top of page

Search Results

186 results found with an empty search

  • GA MFT | GSA

    GoAnywhere MFT GoAnywhere MFT is the award-winning cybersecurity solution which helps more than 3,000 organisations safely connect to their trading partners, automate their IT processes, and protect their data. This brief video overviews its key features and benefits. RESOURCES HOME

  • Balancing Cyber Security with Frictionless Customer Experience | GSA

    < News Balancing Cyber Security with Frictionless Customer Experience 17 June 2025 Cyber thieves are stealing more from businesses than “just” data and money. They’re stealing customer trust. Research shows that customers are increasingly worried about how well companies are protecting their data. And those worries are hurting companies’ bottom lines. Fears Realised Nearly 2 in 5 customers have been the victim of two or more data breaches, according to S&P Global Market Intelligence. A third of the victims of identity theft have experienced it within the past three years. Stuart Vaeth, SVP of strategic business development at Trua, said cyber theft incidents weaken customer trust and brand reputation. “The result can be lost business. It absolutely impacts the reputation of the service provider,” he said. “Obviously, it erodes trust. People may not come back to your site if your data has been breached.” Research by S&P Global Market Intelligence shows that more than three-quarters of customers are concerned about the risk of trying digital experiences or products that require sharing personal data online. This is a serious challenge for businesses who recognise that customer data is essential to providing personalised purchasing experiences. Cyber Security Integral to Customer Experience The safety of customer data is as much a customer experience issue as it is a cyber security one. Sheryl Kingstone, research director of customer experience and commerce at S&P Global Market Intelligence, said that a mistake many businesses make is to look at their customer data “in a silo”. “When we do take a look at things like what CISOs want or what privacy experts want versus what marketing and customer experience teams want, it becomes very complicated, because we need to mind the gaps,” Kingstone said. “There are trade-offs between compliance and the customer experience.” “Security compliance teams look at ensuring risk and compliance. CX leaders want to reduce customer friction points,” she said. Businesses need to balance customer experience with risk and compliance. Vaeth said that, while CX leaders generally aim for zero friction to prevent drop off, some friction can be beneficial. Collecting customer data directly or asking customers for verification can provide reassurance and need not impact drop off rates. Earning Customer Trust One way to earn customer trust and assure customers you take data protection seriously is to show them your credentials. For example, you can display them on your website and in marketing materials. Another way to demonstrate your “cybertrustworthiness” is to let your customers know when you’re investing in new technologies, improving processes and gaining certifications. It demonstrates you’re on a path of continual improvement that can differentiate you from your competitors. Protecting Customer Data Stepping up to the needs of customer data guardianship requires both technology solutions and sound business practices. Layered defences, with integrated solutions that address encryption, threat protection, and data loss prevention, enable safe collaboration without risking malware, mishandled data, breaches and non-compliance. Given most breaches involve a human element, technology solutions need to be automated and easy for employees to use. Software needs to be able to manage: How access to data is granted; How access is authenticated; How access is tracked and controlled; and How access can be speedily revoked, when needed. Layered Protection A standalone managed file transfer (MFT) solution – such as GoAnywhere MFT - is a great first layer of defence. It provides security for files at rest and in-transit. However, integrating Threat Protection as an additional layer enables you to take appropriate action when there’s customer data moving in and out of your organisation. Based on rules you predefine, Generic Systems Australia’s Advanced Threat Protection Bundle can mask, remove, or permit customer data to be moved within your organisation and beyond, via a Secure ICAP Gateway. On Hand to Help At Generic Systems Australia we’re the Asia-Pacific region’s experts in deploying Managed File Transfer and Advanced Threat Protection. We’ve assisted dozens of organisations to protect their customer data and secure their file transfers, while keeping their businesses running smoothly. If you’d like to discuss how we can help you, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how simply we can help you maintain your customers’ trust. Attribution: This article includes quotes from an interview originally published on cybersecuritydive.com . Previous Next

