Search Results
172 results found with an empty search
- Cybersecurity Insiders Reveal Their Top Fears | GSA
< News Cybersecurity Insiders Reveal Their Top Fears 29 May 2024 A survey by Fortra has revealed cybersecurity insiders’ top concerns for the remainder of 2024. Top Concern: Phishing and Smishing (81%) Phishing is tricking individuals into clicking on malicious links in emails or on the web to steal logins, passwords, or personal information. Smishing is a text-based version of phishing, with scammers posing as trusted companies to get individuals to reveal sensitive or personal information such as credit card numbers or passwords. Concern 2: Ransomware and Malware (76%) Ransomware is software designed to hold information hostage until a payoff is made. Malware is intrusive software hackers use to steal data or to damage computer systems. Concern 3: Accidental Data Loss or Leakage (63%) Concern 4: Social Engineering (55%) Social Engineering is the tactic of manipulating, influencing, or deceiving a victim to gain control over a computer system, or to steal personal and financial information. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information. Concern 5: Third-party exposure (52%) Industry insiders are also increasingly concerned about cybercriminals leveraging Artificial Intelligence to bolster their efforts. Proactive, Layered Defences Organisations with a proactive strategy for storing, transferring and securing their data are best-placed to keep cyberthieves at bay. And those which take a layered approach - secure file transfer, secure content engines, secure digital rights management, and employee education – are leading the way in preventing data breaches. At Generic Systems Australia, we recommend the class-leading secure managed file transfer solution, GoAnywhere MFT, to help organisations tackle the risks that can come with exchanging data. When coupled with our Threat Protection bundle, organisations can more safely collaborate without exposing systems to the risks of malware even entering your organisation in the first place. Here’s how SFT Threat Protection helps mitigate risks: Stops malware from entering your environment by scanning all inbound file transfers: GoAnywhere’s anti-virus protection delivered through the Secure ICAP Gateway is unique in its ability to deny the file ever being written to disk if it contains malware. Blocks files with sensitive data from being shared: Files containing PII (personally identifiable information) or other sensitive data identified by the organisation’s policies are prevented from being transferred. Redacts sensitive data from being shared: Embedded malware, triggered executables, or macros that could hold sensitive data hostage are detected and automatically stripped out of content to be shared via MFT. Content “sanitised” in this way is then permitted to be transferred so that business continues uninterrupted. On-Prem, in the Cloud… and in Between 64% of cybersecurity insiders surveyed said that hybrid cloud was their preferred IT operating environment. A combination of an on-premises/private data centre, and public cloud service provider, is seen by many to provide the best of both worlds. Utilising this approach, the most sensitive data can be maintained inside the organisation. In fact, some organizations are bound by compliance requirements to maintain an on-premises footprint to some degree. Unfortunately, not all cloud-first developed solutions can deftly manage the interface between on-premises and cloud transfers. A comprehensive secure file transfer solution, GoAnywhere MFT is deployment-flexible, executing the on-premises/cloud interface seamlessly. It maintains security and control of data transfers between organisations and their trading partners. --- If you’d like to discuss how a secure Managed File Transfer solution can help you keep the cybercriminals at bay, please feel welcome to contact our Business Manager, Bradley Copson ( mail to: bradley@gensys.com.au ). He's always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. At Generic Systems Australia, we’re your local experts in secure Managed File Transfer. Previous Next
- Sound Advice on Choosing a New MFT | GSA
< News Sound Advice on Choosing a New MFT 7 May 2024 Tech Wire Asia , an independent tech news website that covers enterprise and technology across the Asia-Pacific region, offers sound advice to help companies choose a new Managed File Transfer (MFT) solution. The Shadow of Clop Tech Wire Asia issued their advice in the wake of attacks last year by Clop, a notorious ransomware group, on the online file transfer tool MOVEit. PWC’s Australian unit, Prudential Assurance Malaysia Berhad and Prudential BSN Takaful Berhad in Malaysia were among APAC region victims of Clop’s attacks. While Tech Wire Asia said it did not “insinuate an everlasting vulnerability in MOVEit or imply that its usage should be permanently discontinued”, it noted that it had received “a wave of enquiries from current and prospective customers about the continued safety of using MOVEit” in the wake of the attack. In response, the website offered this advice for those wishing to