AI-Powered Threats Are Rising in Grand Rapids...Now What?
Greg Johnson • October 24, 2025

AI-Driven Cybersecurity Threats Are Coming for Small Businesses.  Here’s How to Stay Safe (Every Month)

It’s officially Cybersecurity Awareness Month.  But let’s be honest…when you're running a small business, every month should be cybersecurity awareness month.


Why?


Because the threats are no longer just knocking at the doors of big corporations. They’re coming for businesses like yours — private practices, local schools, service-based companies, and non-profits right here in West Michigan.


And now, they’re powered by AI.


The Rise of AI-Powered Cyber Threats: What Does That Even Mean?


If you’ve been hearing a lot about artificial intelligence (AI) lately, you’re not alone. It’s powering everything from marketing chatbots to HR tools.  But it’s also being used by cybercriminals in increasingly sophisticated ways.


A recent TechRadar article breaks down how AI is being weaponized by attackers to launch faster, smarter, more targeted attacks…and it’s something we’re seeing firsthand with many of our clients here at IT Systems LLC.


Let’s make it real.


What Does an AI Cyber Threat Look Like for a Business Like Yours?


Here’s the thing: cyberattacks don’t always start with a hoodie-wearing hacker in a dark basement. More often than not, they start with a simple email, a fake login page, or a text message that looks just real enough.


With AI in the mix, attackers can now:


  • Write more convincing phishing emails (with perfect grammar and personalized details)

  • Generate fake websites that look identical to yours or your vendors’

  • Identify weak points in your system faster than ever

  • Automate attacks to target multiple businesses at once

And no, they’re not skipping over the “little guys.” In fact, smaller organizations are often the easiest targets because they don’t think they’re on the radar.


Meet Julie — And Why This Matters


Let’s say you’re Julie.


You run a small but growing dental practice in Grand Rapids. You’ve got 12 staff members, a few part-time hygienists, and hundreds of patient records in your system.


You’re focused on patient care, scheduling, and managing a busy front desk. You’re not thinking about whether your firewall is up to date or if your front desk staff could spot a phishing email.

One afternoon, someone clicks on an email that looks like it’s from your payment processor.

They enter their login credentials into a fake site.

You don’t find out for a few days... until a patient calls and says their credit card has been used to buy gift cards at Target.


What happens next?


You start fielding angry phone calls from patients.

You have to alert your payment provider and possibly your cyber insurance provider.

Your staff is confused, scared, and worried they’re to blame.

Your patients are wondering if they can trust you with their information ever again.

You didn’t do anything wrong.

But now you’re the one cleaning up the mess.



Small Businesses Are a Big Target

We’ve heard it before:


“We’re too small to be hacked.”


“We don’t have anything they’d want.”


“We’re not storing credit cards or social security numbers — we’re just a cleaning company.”


Here’s the truth:  If you use email, have a website, accept payments, or store any customer data - you are a target.


AI doesn’t discriminate. It just looks for weak links.  And small businesses often don’t have the layered security protections that larger enterprises do.


In fact, according to the 2024 Verizon Data Breach Investigations Report, over 60% of cyberattacks now target small and medium-sized businesses.


The Real Cost Isn’t Just Money — It’s Trust


Think about your client relationships.


Your reputation.


The way you build loyalty through referrals, reliability, and doing things the right way.


Now imagine all of that evaporating because of a single click.


It’s not just about downtime or recovering files.


It’s about maintaining the trust your business is built on.


Whether you’re a private practice, an HVAC company, a small charter school, or a non-profit, your community trusts you to keep their data safe.

And when that trust is broken, it’s incredibly hard to get back.



So, What Can You Do to Stay Safe?


No system is perfect, and no tool will eliminate risk completely. But the good news is: there’s a LOT you can do to dramatically reduce your risk.  And we help clients do this every day.

Let’s break it down into manageable, real-world actions:


1. Start With Cybersecurity Basics


  • Use strong, unique passwords for each system
  • Enable multi-factor authentication (MFA) wherever possible
  • Keep all software and systems up to date
  • Use antivirus and endpoint detection software
  • Back up your data regularly (off-site or in the cloud)


2. Train Your Team (Often!)


The biggest security threat in any organization is usually human error.