  • Experts Again Declare GoAnywhere “Top MFT” | GSA

    < News Experts Again Declare GoAnywhere “Top MFT” 23 Apr 2024 Respected independent tech analysts Info-Tech have compared Managed File Transfer solutions and once again declared GoAnywhere MFT to be the best. Their latest finding is consistent with their 2022 analysis of the most popular MFT software solutions and vendors. Taking into account vendor experience and capabilities, product features and customer satisfaction, they found then – as now – that GoAnywhere MFT was the 2024 Data Quadrant Gold Medallist. Info-Tech’s data was sourced from real end users, meticulously verified for veracity, and exhaustively analysed. Each product was compared and contrasted with all other products in the category to create a holistic, unbiased view of the product landscape. Besides achieving the highest overall score in the MFT category, GoAnywhere also ranked highest for Vendor Capability Satisfaction, including the key dimensions of: · “Business Value Created” · “Breadth of Features” · “Quality of Features” · “Product Strategy and Rate of Improvement” · “Useability and Intuitiveness” · “Vendor Support” · “Ease of Data Integration” · “Ease of Customisation” · “Availability and Quality of Training”, and · “Ease of Implementation” Market Leader – for a reason GoAnywhere MFT's combination of versatility, security, ease of use, and budget-friendliness has propelled it to the top of the MFT market, as recognised by Info-Tech. For businesses on the quest for a comprehensive and reliable file transfer solution, GoAnywhere MFT is the smart and strategic choice. Grab Your Free Copy of the Independent Report To read more about why experts and customers alike consider GoAnywhere MFT to be the leading Managed File Transfer solution, let us know your email address via this link , and we’ll happily send you a complimentary copy Info-Tech’s report. Experience GoAnywhere MFT for yourself Generic Systems Australia is the Asia-Pacific region’s leading provider of secure MFT solutions. If you’d like to explore how your organisations’ efficiency and bottom line could be boosted through MFT technology, please get in touch with our Business Manager, Bradley Copson , for an obligation-free discussion. At Generic Systems Australia, we’re your local experts in managed file transfer. Previous Next

  • Australian MFT Buyer's Guide | GSA

    Our comprehensive Buyer's Guide will help you consider the questions, options and opportunities for finding the right MFT solution for your organisation. To receive a free copy in your inbox, simply share your email address with us below. First name Last name Enter your email address and click "Receive Guide". (We'll protect your privacy as per our Privacy Policy.) Phone Your Buyer's Guide has been emailed to you! RESOURCES Receive Guide HOME

