Trash bin with old floppy disks and sticky notes showing weak passwords like 123456 and qwerty.

Dry January for Your Business: 6 Tech Habits to Quit Cold Turkey

January 12, 2026

Right now, millions are embracing Dry January, choosing to step away from alcohol to boost their well-being, enhance productivity, and move beyond the cycle of "I'll start Monday."

Your business faces a similar challenge—a list of detrimental tech habits needing to be dropped.
These aren't drinks; they're risky IT practices that everyone knows can cause harm but tolerates because "it's easier" and "we're too busy."

Until problems arise.

Discover six critical tech habits to ditch immediately and practical replacements that safeguard your business.

Habit #1: Postponing Software Updates with "Remind Me Later"

That harmless-sounding button poses a far greater threat than cybercriminals themselves.

We understand—updates often interrupt your workflow. But updates don't just bring bells and whistles; they patch severe security flaws hackers actively exploit.

Delaying updates turns short waits into months, leaving your systems exposed to well-known vulnerabilities and opening the door wide for attackers.

Remember the devastating WannaCry ransomware? It exploited a security hole that had an available patch two months prior. Victimized firms across 150+ countries lost billions simply because they ignored timely updates.

Stop the cycle: Plan updates for low-impact times or have your IT team apply them seamlessly in the background — no interruptions, no risks.

Habit #2: Using One Password Across All Accounts

Many stick to a favorite password that "checks the boxes" and is easy to recall, reusing it for everything from email and banking to online shopping and industry forums.

The danger? Data breaches frequently leak these credentials, making your reused password a master key sold cheaply on the dark web.

Cybercriminals don't guess—they try your leaked passwords everywhere, compromising multiple accounts through a method called credential stuffing.

Change it now: Adopt a password manager like LastPass, 1Password, or Bitwarden. Remember one master password while it securely generates and stores unique, complex passwords for every site—a quick setup for lifelong protection.

Habit #3: Sharing Passwords via Insecure Channels

Consider this all-too-common exchange:
"Send the shared account login," followed by unsecured messages containing passwords over email, chat, or text.

Though convenient, these messages linger indefinitely—in inboxes, backups, and archives—creating easy targets for hackers who just need one compromised email to seize all shared credentials.

It's equivalent to mailing your house key on a postcard.

Secure sharing: Use password managers with built-in sharing features that grant access without revealing actual passwords. Permissions can be revoked anytime, eliminating permanent records. If manual sharing is unavoidable, split information across channels and promptly update passwords.

Habit #4: Granting Universal Admin Rights for Convenience

Maybe someone needed to install software once, or tweak a setting, and the quick fix was to make them an admin rather than assign precise permissions.

Now, many team members hold full admin privileges, exposing your business to risks like uninstalling security tools or deleting vital data if their accounts are compromised.

Ransomware attackers exploit admin accounts aggressively, causing exponentially more damage faster.

Take control: Apply the principle of least privilege—grant access strictly on a need-to-have basis. Investing minutes setting accurate permissions can protect you from costly breaches and accidental mishaps.

Habit #5: Allowing 'Temporary' Workarounds to Become Permanent

A glitch appeared, you implemented a workaround, promising to fix it "later." Now, years later, that patchwork is your standard practice.

Although these extra steps might feel manageable, they add up—costing significant productivity while building fragile systems that collapse when anything changes.

Worst yet, the original fix gets forgotten, leaving your team stuck with inefficient processes.

Fix for good: Compile a list of all workarounds your staff relies on. Don't wrestle with them alone; partner with experts to implement robust, permanent solutions that eliminate inefficiencies and frustration.

Habit #6: Relying on a Single Spreadsheet to Run Your Business

You know the infamous file—dozens of tabs, complex formulas, and a handful of people who understand its magic, one of whom has already left.

If corrupted or lost, your operations could come to a halt, with no backup plan or successor to maintain it.

Spreadsheets lack auditing, scalability, proper backups, and user controls. Building core business functions on them is like depending on digital duct tape.

Modernize now: Document the processes your spreadsheet supports, then migrate to dedicated tools designed for those tasks—CRMs for customers, inventory systems, scheduling platforms—with backups, permissions, and audit trails that preserve your data and sanity.

Why These Harmful Habits Persist

It's not ignorance; it's frenzy. You're well aware these practices are risky, but daily busyness keeps you locked in outdated patterns.

  • Consequences remain hidden until disaster strikes. Password reuse feels safe—until it isn't.
  • Proper methods seem slower initially. Setting up a password manager takes minutes, but typing a memorized password feels quicker. However, breaches cost far more than time.
  • Normalization: When the whole team shares passwords on Slack, the danger seems nonexistent, making risks invisible.

This is why challenges like Dry January succeed—they raise awareness and disrupt autopilot habits by shining light on blind spots.

Break the Cycle Without Relying on Willpower

Success isn't about discipline—it's about environment.

Businesses that break harmful tech habits do so by reshaping their systems so that secure, efficient behaviors become the effortless default:

  • Company-wide deployment of password managers removes insecure sharing options.
  • Automatic update installations eliminate "remind me later" delays.
  • Centralized permission management prevents unnecessary admin rights.
  • Proper solutions replace fragile workarounds, preserving institutional knowledge.
  • Legacy spreadsheets transition to robust platforms with appropriate backups and controls.

With these changes, the safest, most efficient path becomes the easiest choice, while risky habits become obstacles.

A reliable IT partner doesn't just advise—they transform your systems so that good practices dominate naturally.

Ready to Eliminate the Tech Habits Undermining Your Business?

Schedule a Bad Habit Audit.

In just 15 minutes, we'll explore your unique challenges and provide a clear action plan to eliminate risks once and for all.

No judgment. No jargon. Just a streamlined, secure, and more profitable 2026.

Click here or give us a call at 916-626-4000 to schedule your 15-Minute Discovery Call.

Some habits deserve to be quit cold turkey. There's no better time than January to start.