To Grow or Not to Grow; That is the Question

Booster Juice started off in 1999 as a one-store operation with a lot of questions about whether it would burn out as a fad. Their product was a juice smoothie (a fruit, vegetable, or plant-based drink shake). However, by 2016, Booster Juice had over 330 stores across Canada, and they are now looking at entering the U.S. market for even more expansion. How did this company go from one small outfit to a mega corporation franchise, and what did Booster Juice’s management do right to maintain growth successfully?

Dale Wishewan, Booster Juice’s owner, was a mechanical engineer by training, being naturally geared to decisions based on analysis. However, he also realized that just running a business by not taking any risks or having the cash on hand to pay for those risks, was never going to produce fast, exponential growth.

A Path for Growth

So, Wishewan settled early on franchising. The franchise decentralization of daily work and keeping an eye on the big picture kept Wishewan and Booster Juice on track. However, the fact that the daily store management was placed with franchisees who had “skin in the game” also meant that Wishewan didn’t have to worry about the loss of loyalty or control.

The above said, Wishewan still avoided high risk markets, especially overseas like China or South America. While these emerging market venues seemed to offer faster growth, the risk level was higher with control issues. Distance and language also presented major management hurdles as well. So, Wishewan wisely turned down those markets to continue growing in Canada alone. It was a smart decision proven by Booster Juice’s metrics and profit figures.

It’s All About the Plan

Scaling up is as much about planning and strategy as it is understanding one’s current capability and cash flow. There is no one aspect of business an owner or manager focuses on; it’s a multi-faceted challenge to meet the increased sales demand promptly and plan logistics correctly while not ending up going bankrupt in the process. As was seen in the above franchise example, not every opportunity was pursued. The business owners had to do some hard research and probability testing to determine which markets were their best choices for solid growth versus high risk and potential failure. By doing so, they avoided common mistakes in fast growth, such as over-commitment and unreasonable sales targets in the process.

Have an Objective Perspective

Exponential expansion can seem alluring, even addictive. After all, with accrual accounting, things can look pretty rosy for a business once projected sales are included in the numbers, and they’re boosting the revenue side of the accounting reports. However, cash is the killer that brings back reality like a bucket of cold water in the face. When payroll, supplies, liabilities, loans and leveraging can’t be paid timely because the projected sales haven’t materialized yet, a company can fold very quickly, even within a thirty to forty-five day time cycle, just from lack of cash. Ideally, a business should have sufficient resources to take on extra growth, but that’s not how real business works. Risk and taking logistical bets are common which makes planning wisely crucial to not betting the farm on “maybe” revenue.

Wishewan and Booster Juice provide a clear example of why, even with positive growth, a business owner or leader has to judge ventures carefully before jumping in. Sometimes some revenue opportunities do need to be passed up to stay successful overall.

Learn to Protect Yourself From the Inside

Kingdoms have fallen, and wars have been lost because of betrayal. Although we all desire to foster an atmosphere of trust and dependence on one another within our companies, it would be foolish to underestimate the internal risks with reports and employees in this digital age.

The Case of Bradley Manning

The case of Bradley Manning is an illustrative example of how even the most secure agencies can be compromised from the inside. Private Manning worked as an intelligence analyst in the U.S. Army two years after enlisting in 2007. Then, in 2009, a major leak occurred that disclosed millions of classified documents from the military’s databases to the now-famous government leak website, Wikileaks. The identification of the source was unknown until Bradley Manning himself disclosed he was the source to a civilian. The conversations about that activity, and other functions Manning had in the military, were primarily out of boredom and disillusionment with the U.S. Army and its role in the Middle East. That discussion disclosing Manning as the source was then reported by the civilian, and Manning was arrested. He was eventually charged and sentenced to 35 years incarceration in a court martial for his actions releasing intelligence material. However, outgoing President Barack Obama decided to pardon Manning.

That Manning was pardoned or that he committed the damage he did to U.S. intelligence is beside the point. The real takeaway here is that he did not trip any flags during his enlistment, screening, and subsequent assignment to intelligence. And then, without any warning, Manning ends up becoming the source one of the top five most famous intelligence leaks in U.S. military history via the internet.

We all want to think the best of the employees and contractors who support our businesses. As a result, most employee policies are written with the assumption that no action will be taken until a threshold is met of unacceptable behavior. However, companies cannot reasonably operate with blind trust either, especially when managing sensitive data information. As in the case of Manning, it only took one action and one flash drive to walk away with as much as was lost in that case. So companies need to be proactive as well.

Begin with One, Two, Three

There are ways to stop data losses from the inside before they occur without having to be suspicious of good employees. Here are three of them:

1) Modularization of data access is a key defense.

By effectively limiting an employee to only the data area in the network needed to do his or her job, the employee cannot access anything else. This can be done through both network login authorizations, as well as pass-keys to different parts of the office building.

2) Keep logs of large data movements.

By having your network administrators can keep regular records of large data changes, you would be able to highlight issues to look into, such as large data transfers at night or on the weekend when nobody would regularly be working or connecting.

3) Learn to be proactive with training.

Companies can follow up regularly with training to teach employees to notice and proactively warn their superiors when they see something wrong. Employees are typically eager to help in this way because they are seen as part of the company defense to protect it and their own livelihood. This approach focuses on personal investment in the issue, which often gains very strong support in practice.

Again, we assume the best of employees, but we also need to be realistic about how easy damage can occur in the digital age. Practicing both trust and sound IT defense can protect a company far more than just a firewall alone.