  • How to Boost Your Business with Advanced Workflows | GSA

    < News How to Boost Your Business with Advanced Workflows 18 Nov 2025 In today’s fast-paced digital environment, businesses rely heavily on secure, efficient file transfers to keep operations running smoothly. Yet many organisations continue to rely on outdated manual processes which are fragile, opaque, and prone to failure. You can avoid these downsides by automating your data workflows with an advanced Managed File Transfer (MFT) solution. The Problem with Legacy File Transfers Many companies still use legacy scripts or batch files created years ago by employees who have long since left. These scripts often run on personal devices or rely on manual execution, leaving businesses vulnerable when something goes wrong. Whether it’s a missed transfer due to someone being out sick or a failure that only becomes apparent when a customer complains, these systems are reactive rather than proactive. Even more sophisticated setups using schedulers like Control-M or Cron jobs still lack visibility and error handling. When a transfer fails, the first alert might come from a frustrated boss or a 2:30 a.m. page from IT support. This reactive model wastes time and erodes trust. Enter Advanced Workflows Advanced Workflows offer a smarter, more resilient approach. With platforms like GoAnywhere , the world’s most advanced MFT solution, users can build automated file transfer processes without needing deep programming skills. The interface enables you to drag and drop tasks into a project outline, define parameters, and schedule execution—all with built-in error handling and notifications. You can automate everything from pulling data from a database to encrypting it with PGP and securely transferring it via SFTP. If something goes wrong—perhaps due to a network issue, or a problem with an external service provider—the system can alert you immediately and attach detailed logs to help you pinpoint and troubleshoot issues before anyone else even notices. Key Features of Advanced Workflow Automation Component Library: GoAnywhere includes more than 150 pre-built tasks, including FTP, encryption, data translation, and cloud integration. You can connect to services like Salesforce, Jira, and ServiceNow with ease. Project Outline: Define the sequence of tasks—read from a database, write to a CSV, encrypt the file, and transfer it. Each step is configurable via dropdowns or parameters. Scheduling and Triggers: Schedule workflows to run at specific times or trigger them based on events like a successful file upload. You can even create holiday calendars to avoid running jobs on non-business days. Monitoring: Watch folders locally or remotely for new files, deletions, or changes. When an event occurs, automatically launch the appropriate workflow. Error Handling and Notifications: If a task fails, send an email with the job log attached. If successful, archive the output and notify stakeholders. A Real-World Example Imagine you need to send HR data to your HR services provider daily. With GoAnywhere’s simple drag-and-drop interface, you can automatically arrange the necessary tasks and schedule them to trigger automatically. Connect to your database and extract employee records. Write the data to a uniquely named CSV file. Encrypt the file using the recipient’s public PGP key. Transfer the file via SFTP. Send a confirmation email with logs and file attachments. No programming experience needed. Why You Need Advanced Workflows Advanced Workflows don’t just save time—they reduce risk, improve compliance, and enhance visibility. You’ll know when transfers succeed or fail, and you’ll have the tools to respond proactively. Plus, by centralising and automating these processes, you free up your team to focus on strategic tasks rather than firefighting. In short, if your business depends on file transfers, it’s time to stop the insanity of manual scripts and embrace the power of automation. Advanced Workflows are the key to boosting productivity, ensuring security, and staying ahead in a competitive landscape. Local Help for Oceania Businesses At Generic Systems Australia , we have decades of experience helping Australia and New Zealand business automate their workflows with the world’s leading MFT solution. If you’d like to discuss the potential for your business, please feel welcome to contact me for a no-obligation discussion. I can even organise a free Proof-of-Concept to show you how easily GoAnywhere can automate your organisation’s critical data transfers. At Generic Systems Australia, we’re your local experts in file transfer. Previous Next

  • New “Threat Brain” keeps Cyber Security Briefed and Vigilant | GSA

    < News New “Threat Brain” keeps Cyber Security Briefed and Vigilant 10 June 2025 What if your enterprise IT systems were constantly informed of the latest emerging cyber threats, so they could proactively protect your precious data from cyber thieves? That’s what Fortra’s new Threat Brain does for GoAnywhere , the world’s leading Managed File Transfer (MFT) solution. Threat Brain provides a unique threat intelligence advantage over other MFT solutions. It aggregates indicators from a deep portfolio of cybersecurity solutions to continuously identify and block IPs with bad reputation or malicious intent before those threats enter your organisation. Other MFTs can only react to cyber threats. GoAnywhere proactively avoids them. Threat Intelligence With access to data from Fortra’s deep portfolio of cybersecurity products and vast customer network, Threat Brain continually aggregates, in real-time, risk information across all attack vectors so that GoAnywhere MFT. Generic Systems Australia is a long-term distributor of GoAnywhere across the Asia-Pacific region. Threat Brain’s enhancements to GoAnywhere enable our customers to benefit from: · Consistent re-verification : With lesser MFTs, once an IP address has been allowed, there’s no ongoing monitoring. With GoAnywhere however, IP reputations are checked with every new session to ensure they remain safe. GoAnywhere is the only solution in the marketplace that makes this proactive and consistent security feature available to all customers within the solution. · Massive threat intelligence database : Threat Brain continually aggregates threat intelligence from Fortra’s broad cybersecurity portfolio and its vast, worldwide (anonymised) customer database. No other MFT vendor offers such integrated cybersecurity tools capable of tapping into this collected threat data. · Layered protection : Fortra’s deep portfolio of cybersecurity intelligence and protection adds an additional layer of protection to customers’ sensitive data. Combined with Advanced Threat Protection , GoAnywhere sets the bar for protecting sensitive data in motion and at rest. Proactive Security GoAnywhere taps Threat Brain to perform on-demand IP reputation checks for incoming HTTP/S connections, AS2, and AS4 protocols. These checks are executed on the GoAnywhere Web Client and via API and API endpoints. GoAnywhere automatically blocks IPs with low reputation scores. This IP blocking can be fine-tuned through adjustable sensitivity settings, while provisioning allows for exceptions in case of false positives. When an IP address has been blocked due to low reputation, a system administrator can add an exception to permit the IP address to be accessed. Whenever GoAnywhere takes action to protect your systems and data, it’s recorded in an audit log detailing what was blocked and the reason it intervened. Stay in the Know When it comes to cyber security, it’s critical to be proactive vs reactive. While Brute Force or Denial-of-Service attacks may be detected automatically by traditional MFTs, this happens only after the system has been attacked. Local Expertise at the Ready If you’d like help tapping GoAnywhere’s proactive capabilities for your organisation, please feel welcome to contact me . I have decades of experience as a long term distributor of GoAnywhere in Australia and New Zealand, and I’m always happy to have an obligation-free discussion and demonstrate its impressive capabilities. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. Previous Next

