
January is a season of resolve.
For a few weeks, everything feels possible.
Budgets are fresh. Calendars are clean.
There’s a genuine belief that this year will be different.
Then reality returns.
Programs ramp up. Donors need answers. Staff need support.
And the same technology habits quietly slide back into place.
For nonprofit leaders, Dry January isn’t about cutting indulgences.
It’s about cutting tech behaviors that quietly increase cyber liability — the business, legal, regulatory, and operational risk that threatens your mission.
Here are six technology habits nonprofit organizations should quit cold turkey this January, and what to do instead.
Habit #1: Clicking “Remind Me Later” on Updates
That button has done more damage to organizations than most attackers ever could.
Software updates aren’t just new features — they often patch known vulnerabilities that criminals actively exploit.
When updates are delayed:
- Security gaps remain open
- Cyber liability quietly increases
- Insurance claims become harder to defend
History has proven this risk. Major ransomware outbreaks succeeded not because patches didn’t exist — but because they weren’t applied.
Quit it:
Schedule updates after hours or let a trusted IT partner deploy them quietly in the background. No interruptions. No open doors.
Habit #2: Reusing the Same Password Everywhere
It feels efficient. It feels safe.
It’s neither.
Credentials leak constantly from systems you don’t control. When attackers obtain one password, they try it everywhere — email, cloud systems, donor platforms, accounting software.
This practice dramatically increases cyber liability.
Quit it:
Adopt a password manager organization-wide. One master password. Unique, encrypted credentials everywhere else.
Habit #3: Sharing Passwords Over Email or Text
“Just send me the login.”
That message doesn’t disappear. It lives in inboxes, backups, and archives — searchable forever.
If one account is compromised, every shared credential is exposed.
Quit it:
Use secure credential-sharing features inside password managers. Access can be granted or revoked without exposing passwords at all.
Habit #4: Giving Everyone Admin Access Because It’s Easier
Admin access equals authority.
It allows software installation, security tools to be disabled, and critical files to be altered or deleted. If an admin account is compromised, the damage multiplies fast.
This is one of the fastest ways cyber incidents escalate from inconvenience to crisis.
Quit it:
Apply the principle of least privilege. Staff get access only to what they need — nothing more.
Habit #5: “Temporary” Fixes That Became Permanent
“We’ll fix it later.”
Later became years.
Workarounds waste time, depend on tribal knowledge, and collapse when something changes — or when key people leave.
They quietly increase operational and cyber liability.
Quit it:
Document recurring workarounds. Then replace them with systems built for the job — systems with backups, audit trails, and continuity.
Habit #6: Letting One Spreadsheet Run the Organization
Every nonprofit has one.
A spreadsheet with too many tabs, fragile formulas, and one person who understands it.
That’s not a system.
It’s a single point of failure.
Quit it:
Identify the process the spreadsheet supports, then migrate to purpose-built tools that scale, protect data, and support oversight.
Why These Habits Are So Hard to Break
You already knew most of these were risky.
The problem isn’t awareness — it’s capacity.
These habits persist because:
- The consequences are invisible until they’re severe
- The “right way” feels slower in the moment
- Everyone else does it, so it feels normal
That’s why Dry January works. It interrupts autopilot.
How Nonprofits Actually Break These Habits
Not through willpower.
Through environmental change.
When:
- Password managers are standard
- Updates are automatic
- Permissions are managed centrally
- Workarounds are replaced with real systems
The safe behavior becomes the easy behavior.
That’s what a good technology partner provides — structure, not lectures.
The One Resolution That Actually Sticks
If you choose one resolution this year, make it this:
“We stop operating in reactive mode.”
When technology becomes boring:
- Staff productivity improves
- Donor trust strengthens
- Leadership gains clarity
- Cyber liability decreases
Boring is good.
Reliable is better.
Prepared is best.
Ready to Quit the Habits That Increase Cyber Liability?
Schedule a 15-minute Discovery Call.
We’ll:
- Learn how your nonprofit operates
- Identify habits quietly increasing risk
- Clarify the fastest path to stability and confidence
No jargon. No pressure. Just insight.
👉 Schedule Your Discovery Call
Because some habits are worth quitting cold turkey.
And January is the perfect time to start.
Are You at Risk?
Many nonprofit leaders don’t realize their organization is carrying cyber liability until a system fails, an insurer asks questions, or an incident disrupts operations.
Even organizations that feel “stable” often have hidden risks — outdated systems, unreviewed access, untested backups, or security gaps created by well-intentioned shortcuts. These risks quietly increase business, legal, regulatory, and operational exposure, especially for nonprofits managing donor, client, or constituent data.
Our Credential-Free Cyber Risk Assessment is designed to help nonprofit leaders gain clarity without disruption.
You don’t share passwords.
You don’t grant system access.
Your mission doesn’t pause.
In a short, guided process, we help organizations — including nonprofits across the Detroit area and Southeast Michigan — understand:
- Where cyber liability may be accumulating
- Which risks actually matter to leadership and the board
- How prepared the organization is for incidents, audits, or insurance reviews
- What to address first to reduce exposure and protect trust
This isn’t about compliance checklists or scare tactics.
It’s about visibility, preparedness, and confident decision-making.
👉 Schedule Your Cyber Risk Assessment
https://mtsconsultinggroup.net/riskassessment
Because the strongest nonprofit leaders aren’t reacting to storms —
they’re the ones who can see them coming.