A staff member who clicks a bad link.  Someone who reuses a password.  An employee who falls for a fake invoice.


That’s why regular training is critical. Even 10-minute refreshers every quarter can make a difference.


At IT Systems LLC, we offer simple, non-technical training sessions tailored for small teams so your staff knows what to look for and how to respond.


3. Layer Your Security


Think of cybersecurity like layers of an onion (minus the tears). One firewall or antivirus program isn’t enough anymore.


We recommend a multi-layered approach, which may include:


  • Firewalls and secure routers
  • AI-enhanced antivirus/EDR solutions
  • Email filtering and spam protection
  • Remote monitoring and management (RMM)
  • Secure cloud storage and backups

The right mix depends on your size, industry, and how your team works (especially if they’re remote or hybrid).


4. Build an Incident Response Plan


What would you do if something did go wrong?


Having a plan — even a simple one — can help your team respond calmly and quickly.  We can help you create one that’s practical for your business, including:


  • Who to call first
  • How to shut down access
  • How to communicate with customers
  • What steps to take next


This kind of preparedness can mean the difference between a minor bump and a full-on business crisis.


5. Work With a Trusted IT Partner


Most small businesses don’t need (or want) a full-time IT department.


But you do need someone in your corner.


At IT Systems LLC, we work with Grand Rapids businesses, just like yours, providing cybersecurity services that are proactive, responsive, and realistic.


Whether you need a one-time security audit or ongoing managed support, we’ll help you build a foundation that protects your team and earns your clients’ trust.



The Bottom Line


Cybersecurity isn’t just for tech companies or hospitals. It’s for everyone...especially small businesses that often don’t realize how exposed they really are.


With AI-powered threats getting smarter by the day, now’s the time to take action.  Because trust takes years to build and seconds to lose.


Need a quick checkup on your cybersecurity setup?


Let’s start with a conversation.


We’ll review your current setup and give you clear, actionable steps to improve your protection, without overwhelming your team.


Contact IT Systems LLC today and let’s build a smarter security strategy. One that works for your business, your budget, and your peace of mind.




