
5 Big Reasons Orgs Choose Katalyst for Managed IT
For teams considering managed IT, see why Katalyst is the top choice to help you simplify tech and…
Katalyst
If you didn’t catch our July 9th live webinar discussing the 2025 Cybersecurity Annual Report, you’re not alone. But you did miss a discussion packed with real-world insights that organizations across industries are already acting on.
Led by Uriah Berry, Katalyst’s lead cybersecurity expert and a former NSA network engineer, the session broke down field-tested findings from dozens of hands-on security assessments. The result? A clearer picture of where organizations are vulnerable—and what they can do about it.
Unlike many reports based on surveys or generalized research, this cybersecurity report is grounded in real assessments across real organizations. Uriah and the Katalyst team dug into actual configurations, tools, and habits observed in the field.
Here’s what stood out:
Multi-Factor Authentication (MFA) is still not universally implemented. Some organizations enable it for email but skip VPNs or admin accounts. This leaves critical systems exposed.
Laptops, desktops, and servers are frequently misconfigured or missing essential security updates—one of the most common gaps exploited in breaches.
While most companies have an incident response plan on paper, very few test it. Without real-world drills or tabletop exercises, teams may not know how to respond when it matters most.
End users continue to fall victim to phishing emails. Even in 2025, awareness training isn’t translating into readiness.
In addition to vulnerabilities, several macro-trends emerged during our cybersecurity assessments in 2025:
Compliance does not equal security. Many organizations that pass audits still have major exploitable weaknesses.
Misconfigurations are more dangerous than missing tools. Most companies already own the right security technologies—they’re just not set up properly.
Regular testing leads to better outcomes. Companies that simulate cyberattacks or walk through response scenarios recover more effectively.
“Most of the security issues we found weren’t from sophisticated actors. They were preventable, everyday oversights.”
— Uriah Berry, Cybersecurity Expert, Katalyst
A: Implement MFA everywhere—across all apps, systems, and user types.
A: If it hasn’t been tested recently in a live simulation or tabletop exercise, it probably has critical gaps.
A: Continuous, bite-sized training combined with simulated phishing tests—not just an annual compliance video.
A: No. Katalyst’s security analysis is designed to deliver value whether or not you move forward with a project. It’s about helping organizations understand their real risks.
This report sparked dozens of follow-up conversations with organizations looking to benchmark their cybersecurity maturity. If you’re serious about reducing risk in 2025, this is a great place to start.
The Hidden Cost of Cybersecurity Gaps – Learn how security blind spots can hurt your bottom line.
5 Security Questions You Can Start Asking to Get Ahead – Leadership-focused tips to initiate proactive risk conversations.
How to Prepare for a Network Security Audit – A step-by-step guide to strengthen incident response.
Are You as Secure as You Think? – Explore real assessment findings on MFA, misconfigurations, and more.
Helping You Go Further, Faster, Safer
Learn about the services Katalyst offers to keep your organization and its data safe with a tailored cybersecurity solution.
Helping you go further, faster, safer.
For over 18 years, Katalyst has helped organizations create and execute their technology vision. From addressing complex challenges to embracing exciting opportunities, clients trust our team’s experience and expertise across managed solutions, cybersecurity, modern infrastructure, and cloud computing. Book a call to learn more about our services today.
For teams considering managed IT, see why Katalyst is the top choice to help you simplify tech and…
How to Prepare for a Network Security Audit (And How Katalyst Can Help) Ryan Deckard Getting ready for a network
Tools Change. The Mission Stays the Same. Jesse White During my time in the Marine Corps, I carried my E-Tool