Employee Spotlight: Anna Kelley

Professional Journey

This month we are spotlighting Anna Kelley, a Senior Account Manager at Nevtec for the past six years. Before joining Nevtec, Anna Kelley also worked as a Senior Account Manager at Dell. Her journey has been defined by a commitment to continuous improvement—striving to get better every day and deepen her expertise in client relationships and account strategy.

Role at Nevtec

As a Senior Account Manager, Anna plays a vital role in maintaining and growing relationships with Nevtec’s partners. Her focus is on delivering exceptional service, fostering trust, and ensuring that each partner feels supported and valued.

What She Loves Most

Anna’s favorite part of her role is the people, her team, the partners she works with, and the overall environment at Nevtec. She thrives in a collaborative setting where mutual respect and shared goals drive success.

Childhood Aspirations

As a child, Anna dreamed of being a singer or actor. While her career path took a different direction, her early passion for performance speaks to her confidence, creativity, and ability to connect with others, qualities that serve her well in her current role.

Hobbies and Interests

Outside of work, Anna enjoys horseback riding, camping, and spending quality time with her family. These hobbies reflect her love for nature, adventure, and meaningful connections.

Personal Inspiration

Anna admires her parents most. Their influence and support have shaped her values and work ethic, and they continue to be a source of strength and inspiration in her life.

A Unique Life Experience

At just eight years old, Anna underwent surgery to remove a tumor from her spine, a life-changing experience that speaks to her resilience and courage. This moment has undoubtedly contributed to her grounded perspective and determination.

Favorite Superhero

Anna’s favorite superhero is Deadpool, known for his wit, unconventional style, and fierce loyalty. It’s a fitting choice for someone who values authenticity and strength with a sense of humor.

Favorite Book and Movie

Her favorite book is Black Beauty, a classic tale of empathy and endurance. Her favorite movie is Stephen King’s IT, showing her appreciation for suspense and storytelling that explores deeper human emotions.

Favorite Food and Travel Destination

Anna’s go-to meal is a perfectly cooked steak, and her favorite place to visit is anywhere in Northern Arizona, a region she loves for its natural beauty and peaceful atmosphere.

Binge-Worthy Series

When it’s time to unwind, Anna turns to Grey’s Anatomy, a long-running series known for its emotional depth and compelling characters.

Closing Thoughts

Anna Kelley brings heart, experience, and dedication to everything she does at Nevtec. Her journey, both personal and professional, is a testament to resilience, growth, and the power of strong relationships. We’re proud to spotlight Anna this month and grateful for the impact she makes every day.

Nerve-Wracking Tech Truths: What Every Business Should Know

Nerve-Wracking Tech Truths: What Every Business Should Know

In the ever-evolving world of technology, some facts are more than just surprising, they’re downright nerve-wracking. At Nevtec, we believe that awareness is the first step toward protection. So we’ve gathered ten of the most startling cybersecurity truths that every business leader, IT professional, and tech user should know.

1. Phishing: The Gateway to Cyber Chaos

It’s still the #1 way hackers get in. A staggering 91% of cyberattacks begin with a phishing email. One wrong click can open the door to data theft, ransomware, and worse.

2. Ransomware: A Business Killer

Think your business is too small to be a target? Think again. 60% of companies hit by ransomware shut down within six months. Preparation isn’t optional, it’s survival.

3. Passwords: The Weakest Link

Despite years of warnings, the top two passwords in 2024 were still “123456” and “password.” If your team is using these, it’s time for a serious password policy overhaul.

4. Patch or Perish

60% of breaches exploit known vulnerabilities, ones that already had patches available. Keeping software updated isn’t just good hygiene; it’s a frontline defense.

5. USB Killers: Small but Deadly

A $50 device known as a “USB killer” can destroy a computer’s motherboard in seconds. Never plug in unknown USB drives. Ever.

6. Ransomware Never Sleeps

On average, a new ransomware attack happens every 11 seconds. That’s more than 7,800 attacks per day. Cybercriminals don’t take breaks, neither should your defenses.

