5 Ways to Keep Your Business Cyber-Secure Over Memorial Day Weekend
Greg Johnson • May 23, 2025



Memorial Day weekend is here—and for many West Michigan business owners, that means taking a much-needed break. Whether you’re headed to the lake, hosting a backyard barbecue, or simply closing the laptop for a few days, the last thing you want is to be dealing with a tech emergency while you're out.


But before we dive into tech checklists, we want to take a moment to honor the reason for this holiday: to remember and be thankful for the men and women who gave their lives in service to our country. It's because of their sacrifice that we’re able to enjoy the freedom and opportunity we often take for granted—even in something as simple as a long weekend.


Before you unplug, here are 5 simple things you can do to keep your business secure, connected, and stress-free—even if you’re completely offline.



1. ✅ Double-Check Your Backups


You don’t want to come back on Tuesday to a ransomware attack or lost data from a power outage. Make sure your systems are backed up (ideally off-site or to the cloud), and that those backups are actually working.


🔒 At IT Systems, we help clients across West Michigan set upautomated, encrypted backupswith easy recovery options.




2. 🔐 Enable Multi-Factor Authentication (MFA)


If you're still relying on just a password to protect your business systems—this is your sign to upgrade. MFA adds a second layer of protection by requiring a verification code from your phone or email. That way, even if a password gets leaked, your system is still protected.


🎯 Bonus: Enable MFA for your email, file sharing tools, accounting software, and remote desktop logins.





3. 📡 Secure Remote Access (or Disable It Temporarily)


If your employees are logging in remotely over the holiday weekend, make sure they’re doing it securely. Use a VPN (virtual private network), and avoid letting people log in from public Wi-Fi or unmonitored personal devices.


Not planning on working? Consider disabling remote access for the weekend just to be safe.


👥 If you’re not sure who can access what, we can help you audit your permissions and access controls.





4. 📬 Set an Out-of-Office Email That Doesn’t Invite Hackers


Be cautious about what your auto-reply says. Hackers monitor bounce-backs and out-of-office messages looking for gaps in security. Keep it simple and professional—avoid oversharing dates or travel info.


Good Example:

“Thanks for your message. Our office will be closed for Memorial Day and will respond upon return. If this is urgent, please contact our support team.”




5. 🚨 Know Who to Call If Something Goes Wrong


Make sure you (and your team) know who to reach out to in case something goes sideways while you're away.


Create a quick contact list that includes:

  • Your IT provider

  • Emergency vendors (ISP, phone systems, power backup)

  • A backup contact if you’re unreachable

📞 Our clients have peace of mind knowing we’re just a call or ticket away—even over holiday weekends.



🧠 Final Thought: Tech Shouldn’t Be the Thing That Ruins Your Weekend



Taking time off is important. It helps you recharge, refocus, and come back stronger. And while you’re enjoying the slower pace of the weekend, your systems should be secure, monitored, and working quietly in the background.


More importantly, we hope you take a moment this Memorial Day to reflect on those who made the ultimate sacrifice so that we can live, work, and thrive freely. We’re grateful, and we don’t take that lightly.


If you’re unsure whether your business is protected while you're away, we’re happy to do a quick check-up or walk through a cybersecurity readiness review.


👉 Schedule a free consultation with our team


From our team to yours—wishing you a safe, restful, and meaningful Memorial Day weekend.



—-

IT Systems, LLC
Proudly serving small businesses across Grand Rapids and West Michigan.





