top of page

Search Results

103 items found for ""

  • Rate Rise Should Spur Rethink | GSA

    < News Rate Rise Should Spur Rethink 13 Nov 2023 Following the Reserve Bank’s decision to further hike interest rates, it’s timely for business leaders to explore how they can minimise any negative impacts on their companies. Rowan Tracey, Partner at HLB Mann Judd , Australian businesses would need to “find efficiencies and cut operating costs”. “The Reserve Bank’s decision … will impact business margins, particularly small to medium businesses with high debt and low capital. The natural reflex for businesses is to raise prices to even out the balance sheet, which would be fine in a more buoyant economy. (But) rising fuel prices and cost of living already has many scrambling to find ways of cutting costs, including their current expenditure.” Rowan offers these alternative suggestions to businesses wanting to maintain margins without imposing price hikes: 1. Improve Productivity & Efficiency: Review processes and output and look at ways to improve or streamline your operations, such as automation of processes including business software. 2. Strategically Cut Costs: Review your current service providers and contracts and compare to the current market. 3. Revisit Your Banking & Financial Products: Look beyond the short-term and make sure the interest rate on your business loans is competitive. 4. Develop a Pricing Strategy : Look at ways to leverage or bundle existing goods and services. 5. Reconsider Your Supply Chain : Consider reducing risks by finding a domestic supplier to slash the costs of freight and storage. 6. Review Workforce Arrangements: Consider offering flexible work arrangements, nine-day fortnights, and training and development opportunities - particularly those subsidised by government. One way to address Item #1 (“Improve Productivity and Efficiency”) is to reconsider how your business transfers data. Moving data – between employees, with customers, and with your supply chain partners – is now a “core process” for every modern business. That makes it a target for improving efficiency and productivity. A Managed File Transfer solution, such as GoAnywhere MFT, is more cost-effective and efficient than having your staff waste time on old-fashioned and risky manual approaches. In fact, a study by Aberdeen Group found that businesses which invested a little in a professional Managed File Transfer solution had a median return of almost 500 times their investment! Generic Systems Australia are your local experts in file transfer technologies. Contact me if you’d like an obligation-free discussion , no cost trial, or Proof of Concept showing how GoAnywhere could boost your business’s productivity. Previous Next

