January 12, 2026
Right now, millions are embracing Dry January, choosing to eliminate alcohol to boost their health, enhance productivity, and finally ditch the "I'll start Monday" procrastination.
Similarly, your business has its own version of Dry January: a list of tech habits that, while seemingly harmless, hold back efficiency and security.
These tech habits are familiar to everyone — risky shortcuts followed under the guise of "it's fine" or "we're too busy."
But these habits stop being "fine" the moment they trigger a serious issue.
Here are six critical tech habits your business should eliminate immediately, with smarter alternatives to adopt today.
Habit #1: Stalling Software Updates with "Remind Me Later"
That tempting "Remind Me Later" option has caused more damage to small businesses than any cyberattack.
While updates may seem disruptive, they don't just enhance features—they patch security vulnerabilities hackers are actively exploiting.
Postponing updates transforms "later" into weeks, then months, exposing your software to known security breaches.
For instance, the infamous WannaCry ransomware attack devastated businesses worldwide by exploiting a vulnerability patched months earlier—vulnerabilities left open by people delaying updates.
The fallout? Billions lost across 150+ countries as operations ground to a halt.
Break the cycle: Schedule updates for after work hours or allow your IT team to deploy them seamlessly in the background. Avoid surprises, downtime, and unauthorized access.
Habit #2: Using One Password for Everything
Having a go-to password that checks boxes for strength and memorability—and using it across multiple platforms—is a common but dangerous habit.
Data breaches are happening all the time. That obscure forum you joined years ago? Its compromised database might now be selling your credentials to hackers.
Hackers don't need to guess your banking password; they already have it—and they test it everywhere.
This practice, known as credential stuffing, underpins many security breaches. Your one "strong" password acts like a master key in the wrong hands.
Stop it now: Use a password manager like LastPass, 1Password, or Bitwarden. Remembering one master password lets these tools create and store strong, unique passwords for every account. Setting up takes minutes; the protection lasts indefinitely.
Habit #3: Sharing Passwords via Email or Messaging Apps
It's tempting: "Hey, can you send the login for the shared account?" Quick, easy, done.
But those unsecured messages linger forever—in inboxes, sent folders, backups, and cloud storage. If anyone's email gets compromised, hackers can search for "password" and extract every credential ever shared.
This is equivalent to posting your house key on a postcard and mailing it.
Fix it: Leverage secure password managers' sharing features that grant access without revealing actual passwords. Recipients can be granted or revoked access anytime, with zero permanent record. If you must share manually, split credentials across different channels and change passwords immediately afterward.
Habit #4: Granting Everyone Admin Access "For Convenience"
It might seem easier to grant admin rights so a team member can install software or adjust settings—but now half your team has full control.
Admin privileges mean full power to install software, disable security tools, change critical configurations, or delete vital files. Compromised credentials grant hackers the same control.
Ransomware thrives on admin accounts—more access means damage escalates quicker.
Giving everyone admin rights is like handing out safe keys to the entire office because one person needed a stapler.
Change the approach: Apply the Principle of Least Privilege: assign only necessary access rights. Spending a few extra minutes configuring proper permissions is a small price to pay compared to the fallout from a security breach or accidental deletion.
Habit #5: Letting "Temporary" Fixes Become Permanent
A quick fix might have kept things running years ago—but now it's just standard procedure.
These workarounds may add extra steps and rely on specific people or software versions, and yet no one has addressed the root cause.
This leads to lost productivity and fragile processes that collapse when conditions change.
Take action: Identify all workaround dependencies your team is using. Don't try to solve them alone. Instead, collaborate with your IT partners who can implement permanent, effective solutions to eliminate frustration and reclaim time.
Habit #6: Building Your Business on Complex Spreadsheets
That one Excel file with endless tabs and tangled formulas is a ticking time bomb.
Only a few understand it, and the creator no longer works here. If the file gets corrupted, what's your backup plan? Who will maintain it?
This spreadsheet is a critical vulnerability disguised as a daily tool.
Spreadsheets lack audit trails, scalability, proper backups, and integrate poorly with other tools—it's digital duct tape holding your systems together.
Upgrade now: Document the processes the spreadsheet supports, then migrate those to specialized tools like CRM systems for customer data, inventory software, or scheduling platforms. These solutions offer backups, permission controls, and scalability beyond what spreadsheets can provide.
Why Are These Habits So Hard to Break?
You're not unaware or careless—the problem is simply being overwhelmed.
These risky habits endure because:
- Consequences are unseen until disaster strikes—password reuse feels harmless until it isn't.
- The correct solutions seem slower or cumbersome initially—but the long-term cost of breaches or downtime is far greater.
- Everyone else follows the same practices, making risky behaviors feel normal and invisible.
This mirrors why Dry January works: it forces awareness, disrupts autopilot behavior, and exposes hidden risks.
How to Break These Habits Without Relying on Willpower Alone
Willpower rarely sustains change—modifying your environment makes good habits inevitable.
Businesses breaking these cycles implement systems that make secure behavior automatic:
- Company-wide password managers eliminate insecure sharing.
- Automatic updates remove "Remind Me Later" interruptions.
- Centralized permission management prevents admin privilege misuse.
- Replacing workarounds with robust solutions removes fragile processes.
- Migrating critical data from spreadsheets to proper platforms ensures reliability and security.
When the right way becomes easier, bad habits fade away.
This is the advantage your IT partner should deliver: systemically creating an environment where security and efficiency are default.
Ready to Break Free from Habits Dragging Your Business Down?
Schedule a Bad Habit Audit today.
In just 15 minutes, we'll explore your business challenges and provide a clear, actionable plan to eliminate costly tech pitfalls for good.
No jargon. No judgment. Just a safer, faster, and more profitable 2026.
Some habits deserve a cold turkey quit—and January is the perfect moment to start.