Trash bin with old floppy disks and sticky notes showing weak passwords like 123456 and qwerty.

Dry January for Your Business: 6 Tech Habits to Quit Cold Turkey

January 12, 2026

Right now, millions are embracing Dry January.

They're choosing to eliminate the one habit they know holds them back—drinking—to boost their health, productivity, and stop delaying change with empty promises like "I'll start Monday."

Your business has its own Dry January, but it's filled with tech habits instead of cocktails.
These are familiar routines everyone knows are risky or inefficient, yet we ignore them because "it's fine" or "we're just too busy."

Until those habits no longer remain fine.

Here are six damaging tech behaviors to ditch immediately this month, with smart alternatives to replace them.

Habit #1: Postponing Software Updates by Clicking "Remind Me Later"

That tempting button has caused more harm to small businesses than cybercriminals ever could.

We get it—nobody wants their computer restarting mid-task. But updates aren't just about new features; they patch critical security flaws hackers actively exploit.

"Later" quickly turns into weeks, then months, leaving your software vulnerable to attacks those criminals already know how to execute.

Take the WannaCry ransomware outbreak: it devastated companies worldwide by exploiting a security gap Microsoft had fixed months earlier. Victims ignored update prompts too long.

The fallout? Billions lost across 150+ countries as businesses halted operations.

Action step: Schedule updates for the end of the day or allow your IT team to install them quietly in the background. No disruptions. No surprises. No open doors for hackers.

Habit #2: Using One Password Across Multiple Platforms

That go-to password you rely on feels secure and easy to remember. You use it everywhere: from email and banking to online shopping and that old industry forum.

The problem? Data breaches happen frequently. That forum's leaked database may have exposed your password email combo, now circulating on hacker marketplaces.

Hackers don't guess your passwords—they use stolen credentials to unlock your accounts everywhere.

This technique, known as credential stuffing, causes a huge portion of account breaches. Your "strong" password is effectively a master key that hackers already possess.

Action step: Adopt a trusted password manager like LastPass, 1Password, or Bitwarden. Remember just one master password, while the app generates complex, unique passwords for all your accounts. Setup only takes minutes, but your security lasts indefinitely.

Habit #3: Sending Passwords via Text or Email

"Hey, can you share the login for the shared account?"

"Sure! It's admin@company.com, password is Summer2024!"

Sending credentials through Slack, SMS, or email might solve problems instantly, but these messages live forever.

They're stored in sent folders, inboxes, backups, and cloud archives. If any email account gets hacked—even once—attackers can search for "password" and seize your shared login details.

It's like posting your house key on a postcard.

Action step: Use password managers with secure sharing features that provide access without revealing actual passwords. Permissions can be revoked anytime, eliminating permanent records. If you must share manually, split credentials across channels and change passwords immediately afterward.

Habit #4: Granting Everyone Admin Access "Because It's Easier"

Someone needed to install software or change setting once, so instead of customizing, everyone got admin rights.

Now half the team has full admin power because it was faster than doing it securely.

Admin access means installing software, disabling security, modifying critical settings, or deleting files. If their account is compromised, attackers inherit all these controls.

Ransomware attacks thrive on admin accounts—more access means more damage.

Giving all admin rights is like handing out safe keys because one person needed to staple paper.

Action step: Follow the principle of least privilege: assign only the exact permissions people need—nothing more. Setting this up takes a bit of time but prevents costly breaches or accidental data loss.

Habit #5: Letting Temporary Workarounds Become Permanent Solutions

Something broke, you found a quick fix, promising to resolve it later.

Years later, the workaround is the norm.

It adds extra steps everyone must remember, but the job eventually gets done.

The hidden cost? Loss of productivity multiplied across employees and time.

Worse, these fragile fixes depend on specific software versions, people, or conditions. When things inevitably change, the system breaks—often without anyone knowing how to repair it properly.

Action step: Compile a list of all workarounds your team relies on. Don't try to fix them alone—instead, let us help transform these band-aids into stable, efficient processes, freeing your team from frustration and wasted effort.

Habit #6: Relying on a Single Complex Spreadsheet to Run Your Business

You know exactly which one.

One Excel file with dozens of tabs and convoluted formulas nobody fully grasps. Only a few people know its secrets, and the creator has left.

If it corrupts, is there a backup plan? If knowledgeable staff leave, who maintains it?

This spreadsheet is a risky single point of failure disguised as a lifeline.

Spreadsheets lack audit trails, often aren't properly backed up, don't scale well, and don't integrate with other systems. You've built a critical business process on fragile digital duct tape.

Action step: Document the processes that spreadsheet supports, not just the file itself. Then migrate to specialized tools built for those tasks—CRM for customer data, inventory software for stock, scheduling apps for appointments. These tools offer security, backups, access controls, and don't depend on one person's knowledge. Spreadsheets belong in your toolbox—not running your business.

Why Breaking These Habits Feels Impossible

Most of these dangers are familiar to you.

You're not ignorant; you're overwhelmed.

Bad tech habits persist because:

  • Negative consequences are invisible until disaster strikes suddenly. Reusing passwords seems fine—until the breach happens.
  • The correct approach feels slower initially. Setting up password managers takes hours, typing memorized passwords takes seconds. The math on convenience only works until you factor in breach costs.
  • Everyone else is doing the same risky behaviors. Sharing passwords on Slack feels normal—making danger invisible.

This is why Dry January succeeds: it forces awareness, breaks the autopilot, and exposes hidden risks.

How to Finally Break Free Without Relying on Willpower Alone

Willpower is overrated for Dry January—environment wins.
Business tech habits work the same way.

Successful companies don't rely on discipline. They change their environment so the right choices become effortless:

  • Company-wide deployment of password managers eliminates insecure password sharing.
  • Automated updates remove the temptation to delay security patches.
  • Centralized permission controls prevent unnecessary admin access.
  • Real solutions replace fragile workarounds, eliminating dependence on tribal knowledge.
  • Critical spreadsheets move to robust systems with automatic backups and user permissions.

When good tech habits become the easiest choice, bad habits fade away.

That's the power a skilled IT partner provides—not lectures, but system changes that make security and efficiency the default.

Ready to Break Free from Costly Tech Habits Dragging Your Business Down?

Schedule a Bad Habit Audit today.

In just 15 minutes, we'll uncover your business challenges and deliver a clear plan to fix them permanently.

No judgment. No technical jargon. Just a safer, faster, more profitable 2026.

Click here or give us a call at 985-302-3083 to book A Quick Call.

Some habits deserve a cold turkey goodbye.
And there's no better time than January to begin.

Schedule A Call

Schedule a free 15-Minute Discovery Call to talk about your IT frustrations - from job site Wi-Fi failures and ProCore crashes to hacked email and QuickBooks disasters. We'll show you exactly how we can take tech off your plate so you can focus on growth, not glitches.

Get In Touch

Ener Systems

Address:
19295 N. 3rd Street Suite 5 Covington, LA 70433

Phone: 985-302-3083

Email: info@enersystems.com