

  • Access your staff members and/or roles that are able to work remotely, those that can’t work remotely, and those where remote work may be possible with some modifications.
  • Conduct an employee survey to determine the availability of computers that can be used for working remotely, as well as availability to high-speed internet access.
  • Create company guidelines covering remote employees, including inappropriate use of company assets and security guidelines.
  • Develop and conduct work-at-home- training for using remote access, remote tools, and best practices.
  • Select a video-conferencing platform for services, such as Zoom, Cisco WebEx, or Go To Meeting.
  • Develop a communications plan to involve remote employees in the daily activities of the organization.

 Security

  • Create and implement a company security policy that applies to remote employees, including actions such as locking computers when not in use.
  • Implement two-factor authentication for highly-sensitive portals.
  • If needed, confirm all remote employees have access to and can use a business-grade VPN, and that you have enough licenses for all employees working remotely.

Staff

  • Institute a transparency policy with your staff and communicate frequently.
  • Check in on your staff, daily if possible, to confirm they are comfortable with working from home. Find and address any problems they may be experiencing.
  • Make certain each staff member has reliable voice communications, even if this results in adding a business-quality voice over IP service.
  • Don’t attempt to micro-manage your staff. Remember their working conditions at home won’t be ideal, and they will need to work out their own work patterns and schedules.
  • Create a phone number and email address where staff members can communicate their concerns about the firm, working at home, or even the status of COVID-19.

Infrastructure

  • Ensure that you have ample bandwidth coming in to your company to handle all of the new remote traffic.
  • Make sure you have backups of your services so your staff is able to keep working in the event extra traffic causes your primary service to go down.

You may need to adjust or expand this list to match the specific needs of your firm and the conditions affecting your organization.  Use this list to get you started and to help guide you through the process.

Call us at 631-474-2500 to learn more about our services. Whether you’re just starting out or have been in business for years, we can help you plan the best strategies to minimize your tax liability, provide a full array of accounting and bookkeeping services, and much more.

Filed Under: Best Business Practices

Protect Your Business Data from Hackers

March 18, 2020 by Admin

Newton Samkey & Co. -  Protect Your Business from HackersDo you know where your company’s data is? Without strong security controls in place, your data could be anywhere — and you could be dealing with a privacy breach. As technology grows more complex and the flow of information accelerates, opportunities for the misuse and abuse of data are bound to increase.

Flow Chart of Data

It’s imperative that you know exactly what data your business collects. Pay particular attention to the personally identifiable information (PII) you have for both customers and employees. Create a detailed flow chart showing what information is gathered, how it is captured, how it is used, where it is stored, how it is shared, and how it is ultimately disposed of.

Risk and Regulations

An effective data management plan helps ensure compliance and manage risk by establishing policies and procedures that control the flow and use of information. In addition to federal privacy legislation, the vast majority of states have laws to prevent security breaches, and some industries have developed their own privacy guidelines. Note that each phase of the information “life cycle” may require a unique set of controls.

Privacy Policies

Privacy policies are the “public” face of your data management plan. Best practices include:

  • Notify customers about your privacy policies. Explain why information is collected, how it is used, why it is retained, and why it is disclosed (if it is).
  • Obtain customers’ consent to use the information as outlined in your policies.
  • Collect only the information you need and only for the purposes outlined.
  • Keep personal information secure.
  • Allow customers to review and update their PII.
  • Do not retain information any longer than needed to fulfill your stated purpose or as required (by law or regulation).
  • If you disclose information to a third party, do so only with consent and only for the purposes outlined.
  • Monitor your compliance efforts on an ongoing basis.

For more tips on how to keep business best practices front and center for your company, give us a call at 631-474-2500 for a free, confidential consultation. We look forward to working with you.

Filed Under: Best Business Practices

How to Keep Your Company’s Email Safe

December 18, 2019 by Admin

data security conceptWhether you use a desktop computer, a laptop, or a smartphone, you have probably come to rely on e-mail to communicate with vendors, customers, and business associates. It’s just as likely that many of your e-mails have attached files that contain confidential information or some other highly private data. Unfortunately, private, important data can be stolen, accidentally forwarded, or leaked through malicious software programs. That’s why you need to focus on enhancing your security measures. Here are some enhancements to consider.

Encryption. Encryption scrambles the data in e-mail messages so that they cannot be read if they are intercepted. Many off-the-shelf and downloadable products use a variation of public-key cryptography (which uses one key for data encryption and another for decryption). Businesses can also access secure e-mail services online.

E-mail gateways. Some businesses secure external e-mails and leave internal e-mails unsecured. Businesses that take this route use e-mail gateway security products that capture outgoing e-mails and ensure that they are sent securely.

Access and usage privileges. Another layer of security involves e-mail users setting access privileges by specifying that a confidential e-mail is accessible only to a particular recipient.

Expiration dates. E-mail users can set expiration dates on their e-mails and other documents so that documents are deleted from a recipient’s inbox on a specified date.

Firewalls. Firewalls are designed to separate one network from another and are often used to separate an internal network from the Internet. Firewalls can also identify and filter out potentially damaging data entering or leaving the network.

Antivirus protection. Installing antivirus software on all company computers protects against viruses that attempt to slip through firewalls by posing as legitimate e-mails or programs.

Give Newton Sankey & Co. a call at 631-474-2500 to discuss a package of accounting services for your business. We offer a free initial consultation.

Filed Under: Best Business Practices

  • Page 1
  • Page 2
  • Next Page »

Primary Sidebar

Search

Archive

  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019

Category

  • Best Business Practices
  • Individual Tax
  • QuickBooks
  • Tax Articles

Copyright © 2019 · https://www.newtonsankey.com/blog