move on from MOVEit . Crucial Considerations Tech Wire Asia said the crucial consideration in choosing the best file transfer software is finding an MFT solution that is simple, capable of encrypting sensitive data, can automate transfers, meets compliance regulations, and operates seamlessly across various platforms. It noted that there are many aspects and features to consider while choosing MFT software, including: Average daily file transfer volume; Regulatory obligations; Industry-specific needs; and Budget. Other vital features could include: Advanced auditing and tracking abilities; Clustering functionality; Cloud integrations; Capability to translate EDI files; and Availability of remote agents. The website recommended that selecting the appropriate MFT solution should be driven by a company’s specific requirements. GoAnywhere MFT highly-regarded In its review of contenders to replace MOVEit, Tech Wire Asia described GoAnywhere MFT as “a sophisticated enterprise solution for transfers and file management”, saying that the product “excels at securing file transfers across multiple platforms, protocols, and encryption standards”. The website noted that GoAnywhere is designed for SMEs and Enterprises, and is deployable on-premise, in the cloud, or hybrid environments, enabling secure data exchange between organisations, employees, customers, and trading partners. In the capacity of enterprise-secure file transfer software, GoAnywhere shields data, ensuring compliance with regulations and standards. Its integration prowess also extends to applications like Salesforce and SharePoint. Try Before You Buy In conclusion, Tech Wire Asia “highly recommended” that customers moving on from MOVEit take advantage of a free trial of new MFT software. Previous Next
- Resources | GSA
RESOURCES INDEX Independent Info-Tech MFT Quadrant Report (2025) For the 3rd consecutive year, respected tech analysts Info-Tech have evaluated the most popular MFT software and vendors, and found that GoAnywhere is the top MFT solution. To receive a complimentary copy of their 2025 report, simply submit your email address below and we'll email you back a PDF. Read More "MFT's Role in Business: IT Leaders Weigh In" eBook In this eBook, nine leading IT and security professionals share their real-world experiences of leveraging GoAnywhere's many capabilities in their businesses. Read More New Cyber Laws Passed - What Australian Businesses Need to Know and Do What Australian organisations need to know - and do - to meet their new obligations under the nation’s new Cyber Security legislation. Read More Use APIs to Accelerate Your MFT's ROI How to boost the ROI of your MFT solution - and scale its deployment - by pairing it with APIs. Enhance automation, integration, and customisation. Read More MFT Local Buyer's Guide Ask the right questions, and consider the key issues, to identify the right Managed File Transfer solution for your organisation. Read More Independent Info-Tech MFT Quadrant Report (2024) Once again, respected tech analysts Info-Tech have evaluated the most popular MFT software and vendors, and found that GoAnywhere is the top MFT solution. Here’s their 2024 independent report. Read More 2024 Cybersecurity Insiders Survey Fortra's "2024 State of Cybersecurity Survey" shares the invaluable insights of more than 400 cybersecurity professionals from across the globe, including many in Australia, New Zealand and the Asia-Pacific region. Read More Best Practices for Cloud MFT Most modern organisations rely to an extent on the Cloud as they transfer files between employees, trading partners, and customers. Here are best practices for safeguarding your data on its way to, from and in, the Cloud. Read More Meeting CDR Requirements Australia’s Consumer Data Right (CDR) requires businesses to carefully plan how they handle, store and disclose the consumer data they collect. This primer explains your obligations, the breaches that can occur, and a strategy to avoid them. Read More Secure Your Cloud Data with MFT How a robust Managed File Transfer (MFT) solution helps protect your data transfers – in transit and at rest – without compromising the convenience or cost-effectiveness of moving your business to a cloud-based environment. Read More Why Automating Encryption and Decryption Makes Good Cybersecurity Sense How does encryption and decryption work? This handy primer explains. Read More Think Like a Hacker To win the fight against cybercriminals, it helps to think like a hacker. Read More Annual Upgrade and Health Check Service Take the time, effort and risk out of ensuring your GoAnywhere environment is up to date and running smoothly! Read More GoAnywhere Product Datasheet GoAnywhere MFT is the world’s leading Managed File Transfer solution. This datasheet summarises its key technical features. Read More Advanced Threat Protection Product Datasheet GoAnywhere MFT is the world’s leading Managed File Transfer solution. This datasheet summarises its key technical features. Read More GoAnywhere Gateway Product Datasheet GoAnywhere Gateway provides an additional layer of security when exchanging data with your trading partners, enabling