  • Best Practices for Cloud MFT | GSA

    < News Best Practices for Cloud MFT 30 Jan 2024 Best Practices for Cloud Managed File Transfer Data is the lifeblood of modern business. And most modern organisations rely to some extent on the Cloud as they transfer files between employees, trading partners, and customers. To help you guard against cybercrime, here are best practices for safeguarding your data on its way to, from and in, the Cloud. Some Clouds are Better than Others Cloud computing comes in three basic flavours… Public, Private, and Hybrid. Each offers differing degrees of security and risk. Of the three, a Self-Hosted Private Cloud solution offers considerable advantages through enhanced levels of control and protection. It: Is ring-fenced inside your organisation’s security perimeter, enjoying the same protections and security posture as the rest of your IT environment. Can be integrated into your network with AWS VPN / Azure Express route links. Has access to your internal systems through appropriate firewall controls to better suit interfacing requirements (aka “lateral movement of data”). Ensures internal file and data transfers never leave your secure local network. Public and Hybrid Clouds Permitting your precious data to go “off-prem” inherently increases the risk it may be intercepted or accessed by cybercriminals. However, leading MFT solutions - in combination with a trustworthy Cloud provider, appropriately configured - can mitigate these risks, and provide MFT-as-a-service. Choosing with the Best Cloud Provider Cloud providers come in all sizes, capabilities … and risk profiles. Ensure your Cloud provider uses robust security protocols and safeguards. Do they utilise the latest encryption protocols, and offer strong user authorisation and access controls? Do their data transmission and storage approaches meet the regulatory requirements for your industry? What performance levels does your Cloud provider commit to? Can they quickly and reliably receive, store and transmit your business-essential files? Can your Cloud provider easily integrate with your existing systems? Can your Cloud provider offer an appropriate level of technical support when you need it? At Generic Systems Australia , we would be happy to share with you our significant experience with and expert perspective on locally-available Cloud providers, detailing and how well they meet the requirements for safe, efficient and effective MFT. Meet Industry Compliance Requirements Some industries are subject to heightened regulatory requirements regarding data storage and transfer. Even when using an “off-prem” Cloud provider, you remain responsible for meeting those requirements. Failing to utilise an appropriately compliant Cloud environment can lead to fines, law suits, loss of customers, loss of supplier trust, and reputational damage. Maintain Control and Data Sovereignty Governments increasingly require organisations to maintain authority and control of data within their jurisdictional boundaries – aka, “data sovereignty”. Private and Hybrid Cloud environments provide inherently greater authority over where data is stored, access permissions, and retention policies. In this way, they enable organisations to better navigate myriad data sovereignty mandates and evolving compliance standards. Utilising Managed File Transfer as a Service (MFTaaS) MFTaaS is an approach which can help organisations streamline their file transfer processes, while offering robust security, scalability, reliability, anywhere access and cost-effectiveness. However, be sure to confirm your MFTaaS solution offers robust encryption and security protocols, can scale grow with your organisation's needs, and complies with the industry regulations relevant to your business. Technical Best Practices for Cloud File Transfers Ensure secure and efficient transmission of data in a Cloud environment by observing these technical requirements: Data Encryption at Rest and in Transit: Utilise encryption protocols like SSL/TLS for data in transit and encryption solutions provided by your Cloud provider for data at rest. In private Cloud settings, you can also leverage approaches like Bring Your Own Key (BYOK) or Hold Your Own Key (HYOK). Data Loss Prevention (DLP): A robust DLP solution helps prevent unauthorised data transfers and leakage by monitoring data in real-time and preventing it from being transmitted outside of your organisation. Intrusion Detection Systems (IDS): By monitoring and alerting IT security teams to any suspicious file transfer behaviour, IDS helps nip security breaches in the bud. Employee Best Practices Having your team follow best practices is also essential to secure data transfer and storage. Staff Training: Teach your employees to recognise data security risks, and how to avoid them. Place special focus on phishing and social engineering – two of the most prevalent cybercriminal threats. Multi-Factor Authentication (MFA): Enforce MFA for file transfers, and utilise phishing-resistant techniques. Access Control: Restrict access to files and systems, and provide users with only the minimum level of access necessary to perform their role. Implement a regular cycle of access permission reviews. Audit, Backup and Recovery Best Practices Continuous monitoring and auditing of Cloud file transfers not only maintains the security of your data, it also helps identify and mitigate potential threats, while monitoring on-going compliance. Log Analysis and Security Information and Event Management (SIEM) proactively monitor transfers, and enable your IT team to react quickly to emerging threats and incidents. Data backup and disaster recovery are the final critical components of your comprehensive safeguards against data loss in Cloud file transfers. They ensure that, if a disaster occurs, your organisation can provide business continuity by maintaining the availability and integrity of data. Making the Cloud Safe for File Transfers By following these best practices, the Cloud can be an efficient, reliable and secure element within your organisation’s overall data transfer approach. At Generic Systems Australia , we use and recommend the class-leading (link) managed file transfer solution, GoAnywhere MFT , for the way it integrates with the Cloud and embeds best practices. Providing peace of mind, by securing sensitive files in transit and at rest, GoAnywhere automates and encrypts data between an organisation and its trading partners, protecting it from unnecessary vulnerabilities while improving efficiency and reducing costs. If you’d like to learn more about GoAnywhere MFT , check out our resources at Generic Systems Australia. Our Business Manager, Bradley Copson ( bradley@gensys.com.au )would also be happy to offer you an obligation-free discussion , a no cost trial, or even a Proof of Concept for your business. Simon Keunstner, Senior Technical Consultant, Generic Systems Australia “Local Experts in Secure Managed File Transfer” Previous Next

  • Black 'Fileday' | GSA

    < News Black 'Fileday' 29 Nov 2023 Australian shoppers were tipped to spend $6.36B across the Black Friday weekend, according to the Australian Retailers Association.The surge in sales has in turn created a tsunami of data transfers, as businesses share orders, files and information with their supply chains.For some businesses, it will be a stressful period. But others - those who entrust their file transfers to GoAnywhere MFT - will surf the data tsunami with ease, as GoAnywhere conveys all their valuable files reliably and securely.(And of course, our local technical team at Generic Systems Australia will always be on hand to share our unparalleled MFT expertise with our customers.) Previous Next

