Trash bin with old floppy disks and sticky notes showing weak passwords like 123456 and qwerty.

Dry January for Your Business: 6 Tech Habits to Quit Cold Turkey

January 12, 2026

Right now, millions are embracing Dry January, ditching alcohol to boost their well-being, improve productivity, and stop the endless cycle of "starting Monday."

Your business has its own version of Dry January—a list of tech habits that may seem harmless but are silently holding you back.

These habits are common knowledge as risky or inefficient, yet they persist under the excuse of "it's fine" or "we're busy."

Until one day, it's not.

Here are six damaging tech habits to quit immediately, along with smarter alternatives to protect and optimize your operations.

Habit #1: Postponing Software Updates by Clicking "Remind Me Later"

That tempting button has jeopardized more small businesses than hackers themselves.

We understand the frustration of unexpected restarts during work. However, updates do more than add features—they patch critical security vulnerabilities that cybercriminals actively exploit.

Delaying updates from days to weeks and even months leaves your systems exposed to attacks like the infamous WannaCry ransomware, which exploited a flaw patched months earlier. Former victims all ignored update reminders too many times.

The fallout? Billions lost globally and widespread operational shutdowns.

Stop delaying: Plan updates at day's end or let your IT team manage seamless background installations—no disruption, no security gaps.

Habit #2: Reusing One Password Across Multiple Accounts

We all have that go-to password: meets minimum standards, easy to recall, and sadly, used everywhere—from email to banking, e-commerce, and even niche forums.

Data breaches are rampant. If a less secure platform leaks your credentials, hackers get your password and test it across critical accounts—a tactic called credential stuffing.

Your "strong" password becomes an open door for cybercriminals.

Break free: Adopt a trusted password manager like LastPass, 1Password, or Bitwarden. Remember one master password while generating unique, complex passwords for every service. Setup is quick; security benefits last indefinitely.

Habit #3: Sending Passwords via Email or Messaging Apps

Sharing login details via Slack, text, or email may solve immediate issues but leaves a permanent, searchable record in inboxes and backups.

If any email account gets compromised, attackers can easily collect these credentials by searching for keywords like "password." It's akin to mailing your house keys openly.

Secure sharing: Use password managers with built-in sharing features that grant access without revealing the password. Permissions can be revoked instantly, eliminating lingering security risks. If manual sharing is unavoidable, split credentials across channels and change passwords immediately after.

Habit #4: Assigning Admin Rights to Everyone for Convenience

Granting admin privileges as an easy fix for installation or setting changes has led to half your team having unrestricted access.

Admin accounts can install software, disable security, modify settings, and delete crucial files. Compromised credentials here give attackers full control—perfect targets for ransomware that thrives on extensive access.

Giving broad admin rights because "it's easier" is like handing out keys to your safe just so someone can grab a stapler.

Change the approach: Apply the principle of least privilege—grant access strictly based on necessity. While setting permissions takes extra time, the security and integrity it provides far outweigh the effort.

Habit #5: Letting "Temporary" Workarounds Become Permanent Fixes

When quick fixes made out of necessity turn into long-term practices, productivity takes a hit.

These workarounds often add extra steps, depend on specific knowledge, and become fragile over time. When changes arise, the system collapses, and no one knows how to fix it properly because the real solution was never implemented.

Take action now: Compile a list of all workarounds your team depends on. Don't try to fix them solo. Instead, partner with us to replace these stopgaps with robust solutions that reduce frustration and boost efficiency.

Habit #6: Relying on a Complex Spreadsheet to Run Your Business

Everyone knows the dreaded file: one massive Excel workbook packed with countless tabs and complicated formulas understood by only a select few—often no longer with your company.

If it becomes corrupted or the key person leaves, how do you recover? This file is a ticking time bomb—with no proper backups, audit trails, or integration capabilities.

Modernize: Document the processes your spreadsheet supports, then migrate to specialized tools such as CRMs, inventory systems, and scheduling software. These platforms offer security, scalability, and resilience far beyond what any spreadsheet can deliver.

Why Breaking These Habits Is Challenging

You already recognize these practices as risky or inefficient—information isn't the problem; time and busy schedules are.

  • Consequences often remain invisible until disaster strikes, like credential reuse working fine until one day it leads to a breach.
  • Proper methods may seem slower upfront; setting up a password manager takes longer than typing a memorized password, but the potential breach costs are exorbitant.
  • Team-wide bad habits normalized as "just how things are done" mask the risks, making change more difficult.

Dry January works by creating awareness and disrupting routine; your business tech needs the same forced reset.

How to Quit These Habits for Good (Without Relying on Willpower Alone)

Willpower can falter; environment design sustains change.

Companies that effectively ditch these bad habits do so by creating environments where the safe, efficient choice is the default:

  • Company-wide deployment of password managers eliminates insecure credential sharing.
  • Automatic push of software updates removes procrastination.
  • Centralized permission management controls admin access accurately.
  • Replacing fragile workarounds with reliable, documented solutions.
  • Transitioning critical data from spreadsheets to secure, scalable platforms.

By redesigning systems so the right actions are easiest, good habits replace bad ones naturally.

This is the expertise a proactive IT partner provides—not just advice, but actionable system changes that make security and efficiency your default.

Ready to Eliminate Hidden Tech Habits Dragging Down Your Business?

Schedule a Bad Habit Audit with us.

In just 15 minutes, we'll uncover your biggest tech challenges and deliver a tailored roadmap to permanently resolve them.

No pressure. No jargon. Just a smoother, safer, and more profitable 2026 awaits.

Click here or give us a call at (760) 266-5444 to book your Discovery Call.

Because some habits deserve to be kicked for good—and there's no better time than now.