you to keep file sharing services and documents safely in your private/internal network. Read More GA Modules for Licencing Product Datasheet GoAnywhere is a robust and complete managed file transfer solution. Modules are available that can satisfy a wide array of file transfer requirements –– you can choose to license only the modules you currently need, and easily unlock additional modules if necessary. Read More Threat Brain Product Datasheet “Threat Brain” is a unique and innovative addition to GoAnywhere MFT which keeps the world’s leading Managed File Transfer solution a step ahead of cyber thieves and competing MFT solutions. Read More Compliance Product Datasheet Every organisation needs to meet stringent industry, state and federal data and privacy laws and regulations. GoAnywhere is the secure file transfer solution built to satisfy these demanding Compliance requirements. Read More 'An Introduction to GoAnywhere' (video) In this brief video, our Business Manager Bradley Copson overviews GoAnywhere's key features and benefits. Read More 'Secure MFT Threat Protection Bundle' (video) Our Secure MFT Threat Protection Bundle can automatically catch and kill email threats before they enter or leave your organisation. This brief video shows how. Read More Independent Info-Tech MFT Quadrant Report (2022) Respected tech analysts Info-Tech evaluated the most popular MFT software and vendors. Read More
- New Cyber Laws Passed – What Australian Businesses Need to Know and Do | GSA
< News New Cyber Laws Passed – What Australian Businesses Need to Know and Do 27 Nov 2024 Earlier this week, the Australian Parliament passed a suite of legislative reforms designed to enhance Australia’s cyber security. The reforms include a raft of new requirements and obligations on Australian businesses. About the Legislation Based on recommendations by the Parliamentary Joint Committee on Intelligence and Security, the new legislation addresses a number of proposals initially set out in Australia’s 2023 – 2030 Cyber Security Strategy, and spans three separate Acts: 1. the Cyber Security Act 2024 (Cyber Security Act); 2. the Intelligence Services and Other Legislation Amendment (Cyber Security) Act 2024 ; and 3. the Security of Critical Infrastructure and Other Legislation Amendment (Enhanced Response and Prevention) Act 2024 (SOCI Amendment Act). Mandatory reporting of ransom payments, and the introduction of a new voluntary information sharing regime, will have the most immediate impact on organisations. Mandatory Reporting of Ransomware Payments Ransomware attacks are rife across Australia. The Australian Signals Directorate (ASD) reported that this form of cyber extortion accounted for 11% of all cyber incidents to it in 2023-2024, up from 8% in the previous year. The Government had previously pursued a ban on ransom payments. However, its position has since moderated somewhat. The Cyber Security Act only requires organisations to report ransomware payments to the Department of Home Affairs and the ASD. This new reporting obligation will commence at latest six months after the Act receives royal assent (potentially earlier by proclamation) and applies broadly to: · organisations which are a responsible entity for a critical infrastructure asset; and · other private sector organisations which conduct business in Australia with an annual turnover exceeding a threshold (to be specified - likely to be A$3M). Ransomware reports are required to be made within 72 hours of making a payment (not the receipt of a demand or the discovery of a ransomware attack). Difficult Decisions The requirement to report payments will need to be taken into account by Boards when considering whether to pay a ransom. The Government’s general view on ransoms continues to be that organisations should not pay them. It reasons that payments don’t guarantee the recovery or confidentiality of stolen data, but do encourage cyber attacks to proliferate. Organisations in receipt of ransom demands are left to ponder several competing considerations… · Paying a ransom could potentially contravene sanctions (such as the one imposed on Aleksandr Ermakov, the individual responsible for the 2022 Medibank data breach) or anti-money laundering laws. · Company Directors fulfilling the duty of care to act in the best interests of their organisation will need to balance the risks of payment - commercial damage, incentive to re-target, uncertainty of data recovery – against the risks of not paying - loss of systems data, reputational damage, third party claims, lost customers and business disruption. If a ransom payment is made, then the new mandatory reporting obligation will be in addition to other applicable reporting requirements an organisation is subject to. These could include the Privacy Act 1988 , the SOCI Act , and continuous disclosure obligations under the ASX Listing Rules and CPS 234. In fact, it’s important that Cyber Incident Response plans developed by organisations specifically address these overlapping requirements, taking into account the various regulators and timeframes of each. Be aware that, for any entities regulated under the SOCI