Trash bin with old floppy disks and sticky notes showing weak passwords like 123456 and qwerty.

Dry January for Your Business: 6 Tech Habits to Quit Cold Turkey

January 12, 2026

Right now, millions are embracing Dry January.

They're ditching the unhealthy habit they know holds them back, aiming to boost their well-being, sharpen focus, and stop postponing change under the guise of "I'll start Monday."

Your business faces a similar challenge: a Dry January list made up of tech habits instead of drinks.
These are the risky shortcuts everyone recognizes but often ignores because "it's fine" and "we're too busy."

Until suddenly, it's not.

Here are six harmful tech habits to completely eliminate this month — and smart strategies to replace them.

Habit #1: Snoozing Software Updates with "Remind Me Later"

That tempting button has endangered more small businesses than many hackers combined.

We understand — no one wants their computer restarting mid-task. But updates do more than add features; they patch security flaws hackers are actively exploiting.

The "later" piles up into weeks and months, leaving your systems vulnerable to attackers who already know how to breach them.

For example, the WannaCry ransomware devastated companies worldwide by targeting a weakness Microsoft patched months earlier. Every victim had deferred updates too often.

The fallout? Billions lost across 150+ countries as businesses came to a standstill.

Break free: Schedule updates for the end of your workday or let your IT team handle them invisibly in the background — no interruptions, no reset surprises, no security gaps.

Habit #2: Using the Same Password Everywhere

We all have that go-to password.

It "meets requirements," feels strong, and is easy to remember — so it gets used across email, banking, shopping sites, and even forgotten forums.

The risk? Data breaches are rampant. That obscure forum's leaked database now exposes your login details, sold cheaply to countless hackers.

Hackers don't need to guess your bank password; they already possess it and test it everywhere to find unlocked doors.

This attack style, called credential stuffing, causes a massive share of account hacks — your "strong" password is effectively a master key in the wrong hands.

Stop it: Adopt a password manager like LastPass, 1Password, or Bitwarden. You remember one master password; it generates and securely stores complex, unique passwords for every account. Setup takes minutes, peace of mind lasts indefinitely.

Habit #3: Sharing Passwords via Text or Email

"Could you send me the login for the shared account?"

"Sure! It's admin@company.com, password Summer2024!"

Sent casually over Slack, text, or email — problem solved in seconds.

But these messages linger indefinitely—in sent boxes, inboxes, backups, all searchable and shareable. If an email is ever compromised, attackers can grab all passwords ever shared.

It's akin to mailing out your house keys on a postcard.

Change it: Use password managers with secure sharing features. Recipients receive access without viewing actual passwords, with access revocable anytime. If you must share manually, separate credentials across channels and change passwords immediately afterwards.

Habit #4: Granting Everyone Admin Rights Because "It's Easier"

Someone needed to install software or tweak a setting once. Instead of assigning precise permissions, they were made an admin.

Now, half your team holds full admin rights simply because it was the convenient shortcut.

Admin access lets users install software, disable security tools, change critical settings, or delete important files. If compromised, attackers inherit these powers.

Ransomware especially loves admin accounts—more access means more damage, faster.

Giving everyone admin rights is like handing out all the safe combinations because one person needed a stapler.

Fix it: Follow the principle of least privilege: assign permissions strictly on a need-to-have basis. Taking a few extra minutes now can save you from costly breaches or accidental data losses.

Habit #5: Permitting "Temporary" Workarounds to Become Permanent

Something broke, so you found a quick fix and promised to address it properly later.

That was years ago.

Now, the workaround is simply part of your routine.

Sure, it's slower and more complicated, but the job gets done — so why bother fixing it?

Yet, these shortcuts drastically reduce productivity across your entire team every day.

Worse, workarounds depend on fragile conditions—specific software, particular people, or procedures only a few remember. When anything changes (and it always does), everything breaks, with no one knowing how to fix it.

Take action: Make a list of your team's workarounds. Don't try to fix them solo — instead, partner with experts who can replace them with efficient, lasting solutions that unlock frustration-free workflows and save countless hours.

Habit #6: Relying on a Single Spreadsheet to Run Your Business

You know the spreadsheet.

One Excel file packed with a dozen tabs and complex formulas only a handful understand — one of whom no longer works here.

What's your backup if it corrupts? Who keeps it updated if the expert leaves?

That spreadsheet is a hidden, dangerous single point of failure.

Spreadsheets lack audit trails, scale poorly, don't integrate with your systems, and often aren't properly backed up. You've built a critical business process on unstable ground.

Upgrade: Document the business processes the spreadsheet supports, not just the file itself. Then transition to dedicated software designed for those tasks — CRM for customer management, inventory systems, scheduling tools — all with backups, user permissions, and audit logs. Spreadsheets are fantastic for calculations, but terrible as business platforms.

Why These Tech Habits Are So Tough to Break

Most of these habits aren't secrets to you.

It's not lack of knowledge, but lack of time.

These bad tech behaviors thrive because:

  • The dangers don't surface until disaster strikes; reusing passwords works fine until it doesn't — then you suffer all at once.
  • The "correct" methods feel slower initially — setting up a password manager takes time, typing a memorized password is quick, but the cost of a breach outweighs the seconds saved.
  • Everyone does it; when your whole team shares passwords over Slack, the risk feels normal rather than dangerous. This normalization hides the problem.

This is exactly why Dry January succeeds: it creates awareness, disrupts autopilot habits, and reveals hidden risks.

How to Break These Habits for Good (Without Relying on Willpower)

Willpower isn't enough for lasting change — environment is key.
It's true for Dry January and tech habits alike.

Successful businesses don't rely on discipline alone; they redesign their systems to make secure, efficient behaviors the easy choice:

  • Deploy company-wide password managers to eliminate insecure sharing.
  • Push updates automatically to remove "remind me later" temptations.
  • Manage permissions centrally to prevent unnecessary admin access.
  • Replace outdated workarounds with reliable tools that don't require tribal knowledge.
  • Migrate critical spreadsheets to professional systems with backups and control.

When the smart choice is the easy choice, bad habits lose their grip.

This is the value of a great IT partner — transforming systems, not preaching, so the right actions become natural defaults.

Ready to Break Free from Tech Habits Holding Your Business Back?

Schedule a Bad Habit Audit.

In just 15 minutes, we'll dive into your business challenges and provide a clear, actionable plan for permanent improvement.

No pressure. No technical jargon. Just a streamlined, secure, and more profitable 2026 ahead.

Click here or give us a call at 801-997-8000 to schedule your 10-Minute Discovery Call.

Because quitting the right habits cold turkey can change everything.
And there's no better time to start than January.