7. The IoT Toaster Threat

In 2023, hackers used internet-connected appliances, including toasters, to launch massive DDoS attacks. If it connects to the internet, it needs to be secured.

8. The Cost of a Breach

The average global cost of a data breach in 2025 is $4.5 million. That’s not just a line item; it’s a potential business-ending event.

9. Dark Web Deals

Stolen credit cards can sell for as little as $5 on the dark web. Your data is valuable and vulnerable. Protect it like your business depends on it (because it does).

10. The Invisible Hack

Most breaches go undetected for 207 days. That’s nearly seven months of silent damage. Early detection tools and monitoring are critical.

What Can You Do?

Cybersecurity isn’t just an IT issue—it’s a business imperative. From employee training to endpoint protection, every layer matters. If you’re unsure where to start, Nevtec is here to help.

Let’s make sure your business doesn’t become a statistic.

A Flight of Local Whiskey Paired with Cyber Threats

Join me for an exclusive, in-person cybersecurity and whiskey pairing event at 10th Street Distillery in San Jose. We’ll explore five critical cyber threats—including the hidden risks of shadow IT—each paired with a unique craft whiskey and discuss practical security strategies in a memorable setting.

This is a conversation for Bay Area business leaders who understand that protecting a company can be both serious and engaging. Due to the VIP accommodations, we have Very Limited Seating.

What you’ll experience:

•A curated flight of five whiskeys from 10th Street Distillery

•Expert insights from global cybersecurity leader Sophos

•Networking, gourmet appetizers, and a VIP gift bag

Event Details:

•When: Thursday, October 23rd, 3:00 – 6:00 PM

•Where: 10th Street Distillery, San Jose

•Cost: Complimentary (limited to 25 attendees)

Ready to make cybersecurity unforgettable? I look forward to seeing you there.

Shadow IT: The Apps Your Team Uses Without You Knowing

Tech Tip 2: Shadow IT: The Apps Your Team Uses Without You Knowing

It’s easy to install a new app with just a few clicks. Maybe someone on your team signs up for a free file-sharing service, tries a new chat tool, or uses a personal Dropbox account to send documents quickly. While these shortcuts feel harmless, they create what’s called “shadow IT”—systems your business relies on but that you don’t control or secure.

What Exactly Is Shadow IT?

Shadow IT refers to any technology, software, or cloud service that employees use for work purposes without official approval or oversight from your IT department or business leadership. This includes:

Cloud Storage Services: Personal Google Drive, Dropbox, or OneDrive accounts used to store and share business files Communication Tools: WhatsApp, Telegram, Discord, or other messaging apps for work conversations Collaboration Platforms: Slack workspaces, Trello boards, or Notion pages created without company oversight Productivity Apps: Personal subscriptions to design tools, project management software, or specialized applications File Transfer Services: WeTransfer, SendAnywhere, or other quick-sharing platforms for large files

The appeal is obvious: these tools are often free, easy to use, and solve immediate problems. But they also create invisible risks that can devastate small businesses.

Why Shadow IT Is More Dangerous Than You Think

Here’s the problem: if you don’t know these apps exist, you can’t protect the data inside them. This creates several critical vulnerabilities:

Data Exposure: A free file-sharing tool could expose sensitive client documents to anyone with a link or store them on servers in countries with weak data protection laws.

Compliance Violations: If your business handles regulated data (healthcare records, financial information, personal data), using unapproved tools could violate HIPAA, PCI DSS, GDPR, or other compliance requirements.

Access Control Issues: When employees leave, you can’t revoke access to accounts you don’t know exist, potentially leaving former employees with ongoing access to business data.

Security Gaps: Personal accounts often lack the security features of business-grade tools—no multi-factor authentication, weak password requirements, or inadequate encryption.

Data Loss Risks: If an employee’s personal account is compromised or deleted, critical business data could disappear without any backup or recovery option.

Legal Liability: If client data is breached through an unauthorized app, your business could face lawsuits, regulatory fines, and reputation damage.

The Hidden Scale of the Problem

Most business owners dramatically underestimate how much shadow IT exists in their organization. Studies show that while IT departments typically know about 30-40 cloud applications in use, the actual number is often 10-15 times higher.