  • GoAnywhere declared "Best MFT" | GSA

    < News GoAnywhere declared "Best MFT" 6 Nov 2023 GoAnywhere judged to be Best Managed File Transfer Solution Transferring data is the lifeblood of a modern organisation. Securely sharing critical information between employees, suppliers and customers is essential to efficient operations. Last year, respected tech analysts Info-Tech evaluated the most popular MFT software and vendors. Their analysis, which took into account vendor experience and capabilities, product features and customer satisfaction, found GoAnywhere to be the top MFT solution. So, what led Info-Tech’s judges to recommend GoAnywhere for businesses seeking a secure and efficient file transfer solution…? Unmatched Versatility: GoAnywhere MFT offers an all-encompassing platform for secure file transfers, automation, and seamless cloud integration. Some competitive offerings don’t support Cloud Deployment. GoAnywhere’s versatility and extensive feature set impressed Info-Tech's evaluators, leading them to conclude it was the ideal choice for businesses with diverse transfer needs. User-Friendly Efficiency : User-friendliness is key element of efficient in business operations, and Info-Tech found that GoAnywhere MFT really delivers on this front. From IT specialists to non-technical professionals, the platform's intuitive design streamlines file transfers, task scheduling, and security management. Fortified Security: In this era of increased data breach risk, GoAnywhere’s robust encryption and access controls keep sensitive data protected. Stellar Customer Reviews : 93% of GoAnywhere reviewers said they would likely recommend the solution. The solution’s composite review score was 8.9 out of 10. Budget-Conscious Investment : Info-Tech found GoAnywhere MFT to be a supremely cost-effective solution, with attractive pricing strategies. Responsive Support and Ongoing Updates : Info-Tech applauded GoAnywhere for its responsive customer support and regular updates, ensuring business continuity. Market Leader – for a reason GoAnywhere MFT's combination of versatility, security, ease of use, and budget-friendliness has propelled it to the top of the MFT market, as recognised by Info-Tech. For businesses on the quest for a comprehensive and reliable file transfer solution, GoAnywhere MFT is the smart and strategic choice. Want to Learn More? Generic Systems Australia is the Asia-Pacific region’s leading provider of secure MFT solutions. If you’d like to explore how your organisations’ efficiency and bottom line could be boosted through MFT technology, please feel free to contact our Business Manager , Bradley Copson , for an obligation-free discussion, or read more on our website . Previous Next

