January 12, 2026
Right now, millions are embracing Dry January.
They're stepping away from alcohol to boost their well-being, enhance productivity, and stop postponing positive change with "I'll start Monday."
Your company has its own version of Dry January—a list of tech habits that need to go.
These aren't cocktails, but daily routines that risk efficiency and security.
You recognize them. Everyone does. They're risky or inefficient, yet they persist because "it's fine" and "we're busy."
Until it suddenly isn't fine.
Discover six detrimental tech habits to cut out immediately and practical alternatives to adopt.
Habit #1: Delaying Software Updates by Clicking "Remind Me Later"
This tiny button has caused more small business damage than any hacker.
We get it—restarts disrupt your workflow. But updates do more than add features; they patch security vulnerabilities hackers exploit in real time.
Delays turn into weeks, which stretch into months, leaving your systems exposed to known threats.
Remember the WannaCry ransomware? It shut down businesses worldwide by targeting a flaw Microsoft had fixed months earlier—flaws ignored by countless "Remind Me Later" clicks.
That incident cost billions, disrupting companies across 150 countries.
Take action: Schedule updates at day's end or enable your IT team to install them quietly in the background—no surprises, no interruptions, no open doors for cyber criminals.
Habit #2: Using One Password Everywhere
You have a go-to password.
It ticks the boxes, feels secure, and is easy to recall. You use it for emails, banking, shopping, accounting, and even obscure forums.
The issue? Data breaches happen constantly. That forgotten forum exposed your credentials last year, turning your password into an easy target sold in hacker marketplaces.
Hackers don't need to guess; they've got the keys and try your password across multiple sites.
This attack, known as credential stuffing, accounts for many account hacks. Your "strong" password is a master key in the wrong hands.
Break free: Use a password manager like LastPass, 1Password, or Bitwarden. Remember one strong master password; let it craft and store unique, complex passwords for every account. Setup is quick, peace of mind lasts a lifetime.
Habit #3: Sharing Passwords via Email or Messaging
"Can you send the shared account login?"
"Sure! Username: admin@company.com, Password: Summer2024!"
Sent instantly over Slack, text, or email—problem solved in seconds.
But that message lingers forever—in inboxes, sent folders, and cloud backups—searchable and forwardable.
If anyone's email is ever compromised, attackers can retrieve all shared passwords by searching for keywords.
It's like mailing your house key on a postcard.
Stop immediately: Share passwords securely through password manager tools which provide access without revealing passwords. Permissions can be revoked anytime, and no permanent digital trail remains. If manual sharing is unavoidable, split credentials through separate channels and reset passwords right after.
Habit #4: Granting Everyone Admin Access for Convenience
Someone needed to install software or adjust settings once, so to avoid the hassle, you made them an admin.
Now half your team holds full admin privileges just to keep things moving.
Admins can install programs, disable protections, modify critical settings, and delete vital files. If their account is hacked, attackers gain the same access.
Ransomware attacks thrive on admin credentials, unleashing greater damage faster.
Handing out admin rights like candy is akin to giving everyone the safe's combination because one person needed a stapler.
Fix now: Apply the principle of least privilege—everyone gets only the access needed, no more. Setting permissions right takes minutes but prevents costly breaches and accidental data loss.
Habit #5: Permanent Workarounds from Temporary Fixes
Something broke. You implemented a quick fix with the plan to "fix it later."
That was years ago.
Now the workaround is standard practice.
Yes, it adds extra steps and depends on team memory—but the job gets done, so why change?
Because these fixes waste massive time over days and across the team.
Worse, they depend on fragile conditions and specific knowledge, risking collapse when systems change and no one remembers the original process.
Take charge: List any workarounds your team relies on. Don't try to fix it alone; if you could, you would have. Let us step in to replace them with robust solutions that restore efficiency and reduce stress.
Habit #6: Relying on One Critical Spreadsheet to Run Your Business
You know the infamous Excel file.
A dozen tabs, complicated formulas nobody besides two or three understand, and the original creator has left.
If that file corrupts, what's the backup plan? If a key employee leaves, who maintains it?
That spreadsheet is a silent but dangerous single point of failure.
Spreadsheets lack audit trails, scale poorly, don't back up effectively, and don't integrate with other systems. You've built a crucial function on fragile makeshift solutions.
Improve now: Document the business processes your spreadsheet supports, not just the file itself. Then transition to specialized tools—CRM for customers, inventory management, scheduling software—that offer backups, audit logs, and permission controls. Spreadsheets are powerful tools, but poor platforms.
Why Breaking These Habits Is Difficult
You already know these habits are harmful.
It's not lack of knowledge; it's lack of time.
Bad tech habits persist because:
- The risks remain hidden until catastrophe strikes. Reused passwords seem fine until they're exploited.
- The proper methods feel slower at first. Setting up password managers takes minutes, while typing memorized passwords is fast. But breaches and reputation damage have far greater costs.
- Everyone else does it. When your whole team shares passwords on Slack, it feels normal, masking serious risks.
This mirrors why Dry January succeeds: it creates awareness, disrupts autopilot, and reveals hidden dangers.
How to Break Habits Without Willpower
Willpower rarely suffices for Dry January.
Your environment determines success.
The same applies to business technology.
Companies that truly overcome damaging habits do so by reshaping their systems, making secure, efficient choices the easiest options:
- Company-wide password manager deployment eliminates insecure sharing.
- Automatic updates remove the temptation to defer critical patches.
- Centralized permission control prevents reckless admin rights.
- Real solutions replace unstable workarounds, removing reliance on tribal knowledge.
- Robust systems replace critical spreadsheets with backups and access controls.
When the right actions become easy, bad habits fade.
This is what an excellent IT partner does—not just tell you what to do, but transform your environment so secure, efficient behaviors are the default.
Ready to End the Habits Silently Holding Back Your Business?
Schedule a Bad Habit Audit today.
In just 15 minutes, we'll analyze your business, identify pain points, and provide a clear, actionable roadmap to fix them permanently.
No pressure, no jargon—just a safer, faster, more profitable 2026.
Click here or give us a call at 503-210-5203 to book your Systems Assessment.
Some habits deserve to be quit cold turkey.
January is the perfect moment to start.