p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; line-height: 21.0px; font: 20.0px Times}
A company culture that is predicated upon solution management will continue to thrive and generate unity by adapting and preparing for change.
p.p2 {margin: 0.0px 0.0px 0.0px 0.0px; text-align: justify; line-height: 12.0px; font: 10.0px Times}
p.p3 {margin: 0.0px 0.0px 0.0px 0.0px; text-align: justify; text-indent: 13.3px; line-height: 12.0px; font: 10.0px Times}
p.p4 {margin: 0.0px 0.0px 0.0px 22.5px; text-align: justify; text-indent: -18.0px; line-height: 12.0px; font: 10.0px Times}
p.p5 {margin: 0.0px 0.0px 0.0px 0.0px; text-align: justify; text-indent: 13.3px; line-height: 12.0px; font: 10.0px Times; min-height: 13.0px}
p.p6 {margin: 0.0px 0.0px 3.0px 0.0px; line-height: 12.8px; font: 12.0px Futura}
p.p7 {margin: 0.0px 0.0px 0.0px 0.0px; line-height: 11.0px; font: 9.0px ‘Futura Lt BT Light’}
p.p8 {margin: 0.0px 0.0px 0.0px 0.0px; line-height: 11.0px; font: 9.0px ‘Futura Lt BT Light’; min-height: 11.0px}
span.s1 {font: 10.0px Helvetica; letter-spacing: -0.2px}
The increasing risks from IT breaches and legislation are overreaching; the franchise business model and culture is under pressure. These areas were once seemingly miles apart, but are now interwoven. The National Labor Relations Board’s joint employment ruling inhibits communications and operations between the franchisor and franchisee significantly. This looming limitation is hindering the franchise industry’s culture while simultaneously creating opportunities for cyber-criminals.
- Make your technology security a priority. Audit your environment bi-annually or annually to understand what your risks are and how your company and its customers will be affected if information is stolen. No company is too big or too small and these attacks are becoming more frequent and intrusive.
- Be adaptive. What worked yesterday may not work today. Information security experiences efficacy dilemmas just like other moving facets of your business. As a company or industry culture you are connected, adaptive and collaborative; ensure your technology is too.
- Create Access Controls. Everyone should never have full access to your full environment. By setting controlled access for all users, you can limit access to the systems they need for their tasks to control data exposure.
- Maintain Security Patches. Ensure your hardware and software security is up-to-date with anti-malware signatures, patches, etc. Criminals are continually optimizing their approach to find your vulnerabilities. While installing new or updated security patches, have a plan in place should a breach happen during this prime time.
- Educate and Train. Users should be able to recognize phishing emails, understand the implications of surfing the internet and streaming videos/music, and understand how to utilize passwords; make them strong and use a variety of different ones.
Build the Culture
By employing this platform, the franchisees have fostered the freedom to engage with each other to better understand day-to-day challenges, learn and teach best practices, and build onto each other’s strengths. As a result, a community has been fashioned that is close knit and experiences continued success with creative solution management. By acclimatizing, an atmosphere of intelligent networking has been created. This community forum is now an active medium for small-business owners to explore and implement strategies for their businesses while working within the brand’s guidelines.
Adapt and Prepare for Change
Franchisees rely heavily on the communication forum, but also receive valuable education and guidance from the franchisor through other indirect means. For example, an annual conference is an ideal setting where franchisees convene to interact with industry related vendors, national speakers, small-business consultants and other thought leaders that openly lend their years of expertise in all areas of business.