  • Protect Your Business from Phishy QR Codes | GSA

    < News Protect Your Business from Phishy QR Codes 29 Aug 2025 It’s National Scams Awareness Week . But it’s always a good time to guard against one of the most common forms of phishing. Research by the Anti-Phishing Working Group (APWG) shows that scam QR Codes are becoming the attack vector of choice for cyber criminals attempting to infiltrate your organisation. Each day, millions of emails are sent containing QR Codes that link employees and consumers to bogus websites. Code for Criminals QR code attacks occur when a cyber thief creates a bogus QR code which “socially engineers” their intended victim to a phishing website. There they’re tricked into disclosing system credentials, making a false payment or purchase, or downloading malware. QR codes are an increasingly popular phishing tactic due to their crim-friendly features. Free QR Code generators make it inexpensive for cyber criminals to attempt phishing attacks. Free QR Code tend to have few resources dedicated to takedowns of legitimate service abuse and other malicious activity.   QR codes can be combined with URL shorteners to mask the true destination of URLs. Stop the Scams Our SFT Threat Protection Bundle enables your organisation’s email system to automatically detect and prevent phishing links and other malware from entering your organisation. Combining the layered strengths of GoAnywhere MFT and Clearswift, it means your team can receive and share information securely, without impairing their productivity. Seamlessly integrating managed file transfer with advanced threat protection and adaptive data loss prevention, SFT Threat Protection not only prevents malware from entering your organisation, but it also prevents employees from losing or mishandling data. For example, if an employee knowingly –– or unknowingly –– attempts to share any files containing malware, those files are sanitised by having the malicious elements automatically removed. It can also automatically detect and –– if you configure it to do so –– prevent employees from sharing sensitive information. Local Help on Hand Generic Systems Australia has decades of experience helping Australian and New Zealand organisations protect themselves against phishing and other cyber attacks by leveraging the power of the world’s leading MFT solution. Our Migration Service makes the transition even easier for organisations who prefer to use their resources building their businesses rather than improving their IT plumbing. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch with us. At Generic Systems Australia, we’re your local experts in Secure Managed File Transfer. Previous Next

