For decades, organisations have been fed the same cybersecurity doctrine:
This checklist-driven approach has become the gold standard. But if these measures truly worked, why are breaches still skyrocketing?
The problem isn’t just technical — it’s cognitive. Companies don’t fail at cybersecurity because they lack tools; they fail because they don’t take security seriously thinking the tools they have been solved are a magic bullet along with the suave talk from the sales person.
The illusion that buying security solutions equals being secure has led to widespread complacency, and real-world incidents prove that a lack of security mindset, not technology, is the biggest risk.
A perfect example of this cognitive failure is FIIG Securities, an Australian financial services firm now facing legal action from ASIC for systemic and prolonged cybersecurity failures.
📌 Breach Duration: March 2019 — June 2023
📌 Data Stolen: 385GB of confidential information
📌 Number of Clients Affected: 18,000
📌 Critical Lapses Identified:
The concerning part about this list, is, an organisation like FIIG to be exposed that long, nearly 5 years and have these absolutely basic items either not in place or configured in appropriately. Just to add to the scenario, the average price for 1 breached record on the Internet and Dark Web can be up to $200 USD. Having 18,000 clients affected and each one containing multiple records, you do the math. A very costly exercise. The threat actors see the value of this information very different from the organisation.
FIIG’s failure wasn’t due to a lack of available security solutions.
Yet, they ignored all of these or these things were overlooked. But by who?
This raises a critical question: If security solutions are widely available, why do companies still fail at security?
The answer lies in human behaviour and psychology, not technology. There have been some alarming statistics that say that humans are about 85% of the problem. This is very incorrect. They are 100% of the problem. Humans design bad process, and it translates to weak technology. Not the other way around.
Security isn’t about having tools — it’s about using them effectively. But cognitive biases and behavioural resistance prevent organisations from doing so.
These biases have led to some of the biggest security failures:
📌 Uber (2022) — MFA Fatigue Attack
📌 Twitter (2020) — Social Engineering Takeover
📌 Deepfake CEO Fraud (2021)
Companies are obsessed with tools because they provide an illusion of safety. But tools don’t solve the underlying problem — security culture and behaviour. An this is not just solved with the current cliche of security awareness training and phishing testing. There is a wider issue.
Many organisations still rely on outdated security advice, believing that having antivirus, patching systems, and deploying a SIEM will keep them safe. However, antivirus solutions are largely ineffective against modern threats like zero-day exploits and social engineering attacks, which bypass traditional detection methods. Patching systems, while essential, is only effective if done correctly and in a timely manner — yet many companies either delay updates or fail to test them properly, leaving vulnerabilities open for exploitation. SIEMs, often seen as a silver bullet, generate an overwhelming number of alerts, but without the right expertise to interpret and respond to them, they become little more than expensive noise. Security isn’t about simply having these tools — it’s about understanding how to use them effectively and integrating them into a proactive security strategy. And a large number of IT service providers we speak with, do say they are over worked and without bandwidth.
None of these will protect an organisation if the people behind them are disengaged and/or overworked without the bandwidth to adequately manage these tools.
Organisations that truly secure themselves don’t just buy tools — they think differently about security.
Organisations don’t fail because they lack antivirus, patching, or SIEMs. They fail because:
❌ They overestimate their security posture.
❌ They don’t take cybersecurity seriously until an incident happens.
❌ They fail to prioritise security culture over security products.
Ask yourself:
✅ Are my employees trained to recognise deception?
✅ Do my executives prioritise security as a business issue?
✅ Would my organisation respond effectively to a breach tomorrow?
If the answer is no to any of these, then no amount of security tools will save you.
At Shimazaki Sentinel, we don’t sell the illusion of security — we build real resilience.
Let’s move beyond security theatre and start securing your business for real.
Australian Securities and Investments Commission (ASIC), 2025. ASIC sues FIIG Securities for systemic and prolonged cybersecurity failures. [online] Available at: https://asic.gov.au/about-asic/news-centre/find-a-media-release/2025-releases/25-035mr-asic-sues-fiig-securities-for-systemic-and-prolonged-cybersecurity-failures/ [Accessed 13 March 2025].