Consider these common scenarios:

•A marketing team member uses Canva’s free version to create social media graphics, uploading client logos and brand assets

•Sales representatives share proposals through personal email accounts because the company file server is “too slow”

•Remote workers use personal Zoom accounts for client meetings to avoid corporate meeting limits

•Employees create shared Google Docs for project collaboration because they’re easier than the company’s official tools

•Team members use personal cloud storage to access work files from home or mobile devices

Each of these situations represents data living outside your security perimeter, potentially accessible to unauthorized parties.

Real-World Consequences for Small Businesses

The risks aren’t theoretical. Here are examples of how shadow IT has impacted real businesses:

The Accidental Public Share: A real estate agent used a personal Google Drive to share property documents with clients. When they accidentally set sharing permissions to “anyone with the link,” sensitive financial information became publicly accessible through search engines.

The Departed Employee: A small law firm discovered that a former paralegal had been using a personal Dropbox account to store client files. Months after termination, they still had access to confidential legal documents with no way for the firm to revoke it.

The Compliance Nightmare: A healthcare practice found that staff were using WhatsApp to share patient information for convenience. This violated HIPAA regulations and resulted in significant fines and mandatory compliance training.

The Data Breach: A marketing agency’s client data was compromised when an employee’s personal cloud account was hacked. The breach exposed campaign strategies, customer lists, and financial information for multiple clients.

Why Employees Turn to Shadow IT

Understanding why shadow IT happens is crucial to addressing it effectively:

Speed and Convenience: Official tools often require approval processes, IT setup, or training that slows down urgent work Functionality Gaps: Approved tools might lack features that employees need for specific tasks Accessibility Issues: Company systems might not work well on personal devices or from remote locations Cost Concerns: Employees might use free personal tools rather than request budget for business versions Familiarity: People naturally gravitate toward tools they already know and use personally

The solution isn’t to shut everything down or punish employees for trying to be productive. It’s to create clear guidelines and give your team safe, approved tools to get their work done.

Building a Secure, Productive IT Environment

Conduct a Shadow IT Audit: Survey your team to understand what tools they’re actually using. Create a safe space for honest disclosure without punishment.

Evaluate and Approve: Review the tools your team wants to use. Many have business versions with better security, compliance features, and administrative controls.

Provide Alternatives: If you can’t approve a specific tool, offer secure alternatives that meet the same business needs.

Create Clear Policies: Develop written guidelines about what tools are approved, how to request new software, and what data can be stored where.

Implement Monitoring: Use network monitoring and cloud access security brokers (CASB) to identify unauthorized cloud services.

Regular Training: Educate employees about the risks of shadow IT and the importance of using approved tools.

Make Approval Easy: Create a simple process for employees to request new tools or report shadow IT they discover.

Stay Resilient With Nevtec

At Nevtec, we help you discover, evaluate, and secure the technology your business actually uses. Our comprehensive approach includes:

•Shadow IT discovery and risk assessment

•Cloud security and access management

•Policy development and employee training

•Secure tool evaluation and implementation

•Ongoing monitoring and compliance support

•Incident response for data exposure events

Don’t let unknown apps create known risks. The key is balancing productivity with protection. For help uncovering shadow IT and building secure, approved systems for your business, contact Nevtec today.

A Flight of Local Whiskey Paired with Cyber Threats

Join me for an exclusive, in-person cybersecurity and whiskey pairing event at 10th Street Distillery in San Jose. We’ll explore five critical cyber threats—including the hidden risks of shadow IT—each paired with a unique craft whiskey and discuss practical security strategies in a memorable setting.

This is a conversation for Bay Area business leaders who understand that protecting a company can be both serious and engaging. Due to the VIP accommodations, we have Very Limited Seating.

What you’ll experience:

•A curated flight of five whiskeys from 10th Street Distillery

•Expert insights from global cybersecurity leader Sophos

•Networking, gourmet appetizers, and a VIP gift bag

Event Details:

•When: Thursday, October 23rd, 3:00 – 6:00 PM

•Where: 10th Street Distillery, San Jose

•Cost: Complimentary (limited to 25 attendees)

Ready to make cybersecurity unforgettable? I look forward to seeing you there.

