How to address inefficiencies of using multiple cybersecurity systems