![Story image](https://securitybrief.com.au/uploads/story/2025/02/11/chris1.webp)
Cutting through complexity: How a unified approach can help safeguard IT systems
Rapid advances in artificial technology are a double-edged sword in cyber Security, empowering both attackers and defenders. Security has long been a cat-and-mouse game, but the fast pace of AI has escalated the complexity with an endless cycle of continuous updates and new security tools.
Traditional security tools must now incorporate AI to detect AI-generated threats, such as AI-driven phishing, social engineering and deepfakes. In Australia, 70% of organisations believe AI is outpacing their ability to protect against threats and 36% are concerned about AI-generated attacks. New research released in January 2025 reveals that 33% of cyberattacks are now AI-generated, up from 25% in the previous six months.
Drowning in complexity
When it comes to cyber Security, organisations are drowning in complexity. 68% of Australian companies use 5-10 tools or more to manage the employee lifecycle, including device management and Security, with 11% using over 15 different tools. The level of complexity is astounding; one in four employees has to manage over ten different passwords to access IT resources.
Shadow IT has become another challenge. Over 60% of organisations have discovered applications employees don't officially manage by IT. Key reasons for this include the limitations of authorised tools and the time and difficulty in getting a new tool approved. Nearly 90% of IT managers are concerned about shadow IT but cannot monitor and manage what users are accessing. There are also concerns that additional security measures often result in a poor user experience.
It's no wonder that there's a high demand for simplicity and unified technology. Second only to security, "Managing multiple types of devices" was at the top of Australian businesses' minds (42%). An overwhelming majority (84%) wished for a single platform to consolidate multiple solutions into one interface for identity, access, and Security. We see this trend globally, with similar levels in the US and UK.
Investment in Security is increasing.
Australian businesses allocate a smaller proportion of their IT budgets to cybersecurity than their US counterparts. However, most expect spending to increase over the next 12 months, with one in four anticipating a significant increase.
The challenge is knowing what to invest in. The sheer number of solutions on the market is a headache in itself. Fewer than two-thirds of businesses have a cyber security expert on their internal team, which adds to the difficulty of evaluating different tools. Cybersecurity fragmentation is recognised as a growing risk and expense. Licensing fees consume a significant percentage of IT budgets due to redundant or overlapping software.
MSPs: A possible partner
One option is to use a managed service provider (MSP) to support IT needs. MSPs are generally seen as cost-effective and up-to-date on the latest technologies. Most organisations in Australia use an MSP to manage some or all of their IT, and a significant majority anticipate increasing MSP investment in the next 12 months.
There is an opportunity for more Australian businesses to embrace full MSP support. Australian companies are less likely (31%) than US businesses (43%) to have an MSP completely manage their IT program, including technology, process, and support.
Reducing tool overload is vital to an effective cyber defence strategy, whether or not MSPs are used. An unwieldy mix of tools creates wasteful overlap and dangerous gaps.
When teams switch between numerous dashboards, workflows become disjointed, updates slip, and the risk of misconfiguration grows. That money and time could be better spent on strategic initiatives. Standardising on fewer solutions can strengthen your bargaining power with vendors.
It's also essential to evaluate tools regularly, conducting quarterly or biannual reviews. If a solution no longer aligns with your objectives and/or is duplicated in function by other tools, it is likely time to replace or remove it. Additionally, ensuring employees are effectively trained on core tools reduces the chance of them seeking alternatives.
Consolidating disparate tools with a unified IT platform will also reduce tool overload. A platform combining core functions in one interface—managing devices, identities, security policies, and analytics—will streamline operations and enable a better understanding of Security and compliance.