A person is holding a sign that says buy local
By Greg Johnson June 6, 2025
Thinking about switching IT providers? Discover why local businesses in Grand Rapids and West Michigan are choosing IT Systems, LLC for faster response times, personalized service, and smarter tech solutions. Learn what to expect from a local IT provider—and why it’s a smarter choice than dialing a 1-800 number.
A dental office with a sign that says is your managed it hipaa compliant
By Greg Johnson May 8, 2025
The Digital Dilemma for Dental Practices Your dental practice may be running state-of-the-art imaging equipment and cloud-based scheduling - but if your systems aren’t HIPAA-compliant , one security breach could cost you more than just downtime. In today’s digital world, patient data isn’t just stored in a file cabinet anymore. It lives in electronic health records (EHRs), emails, cloud platforms, mobile devices, and even your practice’s Wi-Fi network. And with technology constantly evolving, keeping your dental office compliant with HIPAA requires more than just good intentions. This guide will walk you through exactly how to keep your dental practice HIPAA-compliant in 2025, from understanding what’s required , to building the right safeguards , to partnering with the right IT provider . Need help making sure your dental office is compliant? Schedule a free IT assessment What Is HIPAA and Why Does It Matter to Dental Practices? The Health Insurance Portability and Accountability Act (HIPAA) was established to protect patients’ sensitive health information and ensure secure data handling across healthcare providers. If you’re a covered entity (which all dental practices are), you’re legally obligated to follow HIPAA guidelines regarding: Privacy (how you protect patient health information) Security (how you store and transmit it electronically) Breach notification (what happens if there’s a data leak) Failing to meet HIPAA standards can result in: Fines ranging from $100 to $50,000 per violation Loss of patient trust Damage to your practice’s reputation Litigation costs if patients take legal action How Has HIPAA Compliance Changed in 2025? As technology advances, so do cyber threats, and HIPAA enforcement has evolved to keep up. In 2025, HIPAA compliance for dental offices involves: Encrypted cloud storage and backups Secured mobile devices and endpoints Use of multi-factor authentication (MFA) Written policies and staff training Continuous IT risk assessments Ensuring Business Associate Agreements (BAAs) are in place with all vendors In short, the expectations are higher - and for good reason. Step 1: Understand What Qualifies as Protected Health Information (PHI) PHI isn’t just about a patient’s name or birth date. It includes anything that could identify someone and relates to their healthcare, such as: X-rays Billing information Appointment reminders Email communications Insurance records Lab results HIPAA also governs ePHI , electronic protected health information , which includes any PHI stored or transmitted electronically. So if your front desk is emailing appointment info or your hygienist is accessing records on a tablet, you’re dealing with ePHI, and HIPAA rules apply. Step 2: Conduct a Thorough HIPAA Risk Assessment A HIPAA risk assessment is NOT OPTIONAL - it’s required. You must evaluate how your practice handles, stores, accesses, and secures PHI. This includes: How files are backed up Who has access to patient records Whether your Wi-Fi is encrypted If you're using strong, unique passwords Whether there are firewalls and antivirus software in place 🔍 Pro Tip: Partner with a local IT provider (like IT Systems, LLC ) who can run a technical risk assessment and provide a detailed report with remediation recommendations. Step 3: Implement the 3 Required Safeguards HIPAA outlines three categories of safeguards you must put in place: 1. Administrative Safeguards Appoint a HIPAA Privacy Officer Create and enforce written security policies Train all staff on data handling procedures Keep records of who has access to what Have a written plan in case of a data breach 2. Physical Safeguards Lock up physical charts and devices after hours Secure server rooms or storage closets Use screen privacy filters at front desks Restrict access to workstations Install security alarms or monitoring systems 3. Technical Safeguards Use encryption for all stored and transmitted ePHI Require strong passwords and automatic logouts Implement MFA for logins Use firewalls, antivirus, and intrusion detection systems Track access logs and perform regular audits Step 4: Secure Your Communication Channels HIPAA doesn’t prohibit emailing or texting patients, but it does require you to protect those communications. Only use encrypted email services Never send PHI via personal email accounts Avoid unencrypted file sharing (Google Drive, Dropbox, etc.) Use secure patient portals for forms and appointment reminders Step 5: Get Business Associate Agreements (BAAs) in Place Any vendor who handles your PHI, such as an IT provider, cloud backup service, or billing platform, is considered a Business Associate and must