The Nerve Center: Tech Tips from Steve: Tech Tip 1:

The Nerve Center: Tech Tips from Steve:

Tech Tip 1:

The Dangers of Public Wi-Fi: A Hidden Threat to Your Business

Grabbing a quick coffee and jumping on free Wi-Fi feels easy and convenient, but it can secretly expose your business to serious risks. Public networks are often unsecured, which means a cybercriminal with the right tools can sit nearby and intercept emails, logins, and even sensitive client data without you knowing.

Why Public Wi-Fi Is a Cybercriminal’s Playground

Public Wi-Fi networks are designed for convenience, not security. Most coffee shops, airports, hotels, and restaurants prioritize getting customers connected quickly rather than protecting their data. This creates several vulnerabilities:

Unencrypted Connections: Many public networks don’t encrypt data transmission, meaning everything you send and receive travels in plain text that anyone with basic hacking tools can read.

Man-in-the-Middle Attacks: Cybercriminals can position themselves between your device and the Wi-Fi router, intercepting all your communications. They can capture passwords, email content, financial information, and even create fake login pages to steal credentials.

Rogue Hotspots: Attackers often set up fake Wi-Fi networks with names like “Free Coffee Wi-Fi” or “Airport Guest” to trick users into connecting. Once connected, they have complete access to monitor and steal your data.

Malware Distribution: Unsecured networks make it easier for hackers to push malware onto connected devices, potentially giving them long-term access to your business systems.

The Business Impact Goes Beyond Data Loss

For small businesses, that one careless connection could lead to consequences that are far more serious than a single compromised password:

Data Breaches: Customer information, financial records, and proprietary business data can all be intercepted and stolen, leading to potential lawsuits and regulatory fines.

Compliance Violations: Industries with strict data protection requirements (healthcare, finance, legal) could face severe penalties if client data is compromised through unsecured connections.

Reputation Damage: News of a data breach can destroy customer trust and damage your business reputation for years.

Financial Losses: Beyond immediate theft, businesses may face costs for breach notification, credit monitoring services, legal fees, and lost revenue from damaged relationships.

Operational Disruption: If attackers gain access to business systems through a compromised device, they could disrupt operations, delete files, or even deploy ransomware.

Real-World Scenarios That Should Concern Every Business Owner

Consider these common situations where public Wi-Fi poses serious risks:

•An employee checks company email at the airport while traveling to a client meeting

•A sales representative accesses the CRM system from a hotel lobby to update customer records

•A business owner reviews financial statements on their laptop at a coffee shop

•Remote workers regularly connect to public networks to access company files and applications

Each of these scenarios could result in sensitive business information falling into the wrong hands.

Protecting Your Business: Practical Solutions

The safest move is to avoid public Wi-Fi for work altogether, but if employees must connect, here are essential protections:

Require Business-Grade VPNs: A Virtual Private Network encrypts all data transmission, making it unreadable even if intercepted. Invest in a business-grade VPN service for all employees who work remotely.

Use Mobile Hotspots: Provide employees with mobile hotspot devices or reimburse them for using their phone’s hotspot feature. Cellular connections are generally more secure than public Wi-Fi.

Implement Multi-Factor Authentication: Even if passwords are compromised, MFA provides an additional security layer that makes unauthorized access much more difficult.

Create Clear Policies: Establish and communicate clear guidelines about when and how employees can use public networks for business purposes.

Regular Security Training: Educate employees about the risks and teach them to recognize suspicious networks and potential threats.

Stay Resilient With Nevtec

At Nevtec, we help you build comprehensive security policies that protect your business whether employees are in the office or on the go. Our solutions include:

•Secure remote access solutions and VPN deployment

•Employee security awareness training

•Network security assessments and monitoring

•Incident response planning for when breaches occur

•Mobile device management to secure all business devices

Don’t let convenience compromise your security. The cost of prevention is always less than the cost of recovery. For more practical cybersecurity advice tailored to your business, contact Nevtec today.

