Trash bin with old floppy disks and sticky notes showing weak passwords like 123456 and qwerty.

Dry January for Your Business: 6 Tech Habits to Quit Cold Turkey

January 12, 2026

Right now, countless people are embracing Dry January.

They're eliminating the one thing they know harms them to boost their wellbeing, enhance productivity, and finally stop postponing change with "I'll start Monday."

Your business has its own version of Dry January, composed not of drinks but of harmful tech habits.
They're familiar—risky or inefficient practices that everyone tolerates because "it's fine" or "we're busy."

But when "fine" turns into a crisis, these habits reveal their true cost.

Discover six dangerous tech behaviors to eliminate immediately, with practical alternatives to implement.

Habit #1: Delaying Software Updates With "Remind Me Later"

That seemingly harmless button has jeopardized more small businesses than many cyberattacks.

We understand the inconvenience of unscheduled restarts, but these updates don't just introduce features—they fix critical security flaws hackers actively exploit.

Putting off updates turns days into weeks, weeks into months, leaving your software exposed and vulnerable.

The infamous WannaCry ransomware took advantage of a vulnerability patched two months prior because users repeatedly deferred updates.

The results were devastating: companies across 150+ countries suffered multi-billion-dollar losses as operations were paralyzed.

Action Step: Schedule updates at the end of business hours or allow your IT team to manage silent background installations. This prevents disruptions and blocks entry points for cyber attackers.

Habit #2: Using a Single Password Everywhere

We all have that go-to password.

It ticks the boxes for strength and memorability, so naturally, it's reused across email, banking, shopping, accounting software, and even old forums.

Here's the risk: data breaches happen unceasingly, and that ancient forum's compromised database means your credentials are now traded on hacker markets.

Hackers don't need to guess—they employ credential stuffing, trying known email-password combos across multiple accounts until one opens.

Action Step: Adopt a reliable password manager—such as LastPass, 1Password, or Bitwarden. You memorize one master password; the tool creates and stores unique, strong passwords for every account. Setup is quick; the security benefits last indefinitely.

Habit #3: Sharing Passwords via Insecure Channels

"Can you send me the login for our shared account?"

"Sure—username admin@company.com, password Summer2024!"

Sent via Slack, text, or email, it's resolved in seconds.

But those messages remain stored indefinitely—in inboxes, sent folders, backups—and are easily searchable. If someone's account is compromised, attackers gain access to all shared credentials.

It's equivalent to mailing your house keys without any protection.

Action Step: Utilize password manager sharing tools for secure access control without exposing actual passwords. Ability to revoke access instantly eliminates lingering security gaps. If manual sharing is unavoidable, split credentials across different channels and immediately change passwords afterward.

Habit #4: Granting Everyone Admin Rights for Convenience

Sometimes a user needed to install software or change settings. Instead of granular permissions, they were simply made admins.

Now, many team members hold full admin privileges, often unnecessarily.

Admin access permits software installs, security disabling, critical configuration changes, and deletion of vital data. If an attacker compromises any of these accounts, the damage multiplies rapidly—especially ransomware attacks.

Giving broad admin rights is like handing every employee keys to the safe because one needed a stapler.

Action Step: Apply the principle of least privilege by granting access solely based on role necessity. Spending extra minutes on setup saves substantial risk and expense from potential security breaches or accidental data loss.

Habit #5: Letting Temporary Workarounds Become Permanent

A quick fix was made when issues arose, with a plan to address it properly later.

Years have passed, yet the workaround remains the standard process.

Though it may add extra complexity or steps, it's accepted because "it works." But these shortcuts erode productivity across your team over time.

Moreover, they introduce fragility—reliance on specific software versions or tribal knowledge that fades, risking complete failure during inevitable changes.

Action Step: Compile a list of these workarounds and let experts help replace them with resilient solutions, eliminating frustration and saving valuable time.

Habit #6: Relying on a Single Complex Spreadsheet to Run Your Business

You know it well: one massive Excel file with over a dozen interwoven tabs and formulas.

Only a handful understand how it functions—often excluding the original creator who is no longer with the company.

What if it corrupts? What if the key maintainers leave? This spreadsheet is a critical point of failure disguised in plain sight.

Spreadsheets lack robust version control, audit trails, scalability, integrations, and reliable backups, making them poor choices for mission-critical operations.

Action Step: Document the business processes the spreadsheet supports, then migrate to dedicated software designed for those tasks: customer management, inventory control, scheduling, and more. These platforms provide security, auditability, user permissions, and backup safeguards.

Why Breaking These Habits Is So Tough

You recognize these habits are flawed.

But the real obstacle? Time and busyness.

  • Risks remain hidden until disaster strikes. Password reuse works—until it doesn't.
  • Proper security feels slower initially. Password managers take setup time, while old habits seem effortless. The costs of breaches, however, far exceed these inconveniences.
  • When entire teams share unsafe practices, risks become normalized and harder to notice.

This mirrors Dry January's success: it raises awareness, disrupts routine, and exposes hidden dangers.

How to Quit Without Relying on Willpower Alone

Willpower fails for sustainable change—environment shapes behavior.
Apply the same principle to your tech habits.

Businesses that succeed don't depend on discipline alone; they design systems making secure choices the default:

  • Company-wide deployment of password managers eliminates unsafe credential sharing.
  • Automated updates prevent delay buttons.
  • Centralized permission management restricts unnecessary admin rights.
  • Robust solutions replace fragile workarounds.
  • Proper tools replace risky spreadsheets, adding backups and access controls.

When the right habits become easier than the wrong ones, true change follows.

A trustworthy IT partner doesn't just advise; they transform your systems so secure practices are effortless defaults.

Ready to Eliminate Tech Habits Holding Your Business Back?

Schedule a Bad Habit Audit.

In a brief 15-minute call, we'll explore your unique challenges and provide a clear, actionable roadmap to put these issues behind you.

No pressure, no jargon—just a path to a more secure, efficient, and profitable 2026.

Click here or give us a call at 929-523-2921 to book your Call With Our CEO.

Some habits deserve a complete end—and there's no better moment than January to begin.