Act , it’s also conceivable that the Government could use its directions power to direct an entity to pay - or not pay - a ransom. An organisation which fails to comply with mandatory ransom reporting will incur a civil penalty of 60 penalty units (currently A$93,900). Voluntary reporting regime A new National Cyber Security Coordinator (NCSC) is being established under the Cyber Security Act to lead a whole-of-government response to significant cyber security incidents. The Act provides a framework for the voluntary disclosure of information by any organisation operating in Australia, or any responsible entity under the SOCI Act , to the NCSC relating to cyber security incidents. However, it imposes various limitations on how the NCSC may further use and disclose information voluntarily provided by entities, depending on the significance of the incident. Non-significant cyber security incidents: Information can be used for limited purposes such as directing the reporting entity to assistance services, coordinating a government response, and informing Ministers. Significant cyber security incidents: Information can be used for broader ‘Permitted Cyber Security Purposes’. These include preventing or mitigating risks to critical infrastructure or national security, and supporting intelligence or enforcement agencies. A cyber security incident is deemed “significant” if: there is a material risk that the incident has seriously prejudiced, is seriously prejudicing or could reasonably be expected to prejudice the social or economic stability of Australia or its people, the defence of Australia or national security; or the incident is, or could reasonably be expected to be, of serious concern to the Australian people. Information voluntarily provided by organisations to the NCSC is subject to limited use protections similar to those which apply to information disclosed as part of a ransomware payment report. The new voluntary reporting regime and corresponding limited use protection has come into immediate effect. Limited use protection The Cyber Security Act outlines how businesses should work with the NCSC and other government agencies to obtain assistance and guidance when responding to cyber incidents. It also provides businesses with certain limited use protections when collaborating with the government’s cyber security agencies - a legislative foundation for the CISA Traffic Light Protocol government agencies have recently offered when assisting organisations. Such protections were requested by business lobby groups. They provided feedback during the public consultation period that disclosing information about a data breach could risk exposing an organisation to further regulatory or enforcement action, adverse publicity and litigation. Further, if disclosing a cyber incident was determined to be against an organisation’s best interests, its directors could potentially be in breach of their duties in approving the disclosure. That could in turn expose directors to enforcement action from ASIC. Counterweighing these concerns, the Government believes that sharing information on current threats and incidents can help other organisations avoid similar incidents. In balancing these competing interests, the Cyber Security Act limits the purposes for which information contained in a ransomware payment report or voluntarily report provided to the NCSC can be used or disclosed. The NCSC (and any Government agency it coordinates with) cannot record, use or disclose the information provided for the purposes of investigating or enforcing or assisting in the investigation or enforcement of any contravention of a Commonwealth, State or Territory law. An important exemption from the limited use protections are that crimes and breaches of the limited use protections created by the Act. In this way, the protections stop short of being a full “safe harbour”. Information provided under these protections isn’t admissible in evidence against the disclosing entity, including criminal, civil penalty and civil proceedings (including a breach of the common law). And the provision of information to the NSCS does not affect any claim of legal professional privilege over the information contained in that information. These limited use protections will be of value to organisations disclosing information to the Government about cyber incidents. However, directors should bear in mind the notable gaps in the protection they provide. For example: Information provided can’t be used or disclosed for the purposes of investigating or enforcing any contravention by the reporting entity of another law (whether federal, state or territory), other than a law that imposes a penalty or sanction for a criminal offence. This means that if the ransomware report indicates that a payment was made in breach of relevant sanctions laws, then the limited use protection will not prevent the use of the report in a subsequent investigation or enforcement action. While information provided to the NCSC cannot be obtained from the NSCS by regulators or government agencies, the protection offered under this Act does not prevent regulators from obtaining