Trash bin with old floppy disks and sticky notes showing weak passwords like 123456 and qwerty.

Dry January for Your Business: 6 Tech Habits to Quit Cold Turkey

January 12, 2026

Right now, millions are taking on Dry January.

They're cutting out the one habit they know is harmful—not just to feel healthier, but to boost their productivity and finally stop putting off change with "I'll start Monday."

Your business has a version of Dry January too.
It's all about ditching damaging tech habits instead of cocktails.

You recognize them: risky, inefficient practices everyone knows they should avoid—but keep doing because "it's fine" and "we're too busy."

Until suddenly, it's not fine anymore.

Here's your guide to 6 tech habits to stop cold this month—and the smarter alternatives to replace them.

Habit #1: Snoozing Software Updates with "Remind Me Later"

This tiny button causes more harm than any hacker could.

Sure, no one wants unexpected restarts midday, but those updates don't just add features. They seal security gaps hackers are actively exploiting.

Pressing "Later" turns into weeks, then months—and before you know it, your systems run on vulnerable software with known exploits.

Remember the WannaCry ransomware attack? It brought businesses worldwide to their knees by exploiting a flaw Microsoft patched two months prior—flaws victims ignored by postponing updates.

The damage? Billions lost in over 150 countries as operations halted.

Break the habit: Schedule updates for after hours or let your IT team automate them quietly in the background—no interruptions, no security gaps.

Habit #2: Using the Same Password Everywhere

We all have that go-to password.

It meets basic rules, feels strong, and is easy to remember—so naturally, it's in use for your email, banking, online stores, accounting software, even old industry forums.

Problem is, data breaches are rampant. That old forum? Its leaked password database likely includes your credentials, now sold to cybercriminals.

They don't need to guess your bank password—they already have it and can test it across your accounts.

This attack method, called credential stuffing, powers countless breaches every year. Your "strong" password is essentially a universal key held by thieves.

Stop it: Adopt a password manager like LastPass, 1Password, or Bitwarden. You'll memorize just one master password while it creates and stores unique, complex passwords for every account—setting you up for effortless security.

Habit #3: Sharing Passwords via Text or Email

"Can you send me the login for the shared account?"

"Sure! admin@company.com and the password is Summer2024!"

Shared quickly over Slack, SMS, or email—problem solved in seconds.

But that message sticks around forever—in sent folders, inboxes, backups, fully searchable and forwardable. If even one email account is compromised, attackers scour past messages for "password" to harvest your credentials.

It's basically mailing your house key on a postcard.

Quit the risk: Use password managers' secure sharing features. Recipients get access without ever seeing the actual password, and you can revoke access anytime—no permanent trail left behind. If you must share manually, split details across channels and change passwords immediately afterward.

Habit #4: Granting Admin Rights to Everyone Because It's Easier

Maybe someone needed to install software or tweak a setting once—so instead of assigning the right permission, you just made them an admin.

Now half the team has full admin access because it was simpler than doing it properly.

Admin rights mean the ability to install programs, disable security, change settings, or delete crucial files. And if that admin's credentials get stolen, attackers inherit those powers.

Ransomware thrives on admin privileges—more access equals faster, greater damage.

Giving everyone admin rights is like handing every employee the keys to a safe just because someone once needed a stapler.

Change it: Apply the principle of least privilege: assign only the access each person genuinely needs. Taking a few extra minutes now can save your business from costly breaches or accidental disasters.

Habit #5: Allowing Temporary Fixes to Become Permanent

Something broke. You found a workaround. "We'll fix it properly later."

That "later" was years ago.

Now the workaround is just "how things get done."

Sure, it adds extra steps. Sure, everyone remembers the hack. But the job still gets done. Why waste time fixing what seems to work?

Because those extra steps, multiplied by your team every day, drain productivity massively.

Worse yet, these workarounds depend on fragile conditions: specific software versions, certain people's memories. When things change—and they always do—the whole system risks collapse. And no one recalls how to fix it properly anymore.

Fix the root: List out all workarounds your team relies on. No need to tackle it solo—let expert IT partners help you replace these band-aids with robust solutions that cut frustration and save time.

Habit #6: Relying on a Single Spreadsheet for the Entire Business

You know the file.

An Excel workbook with a dozen confusing tabs and complex formulas no one fully understands—only a few know how it works, and the creator no longer works here.

If it ever corrupts, what then? If that person leaves, who takes over?

This spreadsheet is your business's single point of catastrophic failure masquerading as a simple tool.

Spreadsheets lack audit trails—deleted data vanishes unseen. They don't scale or integrate with modern tools and are often backed up poorly. You've built critical processes on digital duct tape.

Upgrade your systems: Document what your spreadsheet actually does—the processes it supports. Then adopt specialized tools: CRMs for customers, inventory-specific software, scheduling platforms, etc. These solutions offer backups, audit trails, and access controls, eliminating reliance on cryptic files.

Why Bad Habits Stick Around

Most of these tech pitfalls are familiar.

It's not ignorance holding you back—it's the demands of a busy schedule.

These habits linger because:

  • Consequences stay hidden until disaster strikes. Password reuse works fine—until the breach that shatters everything.
  • Doing the "right thing" often feels slower or harder. Setting up a password manager takes time, while typing a remembered password seems instant—until you count the cost of a security failure.
  • When everyone does it, risk feels normal and invisible, like sharing passwords on Slack or granting admin rights freely.

This is exactly why Dry January succeeds for some—it sparks awareness, interrupts autopilot routines, and reveals hidden risks.

How to Break Tech Habits Successfully (No Willpower Needed)

Willpower alone won't cut it for Dry January.
Your environment does.

The same is true for your business tech.

Companies that conquer bad habits don't rely on discipline—they reshape their systems to make good practices effortless:

  • Deploy company-wide password managers that eliminate insecure sharing entirely.
  • Automate updates so there's no tempting "Remind me later" option.
  • Centralize permissions management to prevent shortcuts like blanket admin rights.
  • Replace unstable workarounds with reliable, documented solutions.
  • Migrate critical spreadsheets into dedicated, secure platforms with backups and controls.

When the easy path aligns with the right path, bad habits become inconvenient—and good habits become second nature.

This is the impact of a great IT partner—they don't just advise; they transform your systems so smart security and efficiency are built-in defaults.

Ready to Break Free from the Hidden Tech Habits Holding Your Business Back?

Schedule your Bad Habit Audit today.

In just 15 minutes, we'll discover your biggest tech challenges and provide a clear roadmap to eliminate them permanently.

No pressure. No confusing tech talk. Just a smoother, safer, more profitable 2026.

Click here or give us a call at 817-589-0808 to book your 30-Minute Discovery Call.


Some habits are worth quitting cold turkey.

And there's no better time than January.