  • Survey finds IT leaders increasingly focussed on PROACTIVE cybersecurity | GSA

    < News Survey finds IT leaders increasingly focussed on PROACTIVE cybersecurity 12 June 2024 Australian IT leaders are increasingly focusing on proactive cybersecurity, according to a new survey released today. In a survey conducted by Tenable, IT leaders said that, while the ability to respond to and recover from cyber incidents remained essential, they are now focusing more on preventing such incidents altogether. Preventative measures they are investing in include: access controls and monitoring (64%) regular software updates and patch management (64%), and regular employee training and education on cybersecurity best practices (60%). Dark Tide Rising The most recent Australian Signals Directorate Report shows that cybercrime is on the increase for enterprises. On average, a new report is received every six minutes, up 23% year on year. The average cost of cybercrime has also increased by up to 14%. Saving Ransoms, Reputations, Operating Costs Adopting preventative cybersecurity measures isn’t only saving companies from the costs of cybercrime. Companies who take proactive steps say they are also benefiting from lower cyber insurance premiums. 44% of IT leaders experienced reductions ranging from 5% to 15%. Reductions of that magnitude demonstrate that insurers too are recognising the effectiveness of proactive cybersecurity. Proactive, Layered Defence A proactive strategy for storing, transferring and securing data is essential for keeping cyberthieves at bay. A layered approach - secure file transfer, secure content engines, secure digital rights management, and employee education – is the optimal way to prevent data breaches. At Generic Systems Australia , we recommend the class-leading secure managed file transfer solution, GoAnywhere MFT , to keep data safe - at rest, and in transit. Coupled with our Advanced Threat Protection Bundle , we enable organisations to safely collaborate without exposing systems to the risks of malware gaining a foothold within their IT systems. About The Survey Tenable partnered with Pure Profile to collect data from more than 200 IT and cybersecurity leaders across the insurance, banking, education, healthcare and transport industries in Australia. If you’d like to join the growing number of IT managers taking strong preventative measures to avoid cybercrime, please get in touch with me, Bradley Copson ( mail to :bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. Previous Next

