top of page

Search Results

195 results found with an empty search

  • Why “Free” File Transfers Are Costing You | GSA

    < News Why “Free” File Transfers Are Costing You 8 Apr 2026 With more than 400 million terabytes being created and transferred every day, the ability to transfer files quickly, dependably and securely is a core business process. Surprisingly, some businesses entrust this to free file transfer software. However, “free” software sometimes isn’t… A study by Aberdeen Group identified hidden costs that businesses incur using “free” file transfer mechanisms. In fact, 80% of files sent through e-mail attachments or “free” file transfer services ended up costing organisations money in the long run. Here’s how. Productivity Increasing file sizes mean it’s taking longer and longer to move data around. For example, as businesses and government become more reliant on the high-resolution cameras in our smartphones, image files are growing significantly in size. High-definition video files are currently the standard, but are already being supplanted by 4K videos. These are typically hundreds of gigabytes in size. Moving high-res movies around finds employees spending more time than ever before simply waiting for file transfers to complete. When your team is waiting for a file to transfer, there’s a significant hit to their productivity. Every hour it takes them to send a file is an hour where both they - and perhaps, their collaborator - are without the data they need to work effectively. Multiply the number of hours by the salaries of both employees and the “free” file transfer is no longer free. IT Support Trying to send a file - only to have the transfer crash midway – is not just frustrating, it’s a further waste of time. When file transfers fail, employees typically seek support from their IT department. That incurs a further labour cost in resolving the problem. Aberdeen’s study estimated that resolving each stalled file transfer required a cumulative 11 hours of team time. Security Even when files successfully transfer, significant cybersecurity risks arise when sensitive files are sent via free services. In Aberdeen’s study, free service transfers were twice as likely to result in security breaches compared to those conducted with professional Managed File Transfer software. Major security issues took an average of 16 business hours to resolve and cost companies millions of dollars. Tool Search When files are too big to send as email attachments, employees turn to “free” transfer tools. However, the time spent finding such tools could have been better spent on their core responsibilities. The Better Solution GoAnywhere MFT is not only a better way to move data around your business and its supply chain… it’s also more cost-effective. Aberdeen’s study found that businesses which invested the relatively small sum needed for a professional Managed File Transfer solution had a median return of almost 500 times their investment. When it comes to Managed File Transfer solutions, there’s one acknowledged industry leader. GoAnywhere MFT automates and encrypts data between an organisation’s employees and with its trading partners, protecting from vulnerabilities while vastly improving file transfer speed and quality. Here to Help If you’d like to discuss how GoAnywhere MFT could improve your organisation’s productivity and bottom line, please get in touch with our team of local MFT experts. We’re always happy to have an obligation-free discussion about how quickly and affordably we can transition you to the efficiency, security and cost-effectiveness of a Managed File Transfer solution. Previous Next

