• About

  • Services

    • Managed IT Services

    • Cloud Services

    • Cybersecurity Services

    • Data Backup & Recovery Services

    • Disaster Recovery Planning

    • IT Compliance Services

    • FTC IT Compliance Services

    • HIPAA IT Compliance Services

    • Hourly IT Support

    • PCI IT Compliance Services

  • Industries

    • Architecture Firms

    • Construction Companies

    • Engineering Firms

    • Manufacturing Companies

    • Law Firms

    • CPAs & Financial Advisors

    • Healthcare Practices

    • Nonprofits

  • Resources

    • Blog

    • Jobs

    • Referral Program

  • Contact

866-523-2985 Schedule A FREE 15-Minute Discovery Call
Contact Us
Skip to main content Skip to footer
Nerds in a Flash
Nerds in a Flash Varied
866-523-2985 Schedule A FREE 15-Minute Discovery Call
  • About

  • Services

    • Managed IT Services

    • Cloud Services

    • Cybersecurity Services

    • Data Backup & Recovery Services

    • Disaster Recovery Planning

    • IT Compliance Services

    • FTC IT Compliance Services

    • HIPAA IT Compliance Services

    • Hourly IT Support

    • PCI IT Compliance Services

  • Industries

    • Architecture Firms

    • Construction Companies

    • Engineering Firms

    • Manufacturing Companies

    • Law Firms

    • CPAs & Financial Advisors

    • Healthcare Practices

    • Nonprofits

  • Resources

    • Blog

    • Jobs

    • Referral Program

  • Contact

Contact Us
Trash bin with old floppy disks and sticky notes showing weak passwords like 123456 and qwerty.

Dry January for Your Business: 6 Tech Habits to Quit Cold Turkey

January 12, 2026

Right now, millions are embracing Dry January.

They're cutting out the one habit they know drags them down, aiming to boost their well-being, productivity, and stop the endless "I'll start Monday" cycle.

Your business, too, has its own "Dry January" list—only it's filled with harmful tech habits instead of cocktails.

These are the common pitfalls everyone recognizes as risky or inefficient, yet keeps alive because "it's fine" and "we're too busy."

Until one day, it's not fine anymore.

Here are six detrimental tech habits to abandon immediately, with smart strategies to replace them.

Habit #1: Postponing Software Updates with "Remind Me Later"

That seemingly harmless button has caused more damage to small businesses than hackers ever could.

We get it — no one wants unexpected restarts disrupting their workday. But updates don't just add features; they patch critical security vulnerabilities hackers actively target.

Delaying updates for days stretches into weeks, then months, leaving your software exposed to threats criminals already understand.

Remember the devastating WannaCry ransomware? It exploited a vulnerability patched two months prior, but victims had repeatedly clicked "remind me later."

Result? Billions lost worldwide and halted operations in over 150 countries.

Stop this now: Schedule your updates for the end of the day or have your IT team push them silently in the background—no interruptions, no exposure.

Habit #2: Using One Password Everywhere

Everyone has that go-to password.

It meets complexity standards, feels secure, and is easy to remember—so it gets used for everything from email and banking to forgotten forums.

The problem? Regular data breaches leak these credentials, placing your email-password combo up for sale to hackers.

Hackers don't guess; they try your password everywhere in a tactic called credential stuffing, unlocking accounts instantly.

Your supposedly "strong" password becomes a universal key, copied and exploited without your knowledge.

Quit this habit: Adopt a password manager immediately—LastPass, 1Password, Bitwarden. Remember one master password; let the tool handle complex, unique credentials for all your accounts. Setup is quick, peace of mind lasts indefinitely.

Habit #3: Sending Passwords Over Text or Email

"Can you share the login for the shared account?"

"Sure! It's admin@company.com, password Summer2024!"

Sent casually via Slack, text, or email—problem solved in seconds.

But that message now lives forever: in sent folders, inboxes, backups, and cloud archives—searchable and shareable.

If anyone's email is ever compromised, attackers can instantly harvest every shared password.

It's like mailing your house keys on a postcard.

Quit this immediately: Use password managers' secure sharing features—they grant access without revealing actual passwords and can be revoked anytime. If you must share manually, split credentials across different channels and change passwords immediately afterward.

Habit #4: Granting Admin Rights to Everyone "Because It's Easier"

Perhaps someone once needed to install software or tweak a setting, so instead of fine-tuning permissions, you handed out admin access.

Now half your team holds full admin privileges, risking critical system controls.

Admins can install software, disable security tools, delete files, and if their credentials get stolen, attackers gain the same power.

Ransomware exploits admin accounts for maximum damage and speed.

Giving everyone admin access is like distributing safe keys because one individual needed a stapler.

Stop this practice: Apply the principle of least privilege—grant access strictly on a need-only basis. Yes, it takes extra moments to set permissions correctly but is worth it to avoid catastrophic breaches and accidental disasters.

Habit #5: Letting "Temporary" Fixes Become Permanent

Something failed. You applied a quick fix. "We'll fix it properly later."

That was years ago.

Now, the workaround is the norm.