  • New Cyber Laws Impose New Business Obligations | GSA

    < News New Cyber Laws Impose New Business Obligations 16 Oct 2024 Australia’s federal government last week introduced much-anticipated legislation to parliament which will revolutionise Australia’s cyber security preparedness. If passed as expected, the new laws will impose new compliance and reporting requirements on local businesses. Govt Intent Designed to protect businesses and consumers from the growing scourge of cyber crime, the Cyber Security Act 2024 is Australia’s first standalone cyber security legislation. Introducing the Act, Minister for Cyber Security, Tony Burke, said that – like IT systems themselves - legislation needed to be hardened to protect national security and economic stability. He described the package as providing a clear legislative framework for contemporary, whole-of-economy issues which would identify and respond to new and emerging cyber threats. Seven Initiatives There are seven initiatives under the 2023-2030 Australian Cyber Security Strategy which collectively address gaps in current legislation to: Mandate minimum cyber security standards for smart devices; Introduce mandatory ransomware reporting for certain businesses to report ransom payments; Introduce a ‘limited use’ obligation for the National Cyber Security Coordinator and the Australian Signals Directorate; and Establish a Cyber Incident Review Board. SOCI Reforms The legislation will also progress and implement reforms under the Security of Critical Infrastructure Act 2018 (SOCI Act): Clarifying existing obligations in relation to systems holding business critical data; Simplifying information sharing across industry and Government; Introducing Government powers to direct entities to address serious deficiencies within their risk management programs; and Moving regulation for the security of telecommunications into the SOCI Act. The SOCI Act reforms will also expand current Government assistance measures to ensure Government can step in as a last resort to manage the consequences of significant incidents. Govt Empowered Changes to government assistance measures will empower the Government to gather information or direct entities to take or refrain from certain actions, on authorisation from the Minister for Home Affairs, in response to a serious incident. Characterising the legislation as a significant step towards his government’s vision of becoming a world leader in cyber security by 2030, Tony Burke said: “We know government has to lead the way on cyber, but we also know we can’t do it alone. This is why these new laws have been consulted extensively with business. “To achieve Australia’s vision of being a world leader in cyber security by 2030, we need the unified effort of government, industry and the community.” New Business Obligations Legal firm A&O Shearman cautioned that the new Cyber Bill will introduce several new critical areas of compliance and reporting. It said businesses must take heed of these new obligations, and ensure they put in place robust cyber security measures. • Ransomware Reporting Obligations : Entities impacted by cyber security incidents and making ransomware payments must report these payments within 72 hours. The aim of this obligation is to improve the detection and response to ransomware incidents, thereby reducing their impact. Failure to report can result in civil penalties. • Security Standards for Smart Devices : The Cyber Bill mandates that manufacturers and suppliers of smart devices comply with specified security standards. This is crucial for businesses involved in the production or distribution of smart devices. Non-compliance can result in compliance notices, stop notices, and recall notices. These measures are designed to ensure that smart devices are secure and do not pose a risk to users. • Protected or Limited Use of Incident Information : The Cyber Bill includes provisions to ensure that information provided about cyber security incidents is used or disclosed only for permitted purposes, with strict limitations on using this information for civil or regulatory actions against the reporting entity. • Cyber Incident Review Board : The Cyber Bill establishes a Cyber Incident Review Board tasked with reviewing certain cyber security incidents and making recommendations. The Board has the authority to request and require documents from entities. Non-compliance may result in civil penalties. A&O Shearman said organisations should make sure they implement security standards in compliance with the specified security measures currently provided for in the Cyber Bill, and make sure they can comply with the ransomware reporting obligations, including the timelines foreseen in the Cyber Bill. Meeting New Requirements Criminal syndicates target organisations which haven’t adequately protected their data transfers and systems access. Defending against them requires a multi-layered strategy which includes robust data transfer protection, multifactor authentication and employee training. Managed File Transfer (MFT) solutions such as the class-leading GoAnywhere MFT encrypt data at rest and in transit, complying with the highest data security standards - including the US’s and Europe’s stringent HIPAA, HITECH, PCI DSS, SOX, and GDPR. MFT manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols such as SFTP, FTPS, and AS2 to send files securely, and encryption standards such as Open PGP and AES to protect data in transit and at rest. GoAnywhere MFT also provides audit reports, which will help organisations meet new reporting and compliance needs. All file transfer and administrator activity is stored and easily searchable. To help organisations report on file transfer activity and remain compliant with the new legislation, these audit logs can be automatically generated and provided as PDFs. Advanced Threat Protection and Adaptive Loss Prevention add a further layer of defence. SFT Threat Protection enables safe collaboration with external parties, preventing malware from entering an organisation, and reducing the risk of employees losing or mishandling sensitive data. Local Expertise on Hand Generic Systems Australia are your local experts in Managed File Transfer solutions. We’ve assisted dozens of organisations across the Asia-Pacific region to secure their data and keep cybercriminals at bay. If you’d like to discuss improving your cybersecurity, please feel welcome to contact me , Bradley Copson. I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. Previous Next