  • Hidden Cost of "Free" File Transfers | GSA

    < News Hidden Cost of "Free" File Transfers 1 Nov 2023 The Hidden Cost of "Free" File Transfers With 329 million terabytes of data being created each day, the ability to transfer files quickly and dependably has become a core business process for every business. Surprisingly, some businesses continue to entrust this critical dependency to free file transfer software. But is this software truly “free”…? A study by Aberdeen Group identified hidden costs that businesses incur using “free” file transfer mechanisms. In fact, 80% of files sent through e-mail attachments or “free” file transfer services ended up costing organisations money in the long run. How…? It’s taking longer to move a lot of data around. For example, as our businesses are finding new ways to make use of the high-resolution cameras in our smartphones, video files growing exponentially in size. HD video – with files measured in gigabytes - is already the standard. But 4K videos – typically hundreds of gigabytes– will soon be the norm. Moving high-res movies around finds employees spending more time than ever before simply waiting for file transfers to complete. When your team is sitting around waiting for a file to arrive, there’s a significant reduction in their productivity. If it takes them 3 hours to send a file, that’s 3 hours where both they and their collaborator are without the file needed to work effectively. Multiply the number of hours by the salaries of both professionals in question and the “free” file transfer isn’t free anymore. How often have you tried to send a file, only to have the transfer crash out midway? It’s not just frustrating, it’s a further waste of time. When file transfers fail, the non tech savvy among us need to seek the help of their IT department. So, not only is their time being wasted, but there’s a labour cost in resolving the problem. Aberdeen’s study estimated that resolving each stalled file transfer required a cumulative 11 hours of team time. Even when files successfully transfer, there remain significant cybersecurity risks when sensitive files are sent via free services. In Aberdeen’s study, free service transfers were twice as likely to result in security breaches compared to those conducted with professional Managed File Transfer software such as GoAnywhere . Major security issues took an average of 16 business hours to resolve and cost companies millions of dollars. When files are too big to send as email attachments, employees turn to “free” transfer tools. However, the time spent finding such tools could have been better spent on their core responsibilities. There’s not only a better way to move data around your business and its supply chain… it’s also a more cost-effective way. Aberdeen’s study found that businesses which invested a little in a professional Managed File Transfer solution had a median return of almost 500 times their investment. When it comes to Managed File Transfer solutions, there is one acknowledged industry leader – GoAnywhere MFT . GoAnywhere automates and encrypts data between an organisation’s employees and with its trading partners, protecting from unnecessary vulnerabilities while vastly improving file transfer speed and quality. If you’d like to discuss how GoAnywhere MFT could improve your organisation’s productivity and bottom line, please feel free to contact me ( bradley@gensys.com.au ), or read more at the Generic Systems Australia website. Bradley Copson, Business Manager, Generic Systems Australia Previous Next

  • Balancing Cyber Security with Frictionless Customer Experience | GSA

    < News Balancing Cyber Security with Frictionless Customer Experience 17 June 2025 Cyber thieves are stealing more from businesses than “just” data and money. They’re stealing customer trust. Research shows that customers are increasingly worried about how well companies are protecting their data. And those worries are hurting companies’ bottom lines. Fears Realised Nearly 2 in 5 customers have been the victim of two or more data breaches, according to S&P Global Market Intelligence. A third of the victims of identity theft have experienced it within the past three years. Stuart Vaeth, SVP of strategic business development at Trua, said cyber theft incidents weaken customer trust and brand reputation. “The result can be lost business. It absolutely impacts the reputation of the service provider,” he said. “Obviously, it erodes trust. People may not come back to your site if your data has been breached.” Research by S&P Global Market Intelligence shows that more than three-quarters of customers are concerned about the risk of trying digital experiences or products that require sharing personal data online. This is a serious challenge for businesses who recognise that customer data is essential to providing personalised purchasing experiences. Cyber Security Integral to Customer Experience The safety of customer data is as much a customer experience issue as it is a cyber security one. Sheryl Kingstone, research director of customer experience and commerce at S&P Global Market Intelligence, said that a mistake many businesses make is to look at their customer data “in a silo”. “When we do take a look at things like what CISOs want or what privacy experts want versus what marketing and customer experience teams want, it becomes very complicated, because we need to mind the gaps,” Kingstone said. “There are trade-offs between compliance and the customer experience.” “Security compliance teams look at ensuring risk and compliance. CX leaders want to reduce customer friction points,” she said. Businesses need to balance customer experience with risk and compliance. Vaeth said that, while CX leaders generally aim for zero friction to prevent drop off, some friction can be beneficial. Collecting customer data directly or asking customers for verification can provide reassurance and need not impact drop off rates. Earning Customer Trust One way to earn customer trust and assure customers you take data protection seriously is to show them your credentials. For example, you can display them on your website and in marketing materials. Another way to demonstrate your “cybertrustworthiness” is to let your customers know when you’re investing in new technologies, improving processes and gaining certifications. It demonstrates you’re on a path of continual improvement that can differentiate you from your competitors. Protecting Customer Data Stepping up to the needs of customer data guardianship requires both technology solutions and sound business practices. Layered defences, with integrated solutions that address encryption, threat protection, and data loss prevention, enable safe collaboration without risking malware, mishandled data, breaches and non-compliance. Given most breaches involve a human element, technology solutions need to be automated and easy for employees to use. Software needs to be able to manage: How access to data is granted; How access is authenticated; How access is tracked and controlled; and How access can be speedily revoked, when needed. Layered Protection A standalone managed file transfer (MFT) solution – such as GoAnywhere MFT - is a great first layer of defence. It provides security for files at rest and in-transit. However, integrating Threat Protection as an additional layer enables you to take appropriate action when there’s customer data moving in and out of your organisation. Based on rules you predefine, Generic Systems Australia’s Advanced Threat Protection Bundle can mask, remove, or permit customer data to be moved within your organisation and beyond, via a Secure ICAP Gateway. On Hand to Help At Generic Systems Australia we’re the Asia-Pacific region’s experts in deploying Managed File Transfer and Advanced Threat Protection. We’ve assisted dozens of organisations to protect their customer data and secure their file transfers, while keeping their businesses running smoothly. If you’d like to discuss how we can help you, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how simply we can help you maintain your customers’ trust. Attribution: This article includes quotes from an interview originally published on cybersecuritydive.com . Previous Next

