Skip to Content Skip to Footer
Fusion5 Australia
    • Applications
    • Enterprise Resource Planning (ERP)
      • Enterprise Resource Planning (ERP)
      • NetSuite
      • Dynamics 365 Business Central
      • Dynamics 365 Finance and Operations
      • JD Edwards
      • Resources
        • Resources
        • See how an ERP solution makes a business tick and what that could mean for you
        • Five Steps to getting RFP Ready
        • How to turn the top three retail challenges into *opportunities*
          See all resources
    • Customer Relationship Management
      • Customer Relationship Management
      • Dynamics 365 CRM
      • Dynamics 365 Sales
      • Dynamics 365 Marketing
      • Dynamics 365 Customer Service
      • Dynamics 365 Field Service
      • Resources
        • Resources
        • Otago Polytechnic Transforms Student Application Process With Fusion5
        • 6 data migration mistakes that will stop your CRM project in its tracks
        • If a new (or your first!) CRM implementation is on the horizon, we are pretty sure you’ve had som...
          See all resources
    • People Management (HR & Payroll)
      • People Management (HR & Payroll)
      • Jemini
      • Jade Star
      • EmpowerHR
      • MYOB PayGlobal
      • MyWorkplace
      • TimeFiler
    • Planning and Analytics
      • Planning and Analytics
      • Workday Adaptive Planning
      • IBM
      • BlackLine
      • Insight Software
      • Resources
        • Resources
        • AFL Streamlines Reporting with Workday
        • Why Excel and ERP aren’t financial planning best friends. And what you can do about it
          See all resources
    • Service Management
      • Service Management
      • Xurrent
      • Ivanti
      • Resources
        • Resources
        • Shellharbour City Council empowers service management
        • Optimising service management with an integrated approach
        • Why your business needs an integrated Service Management platform
          See all resources
    • Cloud Platforms
      • Cloud Platforms
      • Amazon Web Services (AWS)
      • Citrix
      • Microsoft Azure
      • Oracle Cloud Infrastructure
      • Resources
        • Resources
        • AWS Cloud Cost Optimisation eBook
        • Cloud wars: AWS vs. Azure - who wins in cost management?
        • Integrating FinOps with your cloud cost optimisation strategy
          See all resources
    • Services
    • Managed Services
      • Managed Services
      • Managed Cloud
      • Managed Security
      • Managed Help Desk
      • Managed Infrastructure
      • Resources
        • Resources
        • The future of Service Management: Is each department in your business ready?
        • Optimising service management with an integrated approach
        • Overcoming common service management challenges
          See all resources
    • Consultancy and Advisory
      • Consultancy and Advisory
      • Digital Transformation Consulting
      • Programme Management
      • Organisational Change Management
      • Infrastructure
      • Security
      • Resources
        • Resources
        • Why is project governance such a big deal in an ERP implementation?
        • When it comes to successful delivery, hybrid is the passport to success for most projects.
          See all resources
    • Security Services
      • Security Services
      • Endpoint Detection and Response
      • Governance, Risk & Compliance
      • Security Operations Centre
      • Modern Work
      • Resources
        • Resources
        • Cyber threats in 2024: A growing menace
        • Build a stronger cybersecurity defence today
        • The rising tide of cyber threats: How prepared are you?
          See all resources
    • Cloud Services
      • Cloud Services
      • Cloud Migration
      • Cloud Advisory
      • Cloud Engineering
      • Cloud Platforms
      • Resources
        • Resources
        • Dive deep into cost optimisation for your Azure environment with our comprehensive guide. 
        • Cloud wars: AWS vs. Azure - who wins in cost management?
        • Unlock your cloud's full potential: A guide to cost optimisation
          See all resources
    • Infrastructure
      • Infrastructure
      • Virtual Workspaces
      • Server and Database Management
      • Resources
        • Resources
        • Dive deep into cost optimisation for your Azure environment with our comprehensive guide. 
        • Cloud wars: AWS vs. Azure - who wins in cost management?
        • Unlock your cloud's full potential: A guide to cost optimisation
          See all resources
    • Data and AI
    • Integration
    • Customer Success Team
      • Customer Success Team
      • PartnerPlus
      • Help Desk
    • Outsourced Payroll Services
      • Outsourced Payroll Services
      • Outsourced Payroll Services
      • Remediation as a Service
    • Industries
    • All industries
    • Agribusiness
    • Education
    • Financial Services
    • Manufacturing
    • Professional Services
    • Wholesale Distribution
    • Strategic Partners
    • Microsoft
      • Microsoft
      • Microsoft overview
      • Products
        • Products
        • Dynamics 365 Customer Engagement (CRM)
        • Dynamics 365 Finance and Operations (ERP)
        • Dynamics 365 Business Central
        • Microsoft Azure
        • Microsoft Copilot
      • Services
        • Services
        • Licensing
        • Premier Support
        • Modern Work
      • Industries
        • Industries
        • Construction
        • Education
        • Financial Services
        • Manufacturing
        • Food and Beverage
        • Not for Profit
        • Local Government
      • Resources
        • Resources
        • Snell transforms operations with Microsoft Dynamics 365 Finance and Operations
        • Right-size your Dynamics 365 storage and licences before August 30, 2025
        • Adopting Microsoft Copilot
          See all resources
    • Oracle
      • Oracle
      • Oracle overview
      • Products
        • Products
        • NetSuite
        • JD Edwards
      • Resources
        • Resources
        • BLUNT Umbrellas unfolds sustainable technology strategy
        • Namoi Cotton strengthens cybersecurity with Fusion5
          See all resources
    • Amazon Web Services (AWS)
    • Partner Ecosystem
  • Insights & Resources