the underlying information through other means, including via regulatory investigatory powers or where provided under other mandatory reporting regimes, such as those in the Privacy Act 1988 , the SOCI Act, the Telecommunications Act 1997 and the ASX Listing Rules continuous disclosure obligations. So, cyber incident notifications provided to the ACSC under the SOCI Act are not captured by the limited use protection, even if that information is also voluntarily provided to the NCSC or detailed in a mandatory ransomware report. A similar limited use protection has been introduced via the Intelligence Services and Other Legislation Amendment (Cyber Security) Act 2024 for cyber incident information voluntarily shared with the ASD. Other Inclusions in the Legislation This article has focused on developments within the new Cyber Security legislative reforms which will most impact companies and organisations. However, in the interests of completeness, here is a brief overview of other key developments covered in the legislation: Mandated Security Standards for Internet of Things (IOT) Devices. These standards will be detailed in legislative rules, with suppliers required to provide a statement of compliance for devices supplied to the Australian market. New Cyber Incident Review Board. This independent advisory body will be empowered to conduct no-fault, post-incident reviews of significant cyber security incidents and provide recommendations and information to both the private and public sector. It will have the power to compel entities to provide information about significant cyber security incidents. Critical Infrastructure definition expanded. Data storage systems which hold business critical data have been added to the definition of critical infrastructure assets. This closes a gap in the regulations which became apparent in the aftermath of the Optus and Medibank data breaches. Expanded Incident Response Powers. The Government will now have the power to direct an entity to take, or not take a specific action, in the event of a cyber incident affecting critical infrastructure. Security and incident notification obligations moved from the Telecommunications Act 1997 to the SOCI Act , consolidating the cyber obligations of telecommunication carriers and carriage service providers under a single piece of legislation. What Organisations Should Do Cyber security response plans should now be reassessed and upgraded to ensure they align to the new mandatory ransomware reporting requirements. Playbooks and procedures should take account of how an organisation plans to engage with cyber security authorities, bearing in mind the extent - and limitations - of the defined limited use protections. Focus on preventing cyber incidents - not just responding to them . A Managed File Transfer (MFT) solution such as GoAnywhere MFT can encrypt data at rest and in transit, complying with the highest data security standards. It manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols and encryption to protect your data. Advanced Threat Protection and Adaptive Loss Prevention add a further layer of defence. SFT Threat Protection facilitates safe collaboration with external parties, helping to prevent malware from entering an organisation, and reducing the risk of employees losing or mishandling sensitive data. Finally, organisations should seek professional legal counsel in determining and responding to their obligations and responsibilities under the new Cyber Security legislative reforms. The information provided in this article has been general in nature, and the interpretations and advice outlined above should not be interpreted as professional legal advice. Previous Next
- Ransomware payments no guarantee | GSA
< News Ransomware payments no guarantee 3 Oct 2025 Paying a ransomware demand is no guarantee that your precious business data will be restored. Research by Veeam found that fewer and fewer companies are actually getting their data back after a ransomware attack. For them, paying the ransom merely makes the full cost of business recovery even greater. Veeam found that only about a third of businesses who paid up recovered their data, down from around half in the prior year. The number of organisations who were able to recover their data without paying up in the same time period was just under a third. Ransomware accounts for 11% of cyber attacks reported to the Australian Signals Directorate (ASD). As of 30 May this year, Australian businesses with an annual turnover of more than $3M must report any ransomware or cyber extortion payments to the government within 72 hours of making the payment or becoming aware of it. At Generic Systems Australia we have decades of experience helping local businesses keep cyber thieves at bay through deployment of the world’s best MFT, GoAnywhere . If you’d like a no-cost, no-obligation discussion about how we could help you, please feel welcome to get in touch with me. Previous Next
- Automate Cyber Security to Help Manage the Staff Shortage | GSA