  • Aussie cyber staff “world’s most stressed”: survey | GSA

    < News Aussie cyber staff “world’s most stressed”: survey 9 Oct 2024 Aussie cyber security workers are the world’s most stressed, according to a survey by international tech professional association ISACA. For its State of Cybersecurity 2024 report, ISACA surveyed 1,868 cyber security professionals from 102 countries, including Australia. They found that Australian cyber security workers are feeling more stressed in their jobs than their counterparts in any other country. Overly Complex, Under Resourced Respondents attributed the rising stress to Australia’s “increasingly complex threat landscape” and “continual under-resourcing” of their cyber security departments and roles. They reported lower budgets, higher hiring and retention challenges, and a more significant lack of prioritisation of cyber security risks than their global peers. Nearly half of all respondents believed their company’s cyber security budget was inadequate, and only a third expected it to be increased in the year ahead. As a result, most said they didn’t feel ready to combat the growing risk of a cyber-attack on their organisation. Burnout In a further worrying sign for Australian businesses, many cyber security professionals said the stress of their role had become so significant that they were considering moving on from their current organisation. Of those who had already left, 60% cited “stress” as the primary reason. ISACA’s Director of Professional Practices and Innovation, Jon Brandt, urged Australian employers to better mitigate the stress of their cyber defenders. “Employers (should) explore ways to support staff before burnout and attrition occur,” he said. ISACA said the increasing complexity of cyber attacks required additional effort, energy and intelligence from cyber professionals. It characterised the need to stay ahead of new technologies and digital weapons as “all-consuming”, and this explained why cyber pros in Australia were feeling the effects of increased stress in their roles. Most Australian respondents said they expected a cyber attack on their organisation during the next year. However, only 32% had a high degree of confidence in their team’s ability to detect and respond to the attack. Cyber Stress Relief Companies can take some of the load off their beleaguered cyber security staff by adopting automated, proactive and layered cyber defences. The goal is an always-on system which automatically secures, stores and transfers data, repelling cyberthieves before they gain access to company systems. The foundation of such an approach is a technology called “Managed File Transfer” (MFT). Paired with secure content engines and secure digital rights management, MFT is an optimal way to prevent data theft and cyber breaches. An MFT solution such as the class-leading GoAnywhere MFT keeps your organisation’s valuable data safe - at rest, and in transit. Coupled with an Advanced Threat Protection Bundle, it enables organisations to safely collaborate without exposing their systems or team to the risks of malware. This automated defence system protects your organisation’s data in three key ways: 1. It prevents files containing malware from being received, by scanning all inbound files and automatically stripping out embedded malware, triggered executables, scripts, or macros. 2. It blocks sensitive data from being shared, by inspecting file contents and stopping protected data from being shared, based on policies you define. 3. It redacts sensitive information from files before they are transferred, detecting and/or removing geotags, document properties, email addresses, and other metadata from documents. Local Help Available As your company’s stressed cyber professionals are signalling, today’s interconnected business environment makes cyber attacks inevitable. However, foiling these attacks no longer requires draining manual cyber surveillance. At Generic Systems Australia , we’ve helped hundreds of business leaders and IT teams across the Asia-Pacific region rest easier, knowing that their valuable data is protected by the automated sentries of GoAnywhere with Advanced Threat Protection. We can do the same for you. It’s surprisingly affordable, and our Migration Services mean you can keep running your business without disruption as we you transition to a more secure approach. In fact, we’re so confident that the capabilities and business case for installing an MFT solution stack up that we’ll even offer you a zero-cost Proof of Concept. If you’d like to help take the load off your cyber security team, and explore how your organisation can automate its data transfer security, please feel welcome to contact me . I’m always happy to have an obligation-free discussion. At Generic Systems Australia , we’re your local experts in Secure Managed File Transfer. Previous Next