  • SES Encrypts and Audits Global Client Data | GSA

    < Case Studies SES Encrypts and Audits Global Client Data Decad es of experience helping Asia-Pacific customers have established Generic Systems Australia as our region’s local experts in secure managed file transfer. In this case study, we share how global experts in operational resilience – SES – take advantage of GoAnywhere MFT , the world’s leading MFT solution , to manage the transfer of more than 2,000 files daily. Software escrow agreements are becoming increasingly common for organisations worldwide. Medium and large enterprises, especially those in retail, energy, and financing, rely on these agreements to provide coverage for the unique source code, files, and other software assets critical to a company’s intellectual property. To prevent loss of this information during sudden downtime, a data breach, or natural disaster, organisations create a software escrow agreement with a third-party vendor to protect and back up their data. The third party then takes the data, creates an inventory of everything that’s to be escrowed, and puts the source code and other assets into a vault for maximum protection. SES is a third-party vendor that provides software escrow agreements, intellectual property protection, and cybersecurity risk management globally. Based in Manchester, UK, SES has more than twenty years of experience providing security to more than 2,500 professionals in 40+ countries. "Dealing with software escrow agreements is our bread and butter," said Tom Sweet, Information Security and Systems Manager at SES. It’s an area of constant growth and adjusting to keep clients happy and source code regularly updated. We are continually developing and innovating.” Often, SES does this with tools such as GoAnywhere MFT. For SES, GoAnywhere Managed File Transfer (MFT) has been a well-used and finely-tuned addition to its cybersecurity solutions. With the software in place, it performs on average nearly 2,000 uploads for clients per day — a mix of small and large files — as well as help monthly and quarterly businesses with their source code deposits. Switched from Manual File Transfers to Managed File Transfer Before GoAnywhere came into the picture, SES used a web gateway, an AWS-backed instance, to receive source code for its clients. It also occasionally used old-fashioned file transfer methods: physical disks and SD cards that were tracked, signed for, and had a direct chain of custody which could be followed. While this mixed process — AWS-backed instance and physical mail — worked at the time, it still lacked the ability to track user and file transfer activity. Having an audit trail was important to the business. When auditing also became a client requirement, SES looked for a way to streamline, structure, encrypt, and audit the exchange of data. SES handled a high volume of file transfers and needed robust security practices for the data it processed and stored every week. So the it was time to find a centralised solution which could do all of this and meet its trading partners’ needs. The tracked-and-signed file transfer processes SES used led to an evaluation of GoAnywhere MFT, a robust and fast-growing product which used similar techniques (tracking, signing, and a clear chain of custody) for sensitive file transfers. GoAnywhere was a hit. It took Tom Sweet mere days to learn the product. He attended two webinars, then jumped in and followed his intuition. The turnaround had to be quick, but the learning curve was straightforward. SES implemented GoAnywhere across its Linux systems and has depended on it ever since for day-to-day file transfers, streamlined encryption, and consistent auditing. Benefit#1: File Encryption and Security With GoAnywhere fully implemented, SES has been able to ensure all file transfers sent by its clients are encrypted in transit and sent to the right place. SES has also ensured that encryption keys are held separately. These are just two of the strict requirements SES needs to follow for its clients in order to stand out in a sea of escrow and backup service platforms. "It’s risk versus security," Tom said. "With HR and payroll data, the risk is high, so the security needs to be high as well."nearly 2,000 uploads for clients per day — a mix of small and large files — as well as help monthly and quarterly businesses with their source code deposits. Benefit#2: Fast File Transfer & Trading Partner Setup New trading partners and file transfer users can be set up in minutes. "Less than that if I’m rushed," Tom said. "The quickest ones we’ve had people test: I’ve sent the email saying here’s your username, sent the password out over SMS, and people test the log-in within 10 minutes." Sweet uses private and public keys to ensure the encryption and validity of the new transfers he creates. When the file transfers are executed, most run, start to finish, in less than 30 minutes. Benefit #3: Ease of Use & Automation "The main thing we use GoAnywhere for is managing users, auditing the logs, and giving users a secure gateway into our systems that would normally be firewalled," Tom, said. All of this is simple with GoAnywhere, and he believes the product’s biggest strength is its ease of use. Whether he needs to streamline, update, or re-deploy the product across systems and users, the process has been painless. Automation is another huge benefit of GoAnywhere. SES use GoAnywhere to do the heavy lifting for SaaS-based clients. These clients transfer large amounts of source code end data that are pushed into a SaaS escrow and captured in real time. "We help these clients configure a script that connects over SFTP to a GoAnywhere service," Tom said. "GoAnywhere then audits those transfers." The product securely transfers and audits at the same time, all automatically for nearly 60 clients who need their source code updated on a daily or monthly frequency. This enables SES to automate on Windows and Linux to meet the security requirements of each client. GoAnywhere’s granular security controls enabled Sweet to make GoAnywhere as safe and security-driven as possible against internal risks and user errors. "I stripped it back to who can do what," he said. Previously shared passwords were locked down. Web users were restricted to only the areas of the product they needed, and file storage was controlled — files could only be stored in the right areas of the network. "If someone in a company wanted access to the transfers, or to the systems, they could break the loop to that cycle. So that’s why we vault [client data] and back it up in an encrypted format. We make sure the file transfers are encrypted; that’s key too." Benefit#4: Regulation Compliance Many SES clients have compliance requirements which SES must meet. To achieve these needs, SES has applied ISO 27001 compliance across all clients to ensure all information sent between SES and other companies is secure. "ISO 27001 mandates that we create policies, processes, and procedures which we can prove using evidence-based systems," Tom said. "This says, ‘Okay, by default, you [the client] get all of this [security]. All files will be encrypted, and all second factor messages will be sent out-of-band so they aren’t sent over the same method of communication, and so on." Meanwhile, while encryption is the same and applied for everyone, clients can choose if they want to use multi-factor authentication (MFA) with passwords or SSH keys for an extra layer of security. GoAnywhere offers multi-factor authentication methods, including keys and certificates, for increased file protection. SES also uses GoAnywhere to encrypt every backup of escrow data that is then kept in offline vaults. "This ensures there’s 99.9% availability," Tom said. "No one thinks escrow is important until it’s too late," he added, so SES provides these offline backups with GoAnywhere’s help to give organisations peace of mind. Benefit#5: Auditing and Administration One of the biggest justifications for purchasing GoAnywhere was its auditing functionality. Tom and his team uses these audit logs to see who is connecting to their SFTP servers, what they’re doing on those servers, and how much they’ve done. This level of detail is critical, especially when dealing with sensitive escrow documents, software assets, and source code. "The log-in and auditing process in GoAnywhere is important for our information security standards. We audit the transfers not just to be able to take them securely, but also to prove who has been on and transferred what and when. The audit trail is important." If Sweet needs to change something, GoAnywhere makes it easy. Admins can make modifications or adjustments to their processes to keep constant with security requirements. "We can do this with GoAnywhere very easily," he said. "Then we just send out a new host key to our clients." What’s Next: Remote Agents and Advanced Workflows Right now, SES retrieves files from clients. But in the near future, it hopes to roll out GoAnywhere Remote Agents and GoAnywhere Advanced Workflows for customers who want zero involvement in the file transfer process. With these features enabled, Sweet and his team will be able to pull data from each client when needed without requiring manual work or engagement on their end. "Remote agents and advanced workflows will enable us to go out, talk to, and pull the requests for daily, weekly, or monthly file transfers," Tom explained. One Admin, One Product Tom Sweet has used GoAnywhere for four years. As the main product administrator, he’s always looking for new ways to implement the software, integrate it with other web and cloud services, roll it out as part of security-client processes, and improve the success of GoAnywhere at SES. "I want to get as much out of the product as I can," Tom said, reflecting on being the singular admin for GoAnywhere. "The more I push it out, the more we get a better return from our customer experience." And for any organisation — SES included — customer satisfaction is top priority. GoAnywhere’s encryption, automation, and ease of use help make that happen. Previous Next

