Trash bin with old floppy disks and sticky notes showing weak passwords like 123456 and qwerty.

Dry January for Your Business: 6 Tech Habits to Quit Cold Turkey

January 12, 2026

Right now, millions are embracing Dry January, choosing to ditch habits that don't serve their wellbeing.

They're cutting out alcohol not just to feel healthier but to boost performance and finally stop the endless cycle of "I'll start Monday."

Your business has its own version of Dry January — a list of tech habits that hold you back.
These aren't cocktails but ineffective or risky tech patterns.

You're familiar with them. Everyone knows they're problematic, yet they persist because "it's easier" or "we're too busy."

But when those habits fail, the consequences are anything but minor.

Discover six damaging tech habits to eliminate immediately, plus smart alternatives to replace them.

Habit #1: Postponing Software Updates by Clicking "Remind Me Later"

That innocent-sounding button is more dangerous to small businesses than any cyberattack.

We understand — a midday restart isn't ideal. But updates don't just add features; they patch security vulnerabilities hackers are actively exploiting.

Delaying updates stretches from days into months, leaving your systems exposed with open doors for criminals.

Consider the devastating WannaCry ransomware: it paralyzed companies globally by targeting a flaw already patched months prior. Victims had repeatedly dismissed update prompts.

The fallout? Billions lost in over 150 countries as operations halted.

Action Step: Schedule updates for off-hours or let your IT partner handle them silently in the background—no disruptions, no security holes left behind.

Habit #2: Reusing One Password Across All Accounts

You probably have a go-to password — it ticks the boxes and is easy to recall.

You use it everywhere: email, bank, Amazon, accounting software, even obscure forums.

The problem? Breaches happen constantly. The forum's database leaked, exposing your credentials to hackers who then try the same password on your critical accounts.

This technique, called credential stuffing, leads to countless account compromises. Your "strong" password might as well be copied and handed to cybercriminals.

Action Step: Adopt a password manager like LastPass, 1Password, or Bitwarden. Remember one master password; let the tool generate complex, unique ones for each account. Setup takes minutes — peace of mind lasts forever.

Habit #3: Sharing Passwords via Unsecured Channels

Requests like "Can you send login details?" are often answered instantly with passwords sent through Slack, email, or text.

But these messages linger indefinitely—stored in inboxes, backups, searchable and forwardable.

If an email account is compromised, attackers quickly sweep for "password" to collect credentials, turning your team's convenience into a security nightmare.

This practice is like mailing your house keys openly.

Action Step: Use password managers with secure sharing features to grant access without revealing actual passwords. Access can be revoked anytime. If manual sharing is unavoidable, split the info across channels and immediately change passwords afterward.

Habit #4: Granting Admin Rights to Everyone "Because It's Easier"

Sometimes someone needed to install software or tweak a setting, so instead of assigning precise permissions, admin rights are handed out indiscriminately.

Suddenly, half the team has full admin privileges.

Admin access means the power to install—which can bypass security, disable protections, delete files, or change critical configurations. If an admin account is compromised, the attacker gets those powers too.

Ransomware thrives on admin accounts, escalating damage rapidly.

Giving everyone admin is like handing out safe keys because one person needed a stapler.

Action Step: Enforce the principle of least privilege. Assign only the permissions necessary for each role. It takes minutes but safeguards you from costly breaches and accidental data loss.

Habit #5: Letting Temporary Workarounds Become Permanent Solutions

When something breaks, a quick fix is put in place with plans to properly fix it "later."

Years pass, and the workaround is just "how things operate."

Sure, it adds steps and requires everyone to remember the trick. It "works," so why fix it?

But those extra seconds multiplied by every team member daily translates to massive lost productivity.

Worse yet, these workarounds are fragile, dependent on specific setups or people. When change occurs, everything collapses because no one ever completed the real fix.

Action Step: List out all workaround processes your team uses. Don't try to fix them yourself—bring in experts who can deliver permanent, streamlined solutions that eliminate frustration and save time.

Habit #6: Relying on a Single Complex Spreadsheet to Run Your Business

You know the file: one Excel workbook with endless tabs, formulas only a few understand. The original creator is long gone.

If it corrupts, what happens? If that person leaves, who maintains it?

This spreadsheet is a ticking time bomb disguised as a business lifeline.

Spreadsheets lack audit trails, are easily corrupted by mistakes, don't scale well, and rarely integrate with other tools or receive proper backups. They're digital duct tape, not professional systems.

Action Step: Document the business processes your spreadsheet supports instead of focusing on the file itself. Then adopt specialized software designed for those functions—CRM for customers, inventory management, scheduling tools—with backups, permissions, and audit history. Spreadsheets are powerful tools, not business platforms.

Why These Habits Persist Despite Their Risks

You're aware these practices carry risks.

Their survival boils down to being busy, not ignorant.

  • Problems often remain invisible until disaster strikes—password reuse works until it suddenly doesn't.
  • The "secure" ways may feel slower upfront—setting up password managers takes time versus easy reuse—but the cost of breaches dwarfs that investment.
  • Peer behavior normalizes bad practices; when everyone shares passwords via chat, it feels routine rather than risky.

This is exactly why Dry January succeeds—by bringing hidden behaviors to light, disrupting autopilot routines.

How to Break the Cycle for Good (Don't Rely on Willpower Alone)

Willpower fails in Dry January—and in business tech upgrades, environment trumps discipline.

Successful companies don't just try harder; they alter their systems so that secure habits are the easiest choices:

  • Password managers are deployed company-wide, eliminating insecure credential sharing.
  • Software updates push automatically, removing the option to delay.
  • Access levels are centrally controlled, preventing unauthorized admin rights.
  • Temporary fixes are replaced with durable, documented solutions.
  • Critical spreadsheets transition to dedicated systems with backups and audit controls.

When the right way becomes effortless, bad tech habits fade away.

This is the real value of a proactive IT partner—they transform your systems so that secure practices aren't suggestions, but defaults.

Ready to Eliminate the Hidden Tech Habits Harming Your Business?

Schedule a Bad Habit Audit with us.

In just 15 minutes, we'll assess your business technology challenges and provide a clear plan to resolve them permanently.

No judgment. No tech jargon. Just a smoother, safer, and more profitable year ahead.

Click here or give us a call at (646) 989-9900 to book your Business Technology Alignment Assessment.

Because quitting harmful habits cold turkey can reboot your business — and there's no better time than January.

Get In Touch

LastTech

1350 Ave. of the Americas, FL 2
New York, NY 10019

Phone: (646) 989-9900