A Flight of Local Whiskey Paired with Cyber Threats

Join us for an exclusive, in-person cybersecurity and whiskey pairing event at 10th Street Distillery in San Jose. We’ll explore five critical cyber threats, including the risks of unsecured networks, each paired with a unique craft whiskey and discuss practical security strategies in a memorable setting.

This is a conversation for Bay Area business leaders who understand that protecting a company can be both serious and engaging. Due to the VIP accommodations, we have Very Limited Seating.

What you’ll experience:

•A curated flight of five whiskeys from 10th Street Distillery

•Expert insights from global cybersecurity leader Sophos

•Networking, gourmet appetizers, and a VIP gift bag

Event Details:

•When: Thursday, October 23rd, 3:00 – 6:00 PM

•Where: 10th Street Distillery, San Jose

•Cost: Complimentary (limited to 25 attendees)

Ready to make cybersecurity unforgettable? I look forward to seeing you there.

Cybercriminals Are Counting Down to Windows 10’s End… Are You?

Cybercriminals Are Counting Down to Windows 10’s End… Are You?

October 14, 2025, marks a critical deadline for millions of businesses. On this day, Microsoft officially ends support for Windows 10, leaving nearly 500 million PCs without security updates and vulnerable to cyberattacks. If your business hasn’t upgraded, you’re not just behind, you’re an easy target.

We’ve seen this scenario before. When support ended for Windows 7, cybercriminals unleashed devastating attacks like WannaCry, which crippled organizations across 150 countries and caused billions in damages. History is poised to repeat itself, and this time, the pool of vulnerable machines is even larger.

For small and mid-sized businesses, the stakes are higher than ever. Without the large IT budgets and dedicated security teams of major corporations, a single breach can be catastrophic. This article breaks down the immediate threats your business faces and outlines the essential steps you must take to protect yourself.

The Unseen Threats of an Outdated OS

Once Windows 10 support ends, Microsoft will no longer release security patches for new vulnerabilities. Every flaw discovered after October 14th becomes a permanent backdoor for attackers. Cybercriminals are already preparing to exploit these weaknesses, and businesses that fail to upgrade will be first in line for:

Ransomware Attacks: Hackers can encrypt your critical data and demand a hefty ransom to restore access, grinding your operations to a halt.

•Data Breaches: Sensitive customer information, financial records, and intellectual property can be stolen and sold on the dark web, leading to devastating reputational and financial loss.

Compliance Violations: Running an unsupported OS often violates regulatory requirements like HIPAA, PCI DSS, and GDPR, exposing your business to steep fines and legal penalties.

Software Incompatibility: Over time, essential business applications will cease to function correctly on an outdated operating system, creating productivity bottlenecks and operational failures.

While large enterprises have the resources to absorb these blows, small businesses often don’t. For you, the cost of inaction isn’t just a line item, it could be the end of your business.

Your Proactive Defense Starts with Nevtec

At Nevtec, we understand that navigating major technology shifts is a challenge for business leaders. Our job is to make it seamless and secure. We don’t just upgrade your systems; we partner with you to build a resilient and future-proof IT environment.

Our Windows 11 migration strategy is designed to protect your business from the risks of Windows 10 EOL:

1.Comprehensive Readiness Assessment: We start by identifying which of your systems are ready for a direct upgrade to Windows 11 and which may require hardware replacement. This ensures a smooth, predictable transition without surprises.

2.Customized Migration Plan: We develop a step-by-step migration roadmap tailored to your business needs, designed to minimize downtime and keep your team productive throughout the process.

3.Layered Cybersecurity Protection: Our advanced security solutions protect your business during and after the transition. We ensure your new Windows 11 environment is fortified against modern threats, so you can operate with confidence.

Don’t Wait for an Attack—Secure Your Future Today

The deadline is here, and cybercriminals are not waiting. Every day you continue to run Windows 10 is another day you’re rolling the dice with your business’s future.

Don’t leave your security to chance. Let the experts at Nevtec guide you through a secure and seamless transition to Windows 11. Protect your data, ensure compliance, and keep your operations running smoothly. Speaking of smooth…

A Flight of Local Whiskey Paired with Cyber Threats

Join me for an exclusive, in-person cybersecurity and whiskey pairing event at 10th Street Distillery in San Jose. We’ll explore five critical cyber threats, each paired with a unique craft whiskey, and discuss practical security strategies in a memorable setting.

This is a conversation for Bay Area business leaders who understand that protecting a company can be both serious and engaging. Due to the VIP accommodations, we have Very Limited Seating.

What you’ll experience:

  • A curated flight of five whiskeys from 10th Street Distillery.
  • Expert insights from global cybersecurity leader Sophos.
  • Networking, gourmet appetizers, and a VIP gift bag.

Event Details:

  • When: Thursday, October 23rd, 3:00 – 6:00 PM
  • Where: 10th Street Distillery, San Jose
  • Cost: Complimentary (limited to 25 attendees)

Ready to make cybersecurity unforgettable? I look forward to seeing you there.

Three Major Brands Hacked Over the Summer

Three Major Brands Hacked Over the Summer

A Lesson for Small Businesses

Three major brands were hacked this summer. In just the past few months United Natural Foods Inc. (UNFI), Aflac, and Jaguar Land Rover all reported major cyber incidents. Each attack disrupted operations, exposed sensitive data, or brought production lines to a halt.

These weren’t small businesses. They’re well-funded global brands with entire teams dedicated to cybersecurity. Yet attackers still found their way in. If organizations of this size can be disrupted, what does that mean for small and mid-sized businesses with fewer defenses?

Three Lessons from Recent Attacks

  • Supply Chains Can Stall: UNFI’s attack left shelves empty and operations scrambling. For smaller distributors and retailers, a similar breach could shut down order systems overnight.
  • Data Is a Target: Aflac’s breach exposed Social Security numbers and health records. For small businesses that store customer data, one phishing email could lead to a compliance and reputation nightmare.
  • Operations Can Freeze: Jaguar Land Rover saw global production grind to a halt. For smaller manufacturers, even a short disruption could cost thousands in lost revenue.

A Warning for Small Businesses

Cybercriminals don’t just chase Fortune 500 companies. They know smaller businesses are often easier to breach and quicker to pay. Unlike large enterprises, small businesses typically lack deep pockets, cyber insurance cushions, or large recovery teams. One incident can be financially devastating.

Stay Resilient With Nevtec

At Nevtec, we help you build a security posture that’s sized for your business but strong enough to stand up to today’s threats. That means:

  • Proactive monitoring to stop attacks before they spread.
  • Backup and recovery planning so downtime doesn’t derail you.
  • Patch management to close vulnerabilities.
  • User training to keep phishing from slipping through.
  • Incident response playbooks so you know what to do if the worst happens.

Dont Wait for the Next Headline

Big brands might make the news when they get hacked, but small businesses pay the bigger price. The time to prepare isn’t after an attack, it’s now.

👉 Schedule a Cyber Resilience Review with Nevtec to identify your vulnerabilities and build a clear plan to keep your business secure and resilient.

A Flight of Local Whiskey Paired with Cyber Threats

Join me for an exclusive, in-person cybersecurity and whiskey pairing event at 10th Street Distillery in San Jose. We’ll explore five critical cyber threats, each paired with a unique craft whiskey, and discuss practical security strategies in a memorable setting.

This is a conversation for Bay Area business leaders who understand that protecting a company can be both serious and engaging. Due to the VIP accommodations, we have Very Limited Seating.

What you’ll experience:

  • A curated flight of five whiskeys from 10th Street Distillery.
  • Expert insights from global cybersecurity leader Sophos.
  • Networking, gourmet appetizers, and a VIP gift bag.

Event Details:

  • When: Thursday, October 23rd, 3:00 – 6:00 PM
  • Where: 10th Street Distillery, San Jose
  • Cost: Complimentary (limited to 25 attendees)

Ready to make cybersecurity unforgettable? I look forward to seeing you there.