{"id":170,"date":"2014-02-23T17:42:20","date_gmt":"2014-02-23T23:42:20","guid":{"rendered":"http:\/\/cybersecurity.bellevue.edu\/?p=170"},"modified":"2021-08-30T13:10:21","modified_gmt":"2021-08-30T19:10:21","slug":"perfection-is-the-destination-not-the-starting-point","status":"publish","type":"post","link":"https:\/\/cybersecurity.bellevue.edu\/index.php\/2014\/02\/23\/perfection-is-the-destination-not-the-starting-point\/","title":{"rendered":"Perfection is the destination, not the starting point"},"content":{"rendered":"<p><em>Preface: This post is not directly related to security. It&#8217;s something for all professionals to consider.<\/em><\/p>\n<p>It\u2019s the start of a new day. The sun is shining, birds are singing, and we have a fresh start. We have time to smell the roses and ensure everything goes our way (Zip-A-Dee-Do-Dah!). Yet how often do our mornings actually start like this?<\/p>\n<p>More often our days start frenetically as we rush to our jobs and other activities.\u00a0 We miss critical details that may or may not make a difference. \u00a0It\u2019s really the same with anything new.<\/p>\n<p>Many of us want things to be perfect when we start something, whether it\u2019s a new day, a new job, or a new project.\u00a0 There are those who won\u2019t even start until everything is in line according to their plans. The expectation of perfectionism isn\u2019t realistic and really hampers our efforts. This leads to the title of this piece: \u201c<i>Perfection is the destination, not the starting point<\/i>.\u201d \u00a0Being perfect is something to strive for, not to start with.<\/p>\n<p><i>If you wait to start anything until whatever you\u2019re doing is perfect, you\u2019ll start nothing<\/i>. Or To take from Jeff Bullas\u2019 blog <a href=\"http:\/\/www.jeffbullas.com\/2013\/06\/10\/are-you-waiting-to-be-perfect\/\"><i>Are You Waiting to be Perfect?<\/i><\/a><i>,<\/i> \u201cIf you don\u2019t start then nothing will happen\u2026. it is that simple.\u201d\u00a0 Or as Leo Tolstoy puts it in <i><span style=\"text-decoration: underline;\">Anna Karenina<\/span><\/i>, \u201c<i>If you look for perfection, you\u2019ll never be content<\/i>.\u201d<\/p>\n<p>It&#8217;s unrealistic not to expect something to go wrong or at least not be exactly like we want.\u00a0 It&#8217;s better to embrace life\u2019s imperfections and know when &#8220;good enough&#8221; is really what you need.\u00a0This sets the level of expectations for everyone, even (if not especially) ourselves.\u00a0 Admitting our propensity for errors demonstrates our humanity and shows that we are real.\u00a0 It\u2019s a paradox that when we allow for our weaknesses, it demonstrates our strengths.<\/p>\n<p>\u201cThe journey of a thousand miles begins with a single step\u201d and that step doesn\u2019t need to be perfect; it just needs to be there. An organization\u2019s culture needs to embrace this concept and allow employees to be willing to step out and start.\u00a0 Guy Kawasaki\u2019s book, <a href=\"http:\/\/www.guykawasaki.com\/the-art-of-the-start\/\">The Art of the Start: The Time-Tested, Battle-Hardened Guide for Anyone Starting Anything<\/a> he encourages entrepreneurs to make meaning, make mantra, and get going. It\u2019s a definitive guide for anyone starting anything.<\/p>\n<p>What do you need to start?\u00a0 Are you waiting for it to be perfect before you do?\u00a0 Don\u2019t. It\u2019s okay to be human.\u00a0 If you never start anything, you\u2019ll never go anywhere.<\/p>\n<p>[Note: This is being cross-posted on <a title=\"IBC Viewpoints\" href=\"http:\/\/ibc-viewpoints.com\/\" target=\"_blank\" rel=\"noopener\">IBC Viewpoints<\/a>.]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Preface: This post is not directly related to security. It&#8217;s something for all professionals to consider. It\u2019s the start of a new day. The sun is shining, birds are singing, and we have a fresh start. We have time to smell the roses and ensure everything goes our way (Zip-A-Dee-Do-Dah!). Yet how often do our [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-170","post","type-post","status-publish","format-standard","hentry","category-security-management"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/170","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/comments?post=170"}],"version-history":[{"count":3,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/170\/revisions"}],"predecessor-version":[{"id":992,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/170\/revisions\/992"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/media?parent=170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/categories?post=170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/tags?post=170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}