The 5 Biggest IT Mistakes — and How to Avoid Them

Most IT disasters don't announce themselves. They quietly brew in neglected backup schedules, unpatched servers, and policy documents no one ever wrote. Here's what to fix before it's too late.

May 2026  ·  8 min read

1

Not Having Backups

Imagine walking into the office to find every file: student records, financial data, accreditation history simply gone. Ransomware, a failed drive, an accidental mass delete: the cause barely matters when the outcome is the same. Yet a startling number of organizations operate every day with no reliable backup strategy in place.

Data loss isn't a matter of if, it's when. Hard drives have a median lifespan of three to five years, and human error accounts for a third of all data loss incidents. Without backups, a single bad moment can ruin years of effort.

How to avoid it

  • Follow the 3-2-1 rule: three copies of data, on two different media types, with one stored offsite or in the cloud

  • Automate backups. Manual processes get skipped

  • Schedule monthly restoration tests. A backup you've never tested is a backup you can't trust.

  • Define your Recovery Time Objective (RTO) and Recovery Point Objective (RPO) so you know exactly how much data loss is acceptable

2

Running Out-of-Date Software

Every unpatched application is an open door. When software vendors discover vulnerabilities, they release patches but attackers read those release notes too, and they immediately start scanning for organizations that haven't applied them yet. The window between a patch release and active exploitation is now measured in days, sometimes hours.

Legacy software represents one of the most common entry points for cyberattacks. "We'll update it next quarter" is the phrase that precedes too many breach reports.

How to avoid it

  • Maintain a complete software inventory so nothing flies under the radar

  • Enable automatic updates wherever business continuity allows

  • Implement a formal patch management process with defined SLAs — critical patches within 24–72 hours, standard patches within 30 days

  • Retire or isolate software the vendor no longer supports.

3

Running Out-of-Date Operating Systems

When Microsoft ended support for Windows 7, millions of machines worldwide became permanently vulnerable overnight. Not because they changed, but because the safety net underneath them disappeared. An unsupported OS receives no security patches, regardless of how many vulnerabilities are discovered. It's the digital equivalent of locking your front door but removing the walls.

The WannaCry ransomware attack of 2017 exploited an unpatched vulnerability in older Windows systems and caused an estimated $4–8 billion in damages globally. The patch had been available for months. Organizations simply hadn't applied it.

How to avoid it

  • Track end-of-life (EOL) dates for every OS in your environment and plan upgrades well in advance

  • Budget for OS migrations. "We can't afford to upgrade" often costs far more than the upgrade would have.

  • For systems that cannot be upgraded immediately, implement compensating controls: network segmentation, enhanced monitoring, strict access controls.

  • Standardize on supported OS versions across the organization to simplify management.

4

Not Using Multi-Factor Authentication

Passwords are broken and not in theory; in practice. Billions of credentials are available for purchase on the dark web right now, harvested from decades of data breaches. A determined attacker doesn't need to "hack" your system; they just need to try the password your employee reused from a breach in 2019. Without MFA, a single compromised password hands over the keys to everything.

Microsoft reports that MFA blocks more than 99.9% of account compromise attacks. It is one of the highest-return security investments available, and yet organizations continue to leave it unconfigured on email systems, VPNs, and cloud platforms.

How to avoid it

  • Enable MFA on every externally-facing system immediately: email, VPN, cloud services, remote access tools.

  • Prefer authenticator apps (TOTP) or hardware keys over SMS-based codes, which are vulnerable to SIM-swapping attacks.

  • Make MFA mandatory, not optional — the accounts that opt out are the ones attackers find first.

  • Implement Conditional Access policies that require step-up authentication for sensitive actions or unusual sign-in behavior.

5

Not Using Written IT Policies

When there's no written policy, every employee makes their own IT decisions. And those decisions range from sensible to catastrophic. Storing student data on a personal Dropbox. Sharing login credentials with a contractor. Connecting to public Wi-Fi without a VPN. None of these feel like disasters in the moment. They often only register as mistakes after the incident report is written.

Written policies do more than set rules. They create accountability, support compliance and audit requirements, establish a baseline for security training, and give IT and HR a framework for addressing violations. Organizations without them are essentially hoping that everyone happens to make the right call, every time.

How to avoid it

  • Start with the essentials: Acceptable Use Policy, Password Policy, Data Classification Policy, and Incident Response Plan.

  • Write policies in plain language. If employees can't understand them, they won't follow them.

  • Require employees to acknowledge policies in writing at onboarding and when policies are updated.

  • Review and update policies at least annually, and whenever significant technology or regulatory changes occur.

None of these five mistakes require exotic technology or massive budgets to fix. They require attention, planning, and follow-through. The organizations that suffer the worst IT disasters are rarely the ones without resources they're the ones that postponed the basics until the basics weren't enough. Start with one item on this list today. Your future self will be grateful.

Previous
Previous

The Goldilocks Problem: Getting Your EdTech IT Staffing Just Right

Next
Next

The Powerful Free Tool Many Schools Have Access To But Don’t Use