Because “We’re Busy” Is Not a Cybersecurity Strategy

Millions of people are doing Dry January right now. They are cutting something they know is not good for them so they can feel better, work better, and stop pretending “I’ll start Monday” is a plan.

Your business has its own version of Dry January.
It just involves technology instead of cocktails.

These are the tech habits everyone knows are risky or inefficient, but they continue because things feel fine. Until they are not.

Here are six bad tech habits to quit this month and what to do instead.

 

Habit 1: Clicking “Remind Me Later” on Updates

That button has quietly caused more damage to small businesses than most cybercriminals ever could.

Software updates are not just about new features. They patch known security vulnerabilities that attackers actively exploit. When updates get delayed, businesses run outdated systems with open doors.

The WannaCry ransomware attack succeeded because companies ignored a patch Microsoft released months earlier. The result was billions of dollars in losses worldwide.

Quit it:
Schedule updates after hours or let your IT provider push them automatically. No surprise restarts. No exposed systems.

 

Habit 2: Using One Password Everywhere

Most business owners have a favorite password. It meets requirements, feels secure, and gets reused everywhere.

When one service is breached, attackers try those credentials across email, banking, and business systems. This tactic, called credential stuffing, accounts for a massive percentage of account takeovers.

Your password may feel strong, but if it is reused, it is already compromised somewhere.

Quit it:
Use a password manager such as 1Password, Bitwarden, or LastPass. Remember one master password and let the tool handle the rest.

 

Habit 3: Sharing Passwords Over Text or Email

Sending credentials through email, Slack, or text feels quick and harmless. The problem is permanence.

Those messages live forever in inboxes, cloud backups, and archives. If one account is compromised, attackers can search for shared credentials instantly.

Quit it:
Use secure sharing features inside password managers. Access can be granted without revealing the password and revoked instantly. If manual sharing is unavoidable, split credentials across channels and change the password immediately.

 

Habit 4: Giving Everyone Admin Access Because It’s Easier

Admin access gives full control over systems. When everyone has it, one mistake or one phishing email can cause massive damage.

Ransomware spreads faster and deeper when admin privileges are compromised. Convenience turns into catastrophe.

Quit it:
Apply the principle of least privilege. Employees should have access only to what they need to do their jobs. It takes a few extra minutes to set up properly and saves enormous risk later.

 

Habit 5: Temporary Fixes That Became Permanent

A workaround created years ago is now the standard process. It still works, but it is fragile, slow, and dependent on tribal knowledge.

Workarounds multiply inefficiency and break completely when systems change or key employees leave.

Quit it:
Document every workaround your team relies on. Then replace them with permanent solutions that reduce steps and remove dependency on memory. If fixing them were easy, they would already be fixed. This is where outside help matters.

 

Habit 6: The Spreadsheet That Runs the Entire Business

One spreadsheet with complex formulas, limited backups, and no audit trail should not run a company.

If it corrupts or the one person who understands it leaves, the business stalls.

Quit it:
Document the business process the spreadsheet supports, then move that process into proper software such as a CRM, scheduling tool, or inventory system. Spreadsheets are tools, not platforms.

 

Why These Habits Are So Hard to Break

These habits persist because consequences stay invisible until they are catastrophic. The wrong way feels faster. Everyone else does it.

Dry January works because it forces awareness and breaks autopilot. Business tech habits need the same reset.

 

How to Quit Without Relying on Willpower

Willpower does not create lasting change. Environment does.

Businesses that successfully break these habits do it by making the right behavior automatic:

  • Password managers remove insecure sharing
  • Updates run automatically
  • Permissions are centrally managed
  • Workarounds are eliminated
  • Critical systems move out of spreadsheets

The right way becomes the easy way.

That is what a good IT partner actually does. They change systems so good habits happen by default.