  • Cybersecurity Insiders Reveal Their Top Fears | GSA

    < News Cybersecurity Insiders Reveal Their Top Fears 29 May 2024 A survey by Fortra has revealed cybersecurity insiders’ top concerns for the remainder of 2024. Top Concern: Phishing and Smishing (81%) Phishing is tricking individuals into clicking on malicious links in emails or on the web to steal logins, passwords, or personal information. Smishing is a text-based version of phishing, with scammers posing as trusted companies to get individuals to reveal sensitive or personal information such as credit card numbers or passwords. Concern 2: Ransomware and Malware (76%) Ransomware is software designed to hold information hostage until a payoff is made. Malware is intrusive software hackers use to steal data or to damage computer systems. Concern 3: Accidental Data Loss or Leakage (63%) Concern 4: Social Engineering (55%) Social Engineering is the tactic of manipulating, influencing, or deceiving a victim to gain control over a computer system, or to steal personal and financial information. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information. Concern 5: Third-party exposure (52%) Industry insiders are also increasingly concerned about cybercriminals leveraging Artificial Intelligence to bolster their efforts. Proactive, Layered Defences Organisations with a proactive strategy for storing, transferring and securing their data are best-placed to keep cyberthieves at bay. And those which take a layered approach - secure file transfer, secure content engines, secure digital rights management, and employee education – are leading the way in preventing data breaches. At Generic Systems Australia, we recommend the class-leading secure managed file transfer solution, GoAnywhere MFT, to help organisations tackle the risks that can come with exchanging data. When coupled with our Threat Protection bundle, organisations can more safely collaborate without exposing systems to the risks of malware even entering your organisation in the first place. Here’s how SFT Threat Protection helps mitigate risks: Stops malware from entering your environment by scanning all inbound file transfers: GoAnywhere’s anti-virus protection delivered through the Secure ICAP Gateway is unique in its ability to deny the file ever being written to disk if it contains malware. Blocks files with sensitive data from being shared: Files containing PII (personally identifiable information) or other sensitive data identified by the organisation’s policies are prevented from being transferred. Redacts sensitive data from being shared: Embedded malware, triggered executables, or macros that could hold sensitive data hostage are detected and automatically stripped out of content to be shared via MFT. Content “sanitised” in this way is then permitted to be transferred so that business continues uninterrupted. On-Prem, in the Cloud… and in Between 64% of cybersecurity insiders surveyed said that hybrid cloud was their preferred IT operating environment. A combination of an on-premises/private data centre, and public cloud service provider, is seen by many to provide the best of both worlds. Utilising this approach, the most sensitive data can be maintained inside the organisation. In fact, some organizations are bound by compliance requirements to maintain an on-premises footprint to some degree. Unfortunately, not all cloud-first developed solutions can deftly manage the interface between on-premises and cloud transfers. A comprehensive secure file transfer solution, GoAnywhere MFT is deployment-flexible, executing the on-premises/cloud interface seamlessly. It maintains security and control of data transfers between organisations and their trading partners. --- If you’d like to discuss how a secure Managed File Transfer solution can help you keep the cybercriminals at bay, please feel welcome to contact our Business Manager, Bradley Copson ( mail to: bradley@gensys.com.au ). He's always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. At Generic Systems Australia, we’re your local experts in secure Managed File Transfer. Previous Next

  • Secure Your Email with these 6 Steps | GSA

    < News Secure Your Email with these 6 Steps 16 Apr 2024 Secure Your Email in 6 Steps Email continues to be the world’s most frequently-used tool for collaboration. In fact, research group Radicati predict 376 billion emails will be sent by 4.5 billion users by the end of next year. Email’s enduring popularity makes it a prime target for cyber criminals. Phishing attacks, spam, and viruses, as well as compromised business emails being used as a gateway to other forms of data loss, can turn email from a collaboration tool into a weapon used against you. Balancing risk vs restraint With so much at stake, IT teams need to carefully balance the minimisation of email risks against the potential for placing draconian restraints on their organisation’s ability to efficiently conduct business. Secure Email Gateways –– such as the Clearswift Secure Email Gateway –– help organisations achieve the right balance for them, enforcing protective email policies without overburdening IT departments, email administrators and messaging teams. Handle with Care Email attachments continue to be a particular risk, and so, managing their transmission warrants particular care. A secure alternative to emailing files, such as the Secure Mail module in GoAnywhere MFT, enables employees to easily send files to other individuals via a secure link with a specific expiry date. Because it is much more secure than traditional email, Secure Mail doesn’t limit the size or types of files being transmitted –– a drawback of many email clients such as Outlook and Gmail. 6 Steps to Secure Email From our many years of helping organisations protect their valuable data, we recommend IT teams define robust email security policies and determine what’s required from their email security defence, by following these six easy steps: 1. Define which data needs to be protected 2. Be clear about the dangers 3. Establish a robust and sustainable email security policy 4. Close the zero-day window 5. Encrypt sensitive data 6. Monitor behaviour and performance --- If you’d like to discuss how your organisation’s email can be made more secure –– without impeding your team’s efficiency ––p lease feel free to contact me , Bradley Copson (mail to: bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, explain how we can transition you from your existing approaches hassle-free, and offer you a zero-cost Proof of Concept. Generic Systems Australia Your Local Experts in Secure Managed File Transfer #MFT #managedfiletransfer #securefiletransfer #sft #cybersecurity #datatransfer Previous Next

  • Stop playing Cyber Security Whack-a-Mole! | GSA

    < News Stop playing Cyber Security Whack-a-Mole! 27 Aug 2024 The increasing number and sophistication of cyber incursion attempts is stretching corporate IT departments to their limits. No sooner is one attempt identified and blocked, but another pops up. Georgia in Accounts just clicked on a bogus link in a phishing email. Rowan in Marketing is about to send a spreadsheet containing sensitive customer information to a direct marketing agency. Arush from Sales doesn’t realise the bank account details he’s emailing to HR are about to be intercepted in a “man-in-the-middle” attack. The CEO’s personal assistant, Grace, doesn’t realise she’s corresponding with an AI bot designed to cleverly gather identity information about her boss. It’s relentless - a new cyber attack every six minutes! 1 High Stakes The escalating frequency of incursions means a company’s stressed-out IT team must stay vigilant. In this high-stakes game of cyber security Whack-a-Mole, the cost of failure is simply too high: the cost of cybercrime to businesses has increased by 14% year-on-year1. share markets punish companies which fail to safeguard their data2. class actions – by those whose personal data was stolen, and shareholders seeking compensation for share devaluations – ensue3. damaged customer trust stymies revenue and market share growth4. cyber insurance premiums skyrocket5. Ditch that Rubber Mallet Wouldn’t it be great if there was a way your team could opt out of the never-ending game of cyber security Whack-a-Mole…? A way to automate your organisation’s cyber defences, assigning cyber sentries to detect and block cyberthieves, whenever and wherever they pop up? Good news – there is! And it’s surprisingly affordable and effective. A proactive and layered strategy for storing, transferring and securing data is essential for keeping cyberthieves at bay. The foundation of that approach is a technology called “Managed File Transfer”. Paired with secure content engines and secure digital rights management, Managed File Transfer (MFT) is the optimal way to prevent data theft and cyber breaches. An MFT solution such as the class-leading GoAnywhere MFT keeps your organisation’s valuable data safe - at rest, and in transit. Coupled with an Advanced Threat Protection Bundle , it enables organisations to safely collaborate without exposing their systems or team to the risks of malware. This automated defence system protects your data in three important ways: 1. Prevents files containing malware from being shared. GoAnywhere with Advanced Threat Protection scans all inbound file transfers. It can also detect and automatically strip out active content like embedded malware, triggered executables, scripts, or macros used to extract or hold sensitive data hostage. This “sanitisation” of files and emails doesn’t delay delivery, even as it guards against today's leading malware and ransomware (e.g. CryptoLocker, CryptoWall, TorrentLocker, Dridex Dyre, BlackEnergy, etc.) and tomorrow's even more sophisticated threat variants. 2. Blocks sensitive data from being shared. Files with Personal Identifiable Information or other sensitive data can be prevented from being transferred. GoAnywhere with Advanced Threat Protection can inspect file contents, and then stop and block files from being shared, based on policies you define. 3. Redacts sensitive information from files before transfer. GoAnywhere with Advanced Threat Protection can ensure sensitive data is neither transmitted nor received, detecting and/or removing geotags, document properties, email addresses, and other metadata from documents, and replacing sensitive text with asterisks. Using Optical Character Recognition, it can even remove text contained in scanned images. “The only winning move is not to play” 6. In today’s interconnected business environment, ever-increasing cyber attacks are inevitable. However, foiling these attacks no longer requires your IT team to play a never-ending game of cyber security Whack-a-Mole. At Generic Systems Australia , we’ve helped hundreds of business leaders and IT teams across the Asia-Pacific region rest easy, knowing that their valuable data is protected by the automated sentries of GoAnywhere with Advanced Threat Protection. We can do the same for you. It’s surprisingly affordable, and our Migration Services mean you can keep running your business without disruption as we you transition to a more secure approach. In fact, we’re so confident in the capabilities and business case for our MFT solutions that we’re prepared to offer you a zero-cost Proof of Concept. If you’d like to take me up on this offer, or perhaps just discuss how your organisation’s file transfers can be made more efficient and secure, please feel welcome to contact me , Bradley Copson. I’m always happy to have an obligation-free discussion. At Generic Systems Australia , we’re your local experts in Secure Managed File Transfer. Sources: 1. Australian Signals Directorate Cyber Threat Report 2023 2. For example, Medibank Private’s share price plunged more than 20% in the weeks following its loss of the personal information of 9.7m Australians. 3. For example, Medibank Private is facing class actions by both shareholders and consumers alleging “breaches of the company’s duty of care to protect consumer information, manage risks and make timely disclosures to shareholders”. Optus Communications is also subject to a class action alleging “Optus failed to protect, or take reasonable steps to protect, the personal information of its current and former customers”. 4. For example, Optus Communications saw its customer growth halved in the quarter following its systems being breached. 5. Australian Financial Review 12 September 2022: “Cyber insurance premiums soar 80pc as claims surge”. 6. A quote from the 1983 John Badham film, “WarGames”. Previous Next

  • Migrating from MOVEit | GSA

    < News Migrating from MOVEit 8 July 2024 The rapid escalation of cybercrime is causing many organisations across the Asia-Pacific region to upgrade to more advanced file transfer solutions. That includes replacing Managed File Transfer (MFT) systems such as MOVEit with the class-leading GoAnywhere MFT suite. As our region’s local experts in MFT, at Generic Systems Australia we’re adept at helping customers simply, quickly and affordably migrate from their existing data transfer approaches. Many Options - but only one of them “Best” There are plenty of options when it comes to selecting a file transfer solution… from free, unsecure methods to the fully-featured market leader. However, as cybercrime continues to surge, many companies are concluding that the benefits of upgrading to the class-leading MFT more than justify the relatively minor investment required. They understand that maintaining a ‘circle of trust’ with their customers and supply chains is paramount to their business’s ongoing profitability. So, why is GoAnywhere MFT consistently declared by independent studies to be the leading MFT …? Superior Security “Robust Security” is most often the top of mind consideration for companies seeking the optimal MFT solution. GoAnywhere MFT takes all aspects of data security seriously, protecting your sensitive data both “in motion” and “at rest”. Maintaining GoAnywhere’s security is a primary focus for its software development team. They consistently stay across the latest security standards and threat monitoring to ensure up-to-date compliance with regulations, frameworks, and standards. Easy Centralised Control MOVEit requires you to install two products (MOVEit Automation and MOVEit Transfer) to enable full MFT functionality. Most companies find GoAnywhere’s centralised, browser-based dashboard - an intuitive “one stop shop” - a more efficient means of managing their data flows. The Need for Speed Included in GoAnywhere is GoFast, a file transfer acceleration protocol which can transmit data considerably faster than traditional FTP. The patented technology in GoFast takes the best of UDP’s speed and adds reliability and rate control. Drag & Drop Workflows Scripting (as required by MOVEit for some tasks) is clunky, time consuming and confusing for non-expert users. Through its breadth of Automated Workflows capabilities, GoAnywhere enables end users to quickly and easily build workflows. Manual and automated tasks can even be combined into one master workflow. Further, GoAnywhere provides easy reporting on partner Service Level Agreements, alerting you to any workflow issues before your trading partners do. Advanced Auditability GoAnywhere not only moves and shares data securely, it also provides full auditability of transfers. Logging full audit trails of all user events and file activity, it can also generate reports of file transfer activity, user statistics, and completed jobs – all from within its central management console. Modular, Multi-Platform Flexibility Organisations managing multiple operating systems appreciate how GoAnywhere flexibly supports any protocol, any platform, and any deployment, including Microsoft Azure, AWS, Linux, and more. Further, GoAnywhere’s capabilities can be significantly extended through the availability of a broad array of licensable modules , satisfying a wide variety of specialised file transfer needs. And More… Beyond the advantages above, former MOVEit users are often delighted to discover GoAnywhere’s advanced capabilities in: High availability and clustering, providing true active-active support and load balancing to distribute workloads across multiple systems; Remote agents - lightweight applications managed through the GoAnywhere interface which enable configuring and scheduling of file transfers throughout an enterprise; and Secure Forms - customised forms or files that which contain data other tasks can automatically process. If you’d like to discuss how your organisation can migrate to the leading MFT solution, please feel welcome to contact me, Bradley Copson ( mailto:bradley@gensys.com.au ) . I’m always happy to have an obligation-free discussion, explain how simple the transition can be, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. Previous Next

bottom of page