Sure, it adds extra steps and relies on tribal knowledge, but the work gets done. Why fix something that "works"?

These inefficiencies add up, costing productivity daily.

Worse, workarounds depend on fragile specifics—software versions, key employees who may leave—and collapse when conditions change, leaving teams stranded.

Quit this habit: List all workarounds your team uses and let experts help implement permanent, streamlined solutions that save time and remove frustration for good.

Habit #6: Relying on a Single Spreadsheet to Run Critical Business Functions

You know the one.

A sprawling Excel file with countless tabs and convoluted formulas only a few understand—sometimes none of whom still work here.

What happens if it corrupts? Or the key person leaves?

That spreadsheet is a ticking time bomb disguised in green.

Without backups, audit trails, or integration, relying on spreadsheets for core processes is risky and unsustainable.

Quit this now: Document what the spreadsheet supports in your business and migrate those processes to dedicated tools—like CRM for customers, inventory software, and scheduling apps. These provide security, backups, user controls, and scalability that spreadsheets cannot.

Why These Tech Habits Are So Difficult to Break

You already understand these habits are risky.

But the reality? You're too busy to change them.

These bad habits persist because:

  • Consequences remain hidden until disaster strikes—password reuse feels safe until it leads to a breach.
  • The quick fix appears faster—setting up a password manager takes time, typing memorized passwords seems quicker until the breach cost hits.
  • Everyone else does it too—sharing passwords over Slack feels normal, not risky; normalization masks danger.

This mirrors why Dry January succeeds for some—by forcing awareness, breaking autopilot, and illuminating hidden risks.

How to Kick These Habits Without Relying on Willpower

Personal willpower alone can't sustain Dry January—or tech habit changes.
What works instead is reshaping the environment.

Successful companies don't rely on discipline; they design systems where secure, smart workflows become the default:

  • Password managers deployed company-wide remove insecure sharing temptation.
  • Automatic updates eliminate "remind me later" procrastination.
  • Centralized permission controls prevent irresponsible admin grants.
  • Permanent fixes replace unreliable workarounds.
  • Critical processes move from fragile spreadsheets to robust, backed-up systems.

By making the right choice the easy choice, bad habits fade, and your business grows stronger.

This is the role of a strategic IT partner—not just advice, but real system change.

Ready to Break the Bad Habits Holding Your Business Back?

Schedule a Bad Habit Audit with us.

In just 15 minutes, we'll dive into your business challenges and deliver a clear, actionable plan to fix them for good.

No lecturing. No jargon. Just a path to a safer, faster, and more profitable 2026.

Click here or give us a call at 866-523-2985 to book your 15-Minute Discovery Call.

Because some habits deserve to be quit cold turkey.
And January is the perfect time to start fresh.

Contact Us Today To Schedule A FREE 15-Minute Discovery Call

 

Recent Articles

Tablet screen showing Annual Tech Physical checklist with items like backups, security, hardware health, and disaster readiness.

Your Business Tech Is Overdue for an Annual Physical

Smiling man stretches on yoga mat with dumbbell nearby and laptop showing all systems operational message

The One Business Resolution That Actually Sticks (Unlike Your Gym Membership)

Contrast between a dark tech-filled office setup and a bright tropical beach workspace with laptop and cocktail.

Stop Funding These 3 Tech Money Pits – Take Your Family To Hawaii Instead

The One Business Resolution That Actually Sticks (Unlike Your Gym Membership)

Your Business Tech Is Overdue for an Annual Physical

Headquarters - Austin

13785 Research Blvd, Suite 125

Austin, TX 78750

512-401-6373

Dallas / Ft Worth

100 Crescent Ct, Suite 700

Dallas, TX 75201

972-573-6373

Houston

2925 Richmond Ave, Suite 1200

Houston, TX 77098

346-601-6373

San Antonio

18756 Stone Oak Pkwy, Suite 200

San Antonio, TX 78258

210-657-6373

Services

  • Managed IT Services
  • Cloud Services
  • Cybersecurity Services
  • Data Backup & Recovery Services
  • Disaster Recovery Planning
  • FTC IT Compliance Services
  • HIPAA IT Compliance Services
  • Hourly IT Support
  • IT Compliance Services
  • PCI IT Compliance Services
  • Project-Based Hourly IT Support

Industries

  • Architecture Firms
  • Construction Companies
  • CPAs and Financial Advisors
  • Engineering Firms
  • Financial & Accounting
  • Healthcare Practices
  • Law Firms
  • Manufacturing Companies
  • Nonprofits

Service Areas

  • Austin
  • Boerne
  • Cedar Park
  • Dallas
  • Frisco
  • Fort Worth
  • Georgetown
  • Houston
  • Irving
  • Katy
  • New Braunfels
  • Plano
  • Round Rock
  • San Antonio
  • Selma
  • Sugar Land
  • The Woodlands

Resources

  • Blog
  • Jobs
  • Referral Program
Copyright © 2026 Nerds in a Flash

13785 Research Blvd Suite 125 Austin, TX 78750
  • Privacy Policy
  • Facebook
  • X (Twitter)
  • LinkedIn