  • Cost of Employee Data Loss Errors Soars | GSA

    < News Cost of Employee Data Loss Errors Soars 27 Mar 2026 Insider risk security incidents now cost organisations an average of US$19.5M annually, a 12% increase over the previous year. Everyday employee negligence – not malicious intent - has long been the root cause of most data theft. Last year it accounted for more than half of the total losses. Increasingly complex digital environments are leading to more misjudgements, process gaps, and unmanaged workflows. Shadow AI is also accelerating the data losses. As AI is increasingly adopted across the workforce, visibility and governance are failing to keep pace. Organisations are left in the dark about how routine productivity behaviours expose sensitive data. 92% of organisations surveyed by the Ponemon Institute acknowledged that generative AI has fundamentally changed how employees access and share information. Most (73%) said they worried that unauthorised AI use is creating invisible data exfiltration paths, but only 18% had fully integrated AI governance into their insider risk programs. As a result, exposure is growing faster than control. A Managed File Transfer solution is a key bulwark against unauthorised data movement. At Generic Systems Australia, we have decades of experience assisting Australian and New Zealand organisations to quickly and affordably deploy the world’s most effective MFT solution, GoAnywhere MFT . If you’d like to chat about how we could assist your organisation in preventing costly data loss errors by employees, let us know . Source: The data in this article is from Ponemon Institute’s Cost of Insider Risks 2026 Report. Previous Next

  • Data Breach Costs Escalate in 2024 | GSA

    < News Data Breach Costs Escalate in 2024 14 Aug 2024 $4.26M! That’s the average cost of a data breach in Australia in 2024, according to new research released by IBM. The figure – a record high – represents a whopping 27% increase since 2020. However, while the average cost of a data breach continues to escalate, the types of cyber breaches experienced by Australian organisations continue to be the usual suspects. Under Attack IBM’s research found that Phishing continues to be the most common type of attack vector , with 22% of breaches starting this way. Stolen or compromised credentials were the second most common, accounting for 17% of breaches. Malicious insiders were responsible for the most costly attacks, at 8% of incidents. It took Australian companies on average 266 days to identify/contain cyber incidents. This lengthy period contributed to high detection and escalation costs , which remain the most expensive aspect of a breach, with post-breach response and lost business the second most costly. Almost a third of data breaches involved data stored across multiple environments : public cloud, private cloud, and on-premises systems. Breaches across multiple environments took 13% longer to identify and contain. Organisations with too few cybersecurity staff paid the heaviest price, with an average cost per breach $2.7M higher than organisations with less exposure. However, involving law enforcement saved some ransomware victims as much as $1.5M in costs. Automated Defences Help Companies which didn’t use security AI and automation experienced significantly higher breach costs ($5.21M) than those which did, and it also took them an additional 99 days to identify and contain breaches. The research found that 65% of surveyed Australian organisations leveraged these technologies. However, attackers too are exploiting new opportunities presented by AI. For example, increasingly convincing deepfakes are enabling ever more effective social engineