Exclusive: Why Cyberattacks on Aussie businesses are becoming more advanced
Cybersecurity threats are escalating in complexity and scope for Australian businesses, with ransomware, business email compromise (BEC), and supply chain attacks now taking centre stage.
These risks are being amplified by the use of artificial intelligence by attackers to sharpen their tactics.
"Attackers are now leveraging AI to improve phishing techniques and automate reconnaissance," said Jayaprakash Muthusamy, CEO of cybersecurity firm Borderless CS.
"Critical infrastructure and mid-sized enterprises are increasingly targeted, not just large corporations."
Muthusamy, who also serves as Chair of the Board of Directors at CyberYouth Australia Limited, said the rapidly evolving threat landscape demands a shift from reactive to proactive defence strategies.
At the heart of Borderless CS's approach is a 24/7 Managed Security Operations Centre (SOC), which uses a blend of real-time monitoring, behavioural analytics, and AI-powered threat detection.
"Our services are built on a proactive threat-hunting model," he said. "We integrate global threat intelligence feeds to detect emerging threats early."
When a breach does occur, the firm follows a tiered response protocol designed to contain and recover swiftly.
"We identify and validate the threat through automated and manual analysis. Once confirmed, containment steps are triggered - this may involve isolating endpoints, disabling compromised accounts, or blocking malicious traffic," Muthusamy explained. Throughout the incident, Borderless CS works closely with the client's internal teams and conducts a full root cause analysis afterwards.
Muthusamy brings over 28 years of cybersecurity leadership to the table. His experience spans areas such as digital forensics, cloud security, ethical hacking, and regulatory compliance.
At Borderless CS, that expertise translates into a strong focus on aligning security efforts with broader business goals.
With regulatory scrutiny increasing, Borderless CS places a high priority on compliance. The firm's internal Information Security Management System is aligned with ISO 27001:2022, and they conduct regular audits, risk assessments, and staff training.
"This ensures our clients can confidently meet their regulatory obligations with our support," he said.
In practice, this includes support for standards such as APRA CPS 234, the ACSC Essential 8, and international frameworks like NIST.
"We map both frameworks to create a hybrid model that offers strong foundational controls from Essential 8 with strategic depth from NIST," Muthusamy explained.
One of the firm's key offerings is Identity and Access Management (IAM) Managed Services, which address growing concerns around user access and authentication. "We simplify the complexity by centralising identity governance, enforcing least privilege access, and enabling seamless single sign-on and multi-factor authentication," he said.
By integrating continuous monitoring and automated user provisioning, the service reduces administrative burdens and helps to prevent insider threats. "Our approach is scalable and tailored to each client's specific environment - whether it's cloud-native, hybrid, or legacy systems," Muthusamy added.
With many Australian businesses facing a shortage of in-house cybersecurity talent, Borderless CS aims to fill the gap.
"Our clients gain access to a team of certified cybersecurity experts across disciplines - SOC analysts, incident responders, compliance specialists, and security architects," he said. "We become an extension of their IT function."
But even the most advanced technology and skilled teams can be undermined by one overlooked factor: human error. "Human factors - specifically user awareness and training - are often the most overlooked," Muthusamy said. "Many breaches originate from a single click on a phishing link."
To combat this, the company includes security awareness programs in its suite of services. "Businesses often underinvest in building a cyber-aware culture," he said.
Threat intelligence also plays a pivotal role in the company's operations. By feeding commercial, open-source, and industry-specific intelligence into its SOC, Borderless CS can deliver actionable insights.
"This allows us to detect and anticipate emerging threats before they impact our clients," Muthusamy said.
Looking ahead, Muthusamy predicts that AI will continue to dominate the cybersecurity landscape - both as a tool and a threat.
"We'll see increased adoption of AI-driven security solutions, especially for threat detection and automation," he said. "At the same time, attackers will use AI to scale social engineering and exploit weaknesses faster."
He also expects Zero Trust architectures to become standard practice, alongside increased regulatory pressure. "Organisations will need to be more agile, and MSSPs like Borderless CS will play a key role in enabling that agility securely," he said.