Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Being Busy Doesn’t Mean You’re Being Productive

Being Busy Doesn’t Mean You’re Being Productive

Productivity is a key facet to our success. However, many offices seem to have an environment that focuses more on keeping busy than it does being productive. While they often intersect, these two statuses are very different. Here’s why.

A Rose by Any Other Name
Frankly, it’s pretty easy to observe that “busy” and “productive” are anything but synonymous. We all know those people who seem to be constantly running around, working on this or that. Are these people busy? Certainly. Are they actually accomplishing anything? Maybe, maybe not.

Look at it this way - you can be ‘busy’ doing anything. However, in order to be ‘productive,’ you need to actually produce something. It doesn’t matter if it’s a completed sales proposal, an email explaining away the confusion around a particularly convoluted subject, or… anything else, really, as long as it helps to advance the business’ goals.

The Inherent Issue in Comparing the Two
Unfortunately, much of our context for determining between busyness and productivity comes from the least objective source there is - our own perception.

Look at it this way: let’s say that you gave a research assignment to two employees, with a deadline of an hour. If you left, only to return and see one employee watching YouTube videos, and the other one typing away, who would you see as being the productive one? In the moment, you would probably say that it was the employee who was still typing, and not the one watching videos on the Internet. However, what if I told you that the employee watching videos was actually watching videos related to the task you had assigned, and the other was working on what would likely be their fourth unpublished novel? Or that the employee watching the videos had long since completed the assignment, and was taking a well-deserved break, while the employee who was still typing was only doing so because they had goofed off for much of the time you were away?

This illustrates two considerations: how much different productivity really is than pure busyness, as well as how similar they have the potential to be. In order to keep from fooling yourself into thinking you’re being productive when you’re really just looking busy, try asking yourself a few questions as you commence.

For example, you can take a look at how you spend your time, and compare it to what your responsibilities really are at their core.

For instance, let’s say that Bill’s job was to ensure that the company remained secure. If Bill was able to complete all of his day’s tasks in the morning, but then spent the rest of his day reading things online, what would that be considered? Well, that depends. If Bill was reading the latest Bowling Enthusiasts Weekly articles at his desk for the rest of the afternoon, that’s hardly productive. However, if Bill was researching improved cybersecurity practices to enact in the company... that’s a pretty productive way to spend the time.

A Few ‘Keeping Busy’ Red Flags
Of course, none of the following activities have to be time-wasters, they just happen to be in most situations, or require a very specific job responsibility to be considered productive. For instance, many job responsibilities don’t actually require the Internet to be used, so any time spent on it is arguably a waste. The same can be said of social media, and especially email.

Of course, there are also many exceptions to this rule. In essence, you have to use your best judgement, evaluating if a given activity is actually the best use of your time or not.