  • Email Overload Creating Cyber Complacency in Australia | GSA

    < News Email Overload Creating Cyber Complacency in Australia 23 Oct 2024 Australians send and receive 8.1 billion emails each day. That makes us the 10th most prolific emailers in the world. And that’s a problem . It’s not just the inbox clutter we’re experiencing (or perhaps, contributing to). It’s the cyber security complacency it’s creating. You see, email continues to represent the single biggest threat to your organisation’s cyber security. The more emails we receive, the greater the risk that a cybercriminal will gain access to your organisation’s data and secrets. Proven Danger Real world tests have proven that the threat posed by Australians’ “email encumbrance” is real. Proofpoint conducted 183 million phishing simulations earlier this year. They observed that almost one in six recipients of a suspicious phishing email failed to protect their organisation’s valuable data. Recipients variously clicked malicious links, succumbed to a bogus password reset, or downloaded ransomware. What leads employees to fall for phishing and malware…? It’s “breach fatigue” – employees who have become complacent and careless about cybersecurity. Cyber Complacency Professor Sanjay Jha, UNSW Lead of the Cybersecurity Cooperative Research Centre, said: “It’s human nature that you start to just get used to certain things. (But) phishing attacks continue. In fact they are getting ever more innovative.” He urged companies to do more to keep personal data safe from hackers. “The problem is that ICT systems are very complex and every day new applications are deployed, and new information is stored and exchanged.” Whole-of-Enterprise Email Protection With escalating email volumes creating a high and persistent risk of cyber incursion, organisations need a systematic way for employees to securely and reliably exchange files and emails with external third parties. Thankfully, there are technical safeguards you can put in place to prevent your employees from accidentally - or negligently, or maliciously - allowing cyber criminals in. Not only will they help protect your organisation from cyber criminals, as a bonus, they’ll also improve your employees’ efficiency. Our SFT Threat Protection Bundle enables your organisation’s email system to automatically detect and prevent phishing links and other malware from entering your organisation. Better still, it can also automatically detect and prevent employees from sharing malware or sensitive information. Active Threat Protection If an employee - knowingly or unknowingly - attempts to share a file containing malware, the files are intercepted and “sanitised”. That is to say: their malicious elements are automatically removed. The SFT Threat Protection Bundle can also go a step further and automatically detect and prevent employees from sharing sensitive information. For example, let’s say a folder has Word or PDF documents, or Jpeg images, which contain Personally Identifiable Information. If an employee attempts to transmit any of these files, a secure ICAP gateway will automatically inspect and block the transfer. Or if you prefer, the gateway can be configured to automatically redact (i.e. mask out) sensitive information from documents and image files while still permitting the remainder of the file to be shared. Free Demonstration If you’d like to see first-hand how our SFT Threat Protection Bundle can help keep your organisation’s data safe, and help beleaguered employees keep their guards up, why not get in touch and have an obligation-free chat with me? At Generic Systems Australia , we’re your local experts in secure managed file transfer. PS: In the three minutes it took you to read this article, almost a billion new emails were sent around the world - many of them to and from Australians! Previous Next

bottom of page