< News Automate Cyber Security to Help Manage the Staff Shortage 7 Oct 2025 Automating your cyber security is one key way organisations can deal with the worsening scarcity of skilled cyber security staff in Australia. ISACA’s State of Cybersecurity 2025 report shows that cyber security teams in Australia remain stretched thin. More than half (54%) say they are understaffed. Even more (58%) say they have unfilled positions. Hiring headache Australian organisations say there is a continuing high demand for technical cyber security professionals, but that they struggle to hire and retain them. Around a third (36%) say it takes three to six months to hire for even entry-level roles, and the challenge worsens (48%) for non-entry-level roles. The problem is more acute in Australia than on average globally (39%). Under-funded, and under threat Australian organisations’ hiring challenges are exacerbated by lack of staff funding. Almost half of respondents to ISACA’s survey said they had received insufficient funding to address cyber security issues, and only 24% predicted they would receive any budget increase in the year ahead. Again, this compared unfavourably to the 41% of cyber security professionals globally who expected their organisation’s cyber security budgets to increase. Skill profile changing The qualifications being sought by employers are also evolving … though perhaps not in the way you might expect. “Organisational Fit” is now the most highly sought after attribute (66%), followed by usual factors such as “Prior Cybersecurity Experience” (62%). Also highly-valued are “Adaptability” (57%), “Communication” (60%), “Critical Thinking” (55%) and “Problem Solving” (44%). Worse to Come? 41% of the Australian organisations who responded to ISACA’s survey said their organisation had experienced more attacks than a year ago. While half believe an attack on their organisation is likely or very likely in the year ahead, only 35% feel confident in their team’s incident response capabilities. ISACA’s Oceania Ambassador, Jo Stewart-Rattray, said Australia couldn’t “hire its way out of a skill gap this deep”. “Fewer organisations are training non-security staff into cyber roles, even though most organisations acknowledge they are under-staffed (and) this approach is unsustainable,” she said. Automating to Augment Organisations struggling to recruit cyber security specialists should consider how automation can augment and relieve the load being carried by their existing cyber security specialists. Advanced Managed File Transfer solutions, such as GoAnywhere MFT , can centrally manage and secure file transfers organisation-wide. Recognised for its class-leading features, GoAnywhere frees up your cyber security specialists, working in the background to comprehensively mitigate the risks of storing and moving your data, both within and outside your organisation. Through its centralised control, encryption, and auditing capabilities, GoAnywhere replaces risky traditional approaches and improves productivity. Its versatility, security, ease of use, and budget-friendliness have made it a must-have solution for organisations committed to protecting their information assets. Expert Local Advice On Hand At Generic Systems Australia , we’re Australia’s and New Zealand’s experts on Managed File Transfer solutions. If you’d like a no-cost, no-obligation discussion about how we could help you augment your cyber security team’s efforts, please feel welcome to get in touch . Previous Next
- Nine Real World Experts Share How They’re Leveraging GoAnywhere | GSA
< News Nine Real World Experts Share How They’re Leveraging GoAnywhere 13 Feb 2025 A great way to learn about the value of a Managed File Transfer (MFT) solution is to hear from those who use one. Fortra have published a useful eBook “MFT's Role in Business: IT Leaders Weigh In” in which nine IT and security professionals share their experiences using Fortra’s GoAnywhere MFT . Meet the Experts · Chris Payne, Director of Strategic Alliances & Technical, Pro2col · Paulina Sumska, Regional & Supplier Security Coordinator, Canon · Heath Kath, Lead Solutions Engineer, Fortra · Christian Toon, Head of Cyber Professional Services, Pinsent Masons · Antonio Sanchez, Principal Evangelist, Fortra · Jay Triche, Senior Programmer/Analyst, Lamps Plus · Steve Merrigan, IT Operations Senior Specialist, BT · Loveleen Trotter, Solutions Architect, Fletcher Building · Matthew Hankinson, Infrastructure Manager, Seven Network MFT in Action MFT enables organisations to transfer large quantities and sizes of files securely and quickly, every time. It: · leverages secure file transfer protocols; · encrypts file transfers; and · employs authentication and authorisation to their recipients safely. However, as the class-leading MFT , GoAnywhere MFT goes several steps further. It turbo-charges your organisation’s efficiency by replacing repetitive, manual processes with centralised, automated, and fully-compliant ones. Unsafe legacy scripts can be replaced with automated workflows. Files transfer securely, when and where you say, and without a team of people spending valuable resources - every time - to ensure it happens. Large files can be sent quickly. GoAnywhere’s built-in transfer technologies accelerate file transfers