Don’t forget, Total Tech Care has plenty of solutions to help you boost your productivity. Reach out to us at 866-348-2602 to learn more!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity IT Support Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Quick Tips Cybersecurity Business Management Users Upgrade Windows Phishing Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Data Recovery Server Save Money Cloud Computing Windows 10 Passwords Social Media Saving Money Holiday Gadgets Tech Term Chrome Virtualization Managed IT Services Managed Service Microsoft Office Automation Cybercrime Artificial Intelligence Operating System Computers Facebook BYOD Internet of Things Mobile Device Management Health Networking IT Support Wi-Fi Hacking Alert Covid-19 Information Managed Service Provider Spam Office 365 Telephone Systems Remote Information Technology BDR Recovery Employer-Employee Relationship Bandwidth Social Engineering Mobility Router Law Enforcement Application Human Resources Password Big Data Remote Monitoring Money Encryption Applications App History Data Breach Mobile Computing VPN Blockchain Private Cloud Paperless Office How To Managed IT Remote Computing Mobile Office Apps Data Storage Patch Management Office Tips Training Government Website Gmail Avoiding Downtime Budget Settings Data Security Two-factor Authentication Bring Your Own Device Mouse Data Management HaaS Work/Life Balance Infrastructure Voice over Internet Protocol Vulnerability Windows 7 Word Flexibility Google Drive Marketing Wireless WiFi Servers IT solutions Entertainment USB Vendor Firewall Managed Services Telephone System Staff Software as a Service Display Save Time Machine Learning Virtual Reality Apple Remote Work Connectivity Social Employee/Employer Relationship Cleaning RMM User Error Meetings Conferencing End of Support Scam Education Physical Security Risk Management Safety Hacker Data Protection Sports HIPAA Redundancy The Internet of Things Vendor Management Keyboard Lithium-ion battery YouTube Charger Business Technology Black Market Content Management Compliance Customer Service Access Control OneNote Environment Computer Care Managed Services Provider Virtual Assistant Current Events Database IT Consultant Document Management Telephony Fax Server Authentication Solid State Drive Wireless Technology Samsung How to Downtime Remote Workers SaaS Humor Value Processor Data storage Update Electronic Medical Records Automobile Spam Blocking Network Congestion Hard Drive eWaste Google Docs Computing Infrastructure Hiring/Firing Identity Theft Going Green Computing Wearable Technology Battery Augmented Reality Retail Hard Drives Shadow IT Fraud Legal Business Intelligence Virus Instant Messaging Excel Digital Signage Remote Worker Robot Audit Unified Threat Management Internet Exlporer Worker IT Management Cryptocurrency Computer Accessories Biometrics Virtual Desktop PDF Botnet IT Plan Procurement Comparison Net Neutrality DDoS Workplace Strategy Proactive IT SharePoint Unsupported Software Printer CES Help Desk Best Practice Bluetooth Printing Wire Video Conferencing Analyitcs Evernote ROI Experience Scalability Software Tips Sales Printer Server Programming Supercomputer Bitcoin Travel Shortcuts Millennials Cryptomining Business Owner Sync Printers Point of Sale Emails Personal Smart Office Supply Chain Management NarrowBand Wireless Charging Antivirus Search Monitoring Batteries Windows 8 Two Factor Authentication Workforce Virtual Private Network Windows 8.1 iPhone Netflix Digitize IT service Root Cause Analysis Cables Windows Server 2008 R2 HBO Customer relationships Knowledge Music Tablet Telecommuting Manufacturing Skype Project Management Email Best Practices Files Nanotechnology IT Assessment Domains Data loss Chromecast Cortana Outlook Computer Tips Leadership Digital Signature Managed IT Service Troubleshooting Security Cameras Uninterrupted Power Supply Biometric Security IaaS Start Menu Warranty Virtual CIO Maintenance Colocation OneDrive Consultant Screen Mirroring HVAC Peripheral Bloatware Loyalty Google Apps Frequently Asked Questions Digital Security Cameras Analytics Monitor Analysis Using Data Books Windows 10s Devices Copiers Tablets 5G Mobile Administrator Best Available Cast Enterprise Content Management Quick Tip Entrepreneur Streaming Media Emergency Smartwatch WIndows 7 Tip of the week MSP Ergonomics Reputation webinar Accountants Shortcut Public Cloud Thought Leadership Development Tech Support Employer Employee Relationship Credit Cards OLED Content Professional Services Microchip Techology Password Management PCI DSS Cost Management Laptop Assessment Password Manager Virtual Machine Multi-Factor Security Employee Windows Server 2008 2FA Social Networking Customers Fiber Optics Twitter Messaging Cabling Audiobook Tools Search Engine NIST Policy Touchpad Television Business Mangement Hypervisor Windows Media Player Trending User Running Cable Dark mode PowerPoint Smart Tech Trend Micro Advertising Addiction SMS Memory Amazon Default App Politics Procedure Public Computer Recycling Saving Time Notifications Transportation Google Search Managing Stress Regulations Wiring dark theme Practices Shopping Computer Fan Cache AI Rootkit Amazon Web Services IT Infrastructure Safe Mode FinTech Cameras Criminal Bing Science Benefits GDPR Relocation Workers Hosted Computing Social Network FENG Wireless Internet Online Shopping Investment Video Games File Sharing Employees IBM Employee/Employer Relationships Smart Technology Specifications ISP Distributed Denial of Service Worker Commute Flash Camera Windows 365 Customer Relationship Management Inventory

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code