Trash bin with old floppy disks and sticky notes showing weak passwords like 123456 and qwerty.

Dry January for Your Business: 6 Tech Habits to Quit Cold Turkey

January 12, 2026

Right now, millions are embracing Dry January, choosing to cut out alcohol to improve their well-being, boost productivity, and stop procrastinating with "I'll start Monday."

Your business likely has its own version of Dry January — a list of tech habits that drag you down rather than cocktails.
These routines might seem harmless or necessary under pressure, but they quietly threaten your efficiency and security.

Let's confront these six damaging tech habits to stop immediately — and discover smarter habits to replace them.

Habit #1: Postponing Software Updates with "Remind Me Later"

Clicking "Remind Me Later" on updates might feel harmless but has caused more harm to small businesses than many cyberattacks.

While unexpected restarts disrupt your day, updates are critical for patching security vulnerabilities hackers eagerly exploit.

Delaying updates turns into weeks or months, leaving your systems exposed to known threats.

Take the infamous WannaCry ransomware: Microsoft patched the vulnerability months before, but countless victims ignored updates, causing billions in losses across 150+ countries.

Action Step: Schedule updates during off-hours or allow your IT team to automate background installations — secure your systems without interrupting your flow.

Habit #2: Using a Single Password Everywhere

Many rely on one "strong enough" password for all accounts — from email to banking, Amazon, and even forgotten forums.

Unfortunately, data breaches frequently expose these credentials, turning your favorite password into a universal key for hackers.

Credential stuffing attacks exploit this, leading to widespread account compromises.

Action Step: Invest in a reputable password manager like LastPass, 1Password, or Bitwarden. Use one master password and let it generate unique, complex passwords across all platforms — safeguarding your digital life effortlessly.

Habit #3: Sharing Passwords via Insecure Channels

Sharing login details over Slack, email, or text might seem quick, but those messages linger indefinitely — vulnerable to breaches and exposing your entire team's credentials.

This is like mailing your house keys to everyone.

Action Step: Use password managers' secure sharing features, which grant access without revealing passwords and allow you to revoke access anytime. If manual sharing is unavoidable, split credentials across channels and promptly change passwords afterward.

Habit #4: Granting Everyone Admin Rights to Simplify Tasks

Assigning admin permissions broadly because "it's easier" opens the door to serious risks. Admins can install software, disable security tools, and delete files — powers no one should have indiscriminately.

If an admin account is compromised, attackers gain these full privileges, massively escalating potential damage.

Action Step: Apply the principle of least privilege: give team members only the access they need. The slight effort to assign proper permissions protects your business from costly breaches and accidental errors.

Habit #5: Letting "Temporary" Workarounds Become the Norm

Temporary fixes often morph into permanent processes — clunky, inconsistent, and fragile.

These inefficiencies quietly drain productivity and depend on tribal knowledge that disappears when team members leave.

Action Step: List all workarounds currently in use and partner with experts to replace them with streamlined, durable solutions that save time and reduce frustration.

Habit #6: Relying on a Complex Spreadsheet to Run Your Business

That one sprawling Excel workbook seems indispensable, but it's a ticking time bomb.

Lack of backups, opaque formulas, no audit trails, and dependence on individual knowledge jeopardize your operations.

Action Step: Document the business processes the spreadsheet supports and transition to specialized tools like CRM, inventory, and scheduling software — complete with backups, permissions, and audit logs.

Why Bad Tech Habits Persist

It's not that you're unaware these habits are risky — it's that busyness keeps you locked in.

Risks stay hidden until disaster strikes. The quicker "fixes" feel more efficient. And when everyone does it, it no longer feels like a problem.

Dry January succeeds by breaking autopilot and making hidden risks visible — the same approach your business tech needs.

A Sustainable Way to Ditch Bad Habits

Willpower alone won't cut it — changing your environment is key.

Smart companies automate updates, enforce password management, centralize permissions, replace workarounds, and migrate critical data to secure platforms.

This turns the right actions into effortless defaults, making bad habits the harder choice.

That's the power of a proactive IT partner: they reshape your systems so security, efficiency, and productivity come naturally.

Ready to Break Free from Tech Habits Holding Your Business Back?

Schedule a Bad Habit Audit today.

In just 15 minutes, we'll dive into your unique challenges and provide a clear, jargon-free plan for a safer, faster, and more profitable 2026.

Click here or give us a call at 323-410-7785 to book your 10-Minute Discovery Call.

Some habits are worth quitting cold turkey — and there's no better time than January to start.