The Bottom Line

Is keeping up with the ever-changing cyber threat landscape leaving you feeling exhausted?

Ever feel like cyber threats change as often as Leo DiCaprio changes his girlfriends? It can be daunting to decide what to prioritise. The reality is, while the threats remain similar, our approach to tackling them is evolving.

Artificial Intelligence (AI) is revolutionising cybersecurity, offering advanced tools for threat detection and response. But it's not just about technology; the human element is crucial too. Effective cyber awareness training can make all the difference in preventing breaches and ensuring your team knows how to respond to potential threats.

Focusing on common threats like ransomware and phishing is essential, but understanding zero trust principles and the role of your people in cyber resilience can significantly impact your organisation's security maturity. By staying ahead of these threats, you protect sensitive data and maintain operational continuity.

Tune in to our discussion to gain valuable knowledge and ensure your business is well-prepared for the challenges and opportunities ahead.

Something just for....you!

Ordinarily, we serve up articles that are relevant to specific roles in your organisation.  But Cybersecurity touches quite literally all of us - especially in the era of AI. So, in this edition, we've got three articles that we think will be useful no matter what your job is!

How to turn your IT department into AI enablers

While AI technologies promise many things to many people, they also come with warning tags that range from cybersecurity risks to AI ethical considerations and principles.

Implementing a (well-understood) line-of-business application is a far different proposition, and the implications of getting AI ‘wrong’ are far-reaching. So, it’s little wonder if both your cybersecurity and IT teams are reluctant to move quickly and enable the business to embrace the innovations AI can bring.

While frustrating, it’s understandable. However, it does signify that considerable homework needs to be done at the stakeholder level to deliver confidence at the IT level.

AI and security homework

ASD’s (Australian Signals Directorate) report on best practices for deploying secure and resilient AI systems says: “Deploying artificial intelligence (AI) systems securely requires careful setup and configuration that depends on the complexity of the AI system, the resources required (e.g., funding, technical expertise), and the infrastructure used (i.e., on-premises, cloud, or hybrid).”

Compliance with data protection rules such as the CCPA and GDPR (including the upcoming Australian Privacy Act changes, which are expected to detail requirements on automated decisions) will require your organisation to have access restrictions, encryption, and auditing capabilities. This will include using privacy-preserving approaches such as differential privacy and federated learning, which are essential to minimising privacy risks and maintaining data utility.

ASD firmly places responsibility for all of this on the shoulders of your CISO (or C-level equivalent), not your cybersecurity or IT department.

AI and ethics homework

The Australian Government has also published Australia’s 8 Artificial Intelligence (AI) Ethics Principles, an ethics framework designed to ensure AI is safe, secure, and reliable. Adhering to this framework is currently voluntary and doesn’t claim to be a substitute for existing AI regulations and practices.

The (March) 2024 EU AI Act, which does provide a comprehensive legal framework for AI systems, sets a higher global watermark for AI regulation, but it’s yet to be seen if New Zealand (which is already trailing behind) and Australia will follow suit.  

Adopting best practice AI ethics frameworks will require responses from your cybersecurity and IT teams. But again, these decisions are far beyond the pay grade of your technology teams and are far-reaching business – not technology decisions.

Your IT team - a roadblock or just downright sensible?

While it might be tempting to think that your IT team is entirely responsible for enabling a safe and secure AI implementation, this is overly simplistic and doesn’t reflect the complexities associated with a remarkably powerful technology. Ownership of the controls that make AI not only safe to use but applies an ethical lens to how it’s used starts at a much higher level in the organisation.

A wary IT or cybersecurity team may be perceived as a needless roadblock to AI innovation when you are enthusiastic about harnessing its potential. But in their defence, they are justifiably hyper-conscious of the need to protect and secure your business and people as their first priority. And so should you be.

 

More from the cyberspace:

  • Why assessments are an essential part of your journey
  • Why you should SOC it to cybercriminals, regardless of your size

Why assessments are an essential part of your journey

A cybersecurity assessment is not unlike getting your car regularly checked and serviced. The objective is to help maintain and improve its current condition, upgrade weak mechanical and structural components, optimise performance, and make sure it’s set up for multiple drivers (with varying experience and skills). And, of course, to keep it in a state of readiness to navigate the hazardous roads ahead.  

Just as you wouldn‘t risk lives by driving a poorly maintained car, neither should you risk your business by taking shortcuts to cybersecurity. Proactive, fact-based assessments are critical in ensuring security hygiene, risk mitigation, and vulnerability remediation in your digital infrastructure, as well as strengthening your security posture.

So, what do you need to know?
  1. How often should you have an assessment? Following an initial bumper-to-bumper examination, we recommend a quarterly cycle to track progress against your cybersecurity roadmap.
  2. What can you expect from your first assessment? While an initial consultation is often sought to address a specific issue, further examination can uncover myriad issues and determine a list of remedial requirements to ensure you meet your compliance obligations and current legislative standards.
  3. What controls are you measured against? Three leading frameworks offer best practice mitigation strategies: ACSC Essential Eight, NIST, and CIS (which has 18 categories, including controls like policies, incident response plans, and business continuity plans).
  4. What are the benefits of regular assessments? Fact-based cyber assessments can be a ‘eureka’ moment for many organisations. But they’re also an invaluable opportunity to align disjointed IT and business management expectations and set practical plans and measurable goals to improve your security posture.
  5. What will a plan look like? Your assessment includes technical recommendations and a maturity level score, identifying potential risks (and their impacts), urgent actions, quick wins (like easy configuration changes), and a timeline. However, it will also include non-technical recommendations focusing on your governance policies and cyber resilience.
  6. How will you know you are safer? It’s all about metrics. With an initial score to measure progress against, subsequent assessments can determine your maturing security posture as risks are mitigated.
  7. Is there such a thing as a perfect security posture? Achieving the highest level of cybersecurity is extremely difficult without eliminating all human intervention (and replacing it entirely with automation). But given the ever-changing nature of the threat landscape, this is to be expected. Cybersecurity is a long and uncharted road, so vigilance is never-ending

Last words? Fact-based cybersecurity assessments provide you with actionable insights within your strategic roadmap - so you can make smarter decisions (not guesses) about what you need to focus on and invest in.

 

More from the cyberspace:

  • How to turn your IT department into AI enablers
  • Why you should SOC it to cybercriminals, regardless of your size

Why you should SOC it to cybercriminals, regardless of your size

Cybercriminals are democratic at heart. Small businesses can expect as many cyberattacks (if not more) as mid-large organisations. Yet worryingly, 50% of the smallest companies (by revenue) say they don’t – or don’t know – if they have the resources to meet their cyber objectives.

Today, cybersecurity is a 24/7/365 activity for any business of any size. The days of an IT manager ‘going it alone’ (with fragmented weekends or holidays) are well and truly over. Even a medium-large company with a well-resourced technology team can struggle to do justice to its business-critical digital projects when all hands are on deck to counter or mitigate a threat.

Protecting your organisation effectively requires trained professionals and specialist tools and platforms to monitor, hunt, and manage threats, safeguard data, respond to incidents, remediate damage, and enforce governance.

Which is where a SOC comes in.

First - what's a SOC?

A SOC (Security Operations Centre) is a 24/7/365 in-house or outsourced team of analysts who use a range of proven technology solutions to monitor, investigate and respond to threats to your network.

A well-provisioned and resourced SOC will also continuously analyse your threat posture, looking for ways to improve it so you can become more resilient, recover more quickly, and meet your business and legal governance obligations.

Transform your SOC in a day with Microsoft Sentinel
So, why not start your own SOC?

Right now, the cybersecurity industry lacks at least four million professionals, and it’s predicted the shortfall will grow to 85 million by 2030. This makes finding, recruiting and funding trained professionals a challenge for most small-medium organisations.

Gartner estimates, "By 2025, 33% of organizations that currently have internal security functions will attempt and fail to build an effective internal SOC due to resource constraints, such as lack of budget, expertise and staffing.”

Turning to your managed security service provider (MSSP) for faster, more efficient, and cost-effective round-the-clock SOC services offers the resources and skills you need without the overhead. Additionally, an outsourced SOC comes with subject matter experts attuned to your industry and with up-to-the-minute knowledge due to constant exposure to threats.

Who needs a SOC?

Any business of any size requiring:

  1. A partnership approach to managing cybersecurity and relieving the burden of responsibility from an internal team
  2. Help to safeguard a highly regulated, high-risk environment
  3. Access to cybersecurity engineers, analysts, a virtual CISO, and subject matter experts who can apply a focused industry lens
  4. An affordable, low-stress approach to expertly managed cybersecurity services
  5. Scaled support without added complexity
  6. Triaged alerts to remove false positives and only highlight genuine threats
  7. A process of ongoing improvement that goes beyond tuning security settings to include policy settings and cyber strategy

 

More from the cyberspace:

  • How to turn your IT department into AI enablers
  • Why assessments are an essential part of your journey

Spotlight on... Cybersecurity

This edition of Spotlight On focuses on the current cybersecurity trends facing the shores of Australia and New Zealand, including:

  • Cybersecurity trends and threats in 2024
  • Importance of Zero Trust and internal data security
  • Common organisational mistakes and training strategies
  • Cybersecurity assessments and Security Maturity

Our cloud, infrastructure and security solution specialist, Travis Hoult, delves into the evolving cyber landscape, highlighting the rise of Zero Trust architecture and the critical need for internal data security, particularly in the context of AI and SharePoint. He discusses the increasing prevalence of ransomware attacks and the #soPHISHticated nature of modern phishing attempts. Travis also addresses common organisational pitfalls in cybersecurity, emphasising the importance of effective employee training and the necessity of staying updated with patch management. Finally, he explains the value of comprehensive cybersecurity assessments, outlining how these tools can help organisations identify vulnerabilities, prioritise improvements, and enhance their overall security posture cost-effectively.

00:00    Introduction
00:31    What are the major trends in cybersecurity we're seeing in 2024 in Australia and New Zealand?
02:24    What kinds of threats are most prevalent this year?
04:25    How do these trends compare to previous years?
07:08    What are some common mistakes organisations make in their cybersecurity efforts?
10:59    What are the top recommendations for organisations to improve their cybersecurity posture?
13:58    Fusion5's approach to cybersecurity assessments.

 

Upcoming events

We regularly host online and in-person events to help people stay aware of the latest innovations and opportunities that exist to improve your business.

Please check the AU and NZ events page regularly as we'll post these events there when they are open for registrations, or let your Account Manager know that you're interested.

Latest news, insights, and resources

Blogs, eBooks, videos... we publish interesting, entertaining, and educational bits and pieces all the time — here's a selection of our latest offerings.

  • Blogs
  • Resources
  • Events
Blog

Why ERP and Excel aren’t enough for modern CFOs 

ERP and Excel lack forward-looking analytics, real-time data, and agile modeling—CFOs require dedicated FP&A platforms for confident decision-making.

Blog

An open letter to CFOs about transformation, love and wellbeing

We know a bit about partnering and the fact that we support over 800 companies across New Zealand and Australia is a bit of a thumbs up for us

Blog

Cloud wars: AWS vs. Azure - who wins in cost management?

Compare AWS and Azure pricing models. Learn cloud cost management best practice. Maximise your cloud investment for both platforms. 

Blog

GTO: Keeping a watchful eye on trainees

Keeping an eye on hundreds of apprentices across a network can be a challenge. You simply can’t watch everybody all the time. But wouldn’t it be nice to have a crystal ball you could gaze into that shows you exactly which apprentices are struggling, and why?

Resource

Manufacturing: The New *Reinventors*

Resource

Better reporting and smarter decisions with NetSuite Analytics Warehouse

Bringing together your business data into one system for comprehensive metrics and reporting.  

Resource

*Minimise* the impact of *external challenges* on your agriculture business

Event
Resource

Microsoft Dynamics 365 Commerce for Retail

Event

NetSuite for professional services 101 demonstration

Event
Resource

NetSuite ERP for Agribusiness

Event
Resource

Microsoft Dynamics 365 for Manufacturers and Distributors

Watch the teams from Fusion5 and Microsoft for an exclusive gathering of industry leaders, experts, and innovators in the manufacturing and distribution sectors.  

This event provided valuable insights and  practical knowledge to help you drive growth, optimise operations, and transform your business with the power of Microsoft Dynamics 365. 

Event
Resource

Hyper automation in IT support and cyber security

Hyper automation is vital in an organisation’s ability to scale in the face of the ever growing demands of corporate directives, regulation compliance, employee experience and retention.

In this newsletter

  • Something just for....you!
  • Spotlight on... Cybersecurity
  • Upcoming events
  • Latest news, insights, and resources

Read next

January 2025

What's ahead in 2025

The Bottom Line by Fusion5

June 2023

Cyber Security

The Bottom Line by Fusion5

April 2024

Generative AI

The Bottom Line by Fusion5

April 2025

Unlocking the power of Agentic AI

The Bottom Line by Fusion5

September 2023

Customer Engagement & Collaboration (CEC)

The Bottom Line by Fusion5

Get The Bottom Line delivered to your inbox

Chat with Bernie
Hello, you’re speaking with Bernie!
Bernie ×

Great outcomes start with great conversations

Let's chat

  1. Home
  2. The Bottom Line
  3. 2024 August

Fusion5

  • Contact Us
  • About Us
  • Our People
  • Careers
  • Infusion
  • Marketplace
  • Submit an RFP

Australia Offices

  • Melbourne (03) 9922 5519
  • Sydney (02) 8240 3800
  • Brisbane (07) 3215 3400
  • Adelaide (08) 8239 5700
  • Perth (08) 9203 3600
  • English (New Zealand) Visit Fusion5 New Zealand

Our Partners

  • Microsoft
  • NetSuite
  • JD Edwards
  • IBM
  • Workday Adaptive Planning
  • Amazon Web Services AWS
  • Fusion5 Australia
  • Privacy Policy
  • Privacy Settings
  • © 2025 Fusion5 Limited
  • Consultant Login