sign a BAA. A BAA is a legal document stating that they are HIPAA-compliant and will protect your patients’ data. ✅ Ensure you have signed BAAs with: Your cloud storage provider Your EHR or practice management software Your IT provider Your email or appointment software Step 6: Train Your Team (And Document It) Human error is the leading cause of HIPAA violations. Staff might: Share logins Leave a screen open at the front desk Send unencrypted emails Toss PHI in the trash instead of shredding it To avoid this: Train every team member at least once a year Keep written records of training Include front desk, billing, hygienists, and assistants Role-play breach scenarios and responses Step 7: Prepare for a Data Breach (Even If It Never Happens) You hope it never happens. But if it does, you need a clear plan: Who will be notified internally? What tools will be used to shut down the breach? Who is responsible for filing with HHS? How will you notify affected patients? IT Systems, LLC can help you create a custom breach response protocol that meets HIPAA standards and gives you peace of mind. Real-World HIPAA Compliance Mistakes (and How to Avoid Them) Here are a few examples of compliance failures we’ve seen in the field: ❌ Using public Wi-Fi to access patient charts ✅ Set up a VPN or avoid using unsecured networks altogether ❌ Reusing the same password for every login ✅ Implement password managers and policies for regular updates ❌ Not backing up data regularly ✅ Use encrypted, off-site backups with version history and 24/7 access ❌ Letting ex-employees retain access to systems ✅ Immediately revoke access when a staff member leaves How IT Systems, LLC Helps Dental Practices Stay HIPAA-Compliant We specialize in supporting private healthcare offices and dental practices throughout Grand Rapids and West Michigan. Our HIPAA-focused IT services include: ✅ Risk assessments & compliance audits ✅ Secure cloud backups ✅ Firewall & antivirus protection ✅ HIPAA training modules for your staff ✅ Ongoing IT support & maintenance ✅ Secure device management for laptops, tablets, and mobile phones With over 20 years of experience in healthcare IT, we understand how to balance security, performance, and compliance without disrupting your day-to-day operations. Compliance Isn’t a One-and-Done Thing HIPAA compliance isn’t just about checking boxes. It’s about creating a secure and trustworthy environment for your patients - and protecting the reputation you’ve built over the years. In this digital world, your technology is just as important as your tools. Let’s make sure it’s working for you, not against you. ✅ Want help assessing your HIPAA compliance risk? We’d be happy to walk through your current systems, identify gaps, and help you build a plan that keeps your practice protected. 👉 Schedule a Free Consultation Or give us a call at 616-855-0836
A doctor and nurse are looking at a laptop together
By Greg Johnson April 25, 2025
Discover what to prioritize when selecting computer hardware for your Grand Rapids business. IT Systems LLC helps you plan smarter upgrades.
A person is stacking wooden blocks with the words we make it easy written on them.
By Greg Johnson April 9, 2025
Not sure if you need ongoing IT support or just occasional help? Learn the difference between managed IT services and break-fix support for your business.
A group of people are sitting at a table looking at a tablet.
By Greg Johnson March 26, 2025
Technology hiccups can cost your business more than you think. In this post, we break down 9 essential ways managed IT services can give small businesses in West Michigan a competitive edge - from preventing costly downtime to protecting against cyber threats. Featuring a real-life emergency support story, this blog shows how proactive IT support from a local partner like IT Systems LLC can keep your business running smoothly, securely, and without the stress.
A piece of paper that says we have your files ransomware
By Greg Johnson March 12, 2025
Ransomware attacks are a growing threat to small businesses, locking up critical files and demanding payment for their release. In Grand Rapids, businesses need to be proactive in protecting their systems. This blog from IT Systems LLC explains what ransomware is, how it spreads through phishing emails and compromised websites, and why small businesses are prime targets.
By Greg Johnson February 26, 2025
These essential cyber hygiene tips will help protect your data and keep your business safe in 2025.
A person is writing on a clock that says time to upgrade to windows 11
By Greg Johnson February 13, 2025
Windows 10 support ends soon—don't wait to upgrade! Protect your business from security risks, improve performance, and ensure software compatibility. Learn how IT Systems, LLC in Grand Rapids can help with a smooth transition to Windows 11. Contact us today!
By Greg Johnson February 4, 2025
Are Password Managers Safe? What Grand Rapids Businesses Need to Know
A person is typing on a laptop computer on a wooden table.
By Greg Johnson January 28, 2025
6 Essential Steps to Strengthen Email Security and Protect Your Grand Rapids Business