Trash bin with old floppy disks and sticky notes showing weak passwords like 123456 and qwerty.

Dry January for Your Business: 6 Tech Habits to Quit Cold Turkey

January 12, 2026

Right now, millions are embracing Dry January, stepping away from alcohol to boost their health and productivity.

Your business has its own version of Dry January — but it's made up of unhealthy tech habits instead of cocktails.

You know these habits well. They're risky and inefficient, yet we cling to them because "it's fine" and "we're too busy".

Until it's no longer fine.

Here are six technology habits you need to quit immediately, along with smart strategies to replace them.

Habit #1: Postponing Software Updates With "Remind Me Later"

This seemingly harmless button has exposed small businesses to more threats than hackers ever could.

While interruptions are inconvenient, updates not only improve features but seal security vulnerabilities hackers actively exploit.

Delaying updates from days to months puts your systems at risk with known weaknesses criminals can easily access.

Remember the WannaCry ransomware attack? It devastated businesses worldwide by exploiting a flaw patched months earlier — many victims had ignored update prompts repeatedly.

The fallout? Billions lost as operations ground to a halt across 150+ countries.

Break the habit: Plan updates for after-hours or allow your IT team to install them quietly in the background. Avoid disruptions, surprise restarts, and security gaps.

Habit #2: Using One Password Everywhere

We all fall into this trap: a password that "meets requirements," feels strong, and is easy to recall — reused across email, banking, shopping, and countless other accounts.

The danger? Data breaches constantly leak credentials. A forgotten forum account's stolen database could expose your login info to hackers.

They don't need to guess; they already have your password and simply test it on different sites.

This technique, known as credential stuffing, causes a vast number of account compromises. Your "strong" password doubles as a master key in the wrong hands.

Change course: Adopt a password manager like LastPass, 1Password, or Bitwarden. Remember one strong master password, while the tool generates and stores unique complex passwords for every account. Setup is quick; security benefits last forever.

Habit #3: Sharing Passwords via Email or Text

Sharing login details through Slack, email, or text may seem like the quickest fix but creates long-lasting security risks.

Those messages remain in inboxes, backups, and archives indefinitely — searchable and vulnerable to attackers if any account is compromised.

Think of it as mailing your house key on a postcard.

Stop it: Use password managers with built-in secure sharing. Recipients gain access without seeing passwords, and permissions can be revoked anytime. If manual sharing is unavoidable, split credentials across communication channels and change the password immediately after.

Habit #4: Granting Admin Rights to Everyone for Convenience

Quick fixes like giving full admin privileges instead of setting specific permissions may save time initially but introduce massive risks.

Admin access lets users install software, disable security tools, alter critical settings, and delete essential files. If their account is compromised, attackers gain unrestricted control.

Ransomware attacks thrive on accounts with administrative rights, multiplying damage rapidly.

Apply the principle of least privilege: Grant users only the access they genuinely need. Investing time in proper permission setups prevents costly breaches and accidental data loss.

Habit #5: Allowing Temporary Workarounds to Become Permanent

You've likely relied on quick fixes that solve problems in the short term but never got fully resolved.

Over time, these workarounds become routine—even if cumbersome—leading to lost productivity and fragile processes dependent on specific conditions and individuals.

When changes occur, these patched-together systems collapse, and no one remembers how to fix them properly.

Take action: Compile a list of existing workarounds. Don't struggle to fix them yourself; instead, partner with IT experts who can establish permanent, efficient solutions that boost productivity and reduce frustration.

Habit #6: Relying on a Single Complex Spreadsheet to Run Your Business

That overburdened Excel file, with multiple tabs and convoluted formulas known only to a few, poses a significant risk.

If the file corrupts or if the expert who created it leaves, your operations could be severely impacted.

Spreadsheets lack audit trails, proper backups, scalability, and integration capabilities. Building critical processes on them is like propping up your business on fragile digital tape.

Upgrade your tools: Document the business processes the spreadsheet supports. Transition to purpose-built software such as CRM systems, inventory management tools, or scheduling platforms. These solutions offer backups, permissions control, and professional maintenance, eliminating dependency on just one person.

Why Breaking These Habits Is Challenging

You're aware these habits are risky — it's not from ignorance but from overwhelming busyness.

These bad tech habits linger because:

  • Consequences remain hidden until disaster strikes. Password reuse functions flawlessly until it catastrophically fails.
  • Proper methods feel slower in the moment. Setting up a password manager demands hours, while typing memorized passwords takes seconds—until you factor in breach costs and reputation damage.
  • Risky behaviors normalize when everyone participates. Sharing passwords on Slack doesn't feel dangerous if the whole team does it.

This is why systems like Dry January succeed: they create awareness, interrupt autopilot behavior, and make risks visible.

How to Break These Habits Without Relying on Willpower

Success lies in changing your environment, not just your mindset.

Effective businesses remove temptations and barriers by:

  • Deploying password managers company-wide to eliminate unsafe credential sharing.
  • Automating updates to remove "remind me later" options.
  • Centralizing permission management to prevent careless admin rights.
  • Replacing workarounds with robust solutions that don't depend on individual knowledge.
  • Migrating critical spreadsheets to secure systems with backups and access controls.

By redesigning systems so the right actions become the easiest options, bad habits naturally fall away.

A competent IT partner doesn't just tell you what to do—they transform your environment to make secure, efficient practices automatic.

Ready to Break the Tech Habits Holding Your Business Back?

Schedule a Bad Habit Audit today.

In just 15 minutes, we'll discuss your business challenges and deliver a clear, actionable roadmap to eliminate these problems for good.

No jargon, no judgment—just a streamlined, protected, and profitable 2026.

Click here or give us a call at 435-313-8132 to schedule your 10-Minute Conversation.

Because some habits deserve to be quit cold turkey—and there's no better time than January to take the first step.