A laptop showing a VPN application screen sits on a white desk next to a potted plant, with a company logo in the corner.
By Greg Johnson March 13, 2026
Learn what a VPN is and why small businesses use one to protect remote access, secure public WiFi, and keep company data safe.
By Greg Johnson February 27, 2026
Learn what cyber insurance carriers require in 2026, why small businesses get denied, and how IT Systems LLC in Grand Rapids helps West Michigan companies get approved and stay covered.
By Greg Johnson February 13, 2026
Phishing emails are one of the most common and costly cyber threats facing small businesses in Grand Rapids, Michigan. These attacks are designed to trick employees into revealing passwords, approving fraudulent payments, or clicking malicious links that compromise company systems. For many small businesses, phishing is not a technical failure, it’s a human one. Understanding how these scams work and how to protect your team is one of the most important cybersecurity steps you can take. What Is a Phishing Email? A phishing email is a fraudulent message designed to appear legitimate. It often impersonates: A software provider A coworker or manager A vendor A bank or payment platform A service like Microsoft 365 or Google Workspace The goal is simple: Steal login credentials Redirect payments Install malware Gain access to sensitive company data Modern phishing emails are highly convincing. They often use real logos, accurate formatting, and urgent language that pressures employees to act quickly. Why Small Businesses in West Michigan Are Prime Targets Many small business owners assume hackers only target large corporations. In reality, small businesses are often more attractive targets because: They have fewer security layers Teams operate with high internal trust Financial processes are less segmented Attackers use automated tools that cast wide nets In West Michigan, we frequently see phishing attempts aimed at healthcare offices, schools, nonprofits, professional services, and trade-based businesses. Size does not protect you. Preparation does. What a Phishing Attack Can Cost a Small Business The impact of a successful phishing attack can include: Account takeover Fraudulent wire transfers Payroll diversion scams Data exposure Operational downtime Reputational damage Even a single compromised inbox can expose vendor communications, client data, and financial workflows. The cost is rarely just financial, it’s operational. Why Employee Awareness Is Just as Important as Security Tools Email filtering tools block many threats. But not all of them. Phishing works because it exploits human behavior: urgency, authority, and routine. An employee sees: “Your password expires today.” “Invoice attached.” “Wire transfer needed before 3pm.” They react quickly. That’s what attackers rely on. Technology helps. But your team is the final line of defense. How to Protect Your Team from Phishing Attacks 1. Enforce Multi-Factor Authentication (MFA) MFA prevents stolen passwords from being enough to access accounts. 2. Use Advanced Email Filtering Basic spam filters are no longer sufficient. Modern tools analyze behavior patterns, impersonation attempts, and domain anomalies. 3. Secure Your Email Domain (SPF, DKIM, DMARC) Proper domain configuration helps prevent spoofing and impersonation. 4. Provide Ongoing Security Awareness Training Annual training isn’t enough. Phishing evolves constantly. Employees need regular reminders and real-world examples. 5. Monitor Login Activity Unusual login attempts, impossible travel events, or repeated failed logins should be flagged and investigated quickly. Real Examples of Phishing We’ve Seen Locally Without naming names, we’ve seen: Fake DocuSign emails requesting credential re-entry Payroll change requests appearing to come from company leadership “Microsoft password expired” alerts Vendor invoice impersonation with slightly altered email domains Each one looked legitimate at first glance. How IT Systems, LLC Helps Grand Rapids Businesses Reduce Phishing Risk At IT Systems, LLC, phishing protection is not just about installing software. We help businesses: Configure secure email environments Implement multi-factor authentication Monitor suspicious activity Provide employee awareness guidance Respond quickly when incidents occur Security works best when tools, training, and monitoring work together. Frequently Asked Questions About Phishing Emails How do phishing emails bypass spam filters? Attackers constantly adapt tactics to avoid detection. Some phishing emails use legitimate compromised accounts, which makes them harder to detect. Can small businesses really be targeted? Yes. Many phishing campaigns are automated and target thousands of small businesses at once. Is Microsoft 365 or Google Workspace secure enough by default? Both platforms provide strong security foundations, but proper configuration, MFA, and monitoring are critical for full protection. What should we do if an employee clicks a phishing link? Immediately reset passwords, revoke sessions, review login history, and assess potential data exposure. How often should phishing training happen? At least annually, with periodic reminders and updates throughout the year. Strengthen Your Email Security Phishing emails don’t always look suspicious at first glance. If your business hasn’t reviewed email security or employee awareness in the past year, it may be time to take a closer look. 👉 Talk with our team about strengthening your email security.
Small business office setting for a Grand Rapids, Michigan business.
By Greg Johnson January 30, 2026
Learn how much IT services cost for small businesses in Grand Rapids, Michigan. We explain hourly rates, managed IT pricing, and what actually impacts cost.
Person in a suit drawing an upward-trending productivity graph on a chalkboard.
By Greg Johnson January 16, 2026
Is your technology helping your team or holding them back? Discover why "digital friction" is the biggest threat to Grand Rapids businesses in 2026.
Four people collaborating around a laptop in an office. They are looking at the screen, smiling.
By Greg Johnson January 2, 2026
A practical guide for small businesses across Grand Rapids and the West Michigan lakeshore
Woman at desk with laptop, notebook, and phone, looking stressed; glasses nearby.
By Greg Johnson December 19, 2025
Stop fixing tech only after it breaks. Use our 2026 IT Planning Guide to budget for upgrades, secure your data, and grow your West Michigan business.
By Greg Johnson December 5, 2025
Stay ahead of 2026 privacy laws with this compliance checklist for West Michigan businesses. Learn what’s new, what to avoid, and how to protect your data and reputation.
Man on phone with IT Systems logo, asking,
By Greg Johnson November 21, 2025
What your IT team wishes you knew but never says out loud - smart, jargon-free tech advice for Grand Rapids small businesses.
Windows 11 and 10 logos on a screen, with a yellow sticky note saying,
By Greg Johnson November 7, 2025
Still using Windows 10 heading into 2026? Learn why it’s a security risk and how Grand Rapids businesses are planning smarter IT upgrades with help from local pros.
Show More