at speeds up to 10Gbps - hundreds of times faster than typical FTP. And it achieves that even in environments experiencing packet loss or latency. GoAnywhere also features bundles for threat protection and secure collaboration. You can secure all incoming files against malware, encrypt all outgoing files, and even control access permissions once they’ve left your network. Encryption and compliance are further benefits. Files stay safe at rest and in motion, which builds trust and credibility across supply chain partners. With so much data transfer occurring in cloud environments, GoAnywhere MFT deploys on AWS, Microsoft Azure, and other cloud computing platforms to give you the same level of coverage no matter where you keep – or send – your data. Leveraging MFT As the experts explain in the eBook, organisations can scale their use of GoAnywhere’s features and technologies, starting with the basics and then exploring and expanding the solution’s more advanced features to supplant operations traditionally performed by specialised middleware. From integrating with web services to drive automation, to customising unique solutions complete with bespoke emails, nearly any file transfer capability is possible. If you’re wondering “could an MFT do that?”, this eBook may well have the answer. And with GoAnywhere MFT, that answer most often is “Yes!” If you’d like a complimentary copy of “MFT's Role in Business: IT Leaders Weigh In”, just let us know via the link on our Resources page. Previous Next
- COMPLIANCE PRODUCT DATASHEET | GSA
Every organisation needs to meet stringent industry, state and federal data and privacy laws and regulations. GoAnywhere is the secure file transfer solution built to satisfy these demanding Compliance requirements. Review compliance datasheet below: RESOURCES HOME
- Mid-Q3 Already...?! How’s That IT Roadmap Faring | GSA
< News Mid-Q3 Already...?! How’s That IT Roadmap Faring 11 Aug 2025 With 2025 already more than halfway done, how well are your IT deployments shaping up against your start-of-year roadmap? A Gartner survey at the end of last year found that most A/NZ CIOs were planning to invest significantly in improved cyber security in 2025. In fact, 88% of our region’s CIOs and technology executives said they’d invest in heightened cyber security measures, with 82% nominating it as their top investment priority. More Attacks, More Regulation The factors driving that focus certainly haven’t let up in the year to date. That is to say: the government’s push for greater regulation and transparency and the volume and sophistication of cyber attacks haven’t abated. As Gartner VP Brian Ferreira told the 2025 Gartner IT Symposium/Xpo on the Gold Coast: “Organisations face greater scrutiny as they batten down the hatches to avoid becoming the next target or breaching stewardship. This continues to drive significant focus and investment towards cybersecurity and legal compliance into next year.” Executive and board scrutiny of cyber security preparedness hasn’t let up, either. Heightened Focus Gartner’s survey found that ANZ CIOs would have a significantly heightened focus on ensuring compliance and minimising risks (92% - up from 57% last year). That makes perfect sense, with Australia’s regulatory landscape tightening and more stringent laws enacted to increase CIOs’ stewardship obligations. Checkpoint So, as Q4 2025 looms on the horizon: how are your 2025 IT advances panning out vs your 2025 plans? Here at Generic Systems Australia we’re continuing to see many Australian and New Zealand enhancing their core cyber security through class-leading Managed File Transfer solutions. We have many years of experience helping our customers do that, from the initial scoping of legacy data transfer approaches through to zero-cost Proof of Concepts and hassle-free Migration Services. If you’d like a to discuss how your organisation’s cyber security can be boosted by a cost effective Managed File Transfer solution, please feel welcome to contact me. I’m always happy to have an obligation-free discussion. Previous Next
- Asia-Pacific orgs are on Cybercrime Frontline | GSA
< News Asia-Pacific orgs are on Cybercrime Frontline 12 July 2024 The Asia-Pacific region is the frontline in the fight against cybercriminals. A survey conducted by security firm Kiteworks has found that 72% of organisations in our region experienced four or more cybersecurity incidents in the past year - 20% more than the global average. Data also shows that Asia-Pacific organisations also exchange sensitive content with the highest number of third parties. This could be contributing to the higher-than-average cyberattacks. One of your best defences against hackers is to centrally control the flow of data into and out of your organisation. Managed File Transfer (MFT) software does that for you. At Generic Systems Australia , we’re the Asia-Pacific’s experts on the world’s #1 MFT, GoAnywhere . Let me know if you’d like an obligation-free discussion about how we could help you keep your organisation safe from the cyber crimewave. #MFT #managedfiletransfer #securefiletransfer #sft #cybersecurity #cybercrime Previous Next
