Katalyst Network Group Blog
Resources and insights for technology and executive leaders
Improve Your Security Response with This Mental Model
Improve your cybersecurity decisions with the OODA Loop model. Learn how to respond more swiftly…
Should We Allow SMS Text Messages as a 2FA Method?
Discover why SMS may not be the most secure 2FA method, plus best practices for implementing robust…
FTC Safeguards Rule: What Every Auto Dealer Needs to Know
What is the FTC Safeguards Rule? Do you need to comply? How? We’ll explain it all in plain English.
3 Cyber Threats Every C-level Leader Should to Be Aware of
Discover three lesser-known, but equally threatening items posing risks to the health of your…
No Point Without a Story, No Story Without a Point
Multiple studies have shown that if you use a story, people are much more likely to remember your…
Is Over-Tooling Causing Over-Charging?
Not sure if you have an over-tooling problem? Self-evaluate with our simple 3-question challenge.
A Managed Service That Doesn’t Suck
Managed services give your organization the expertise and resources needed to succeed. But how do…
5 Security Questions You Can Start Asking to Get Ahead
Learn the right questions to ask to ensure your company is optimized and ready for any…
Are Your Teams’ Capabilities Getting Frumpy?
Hiring technology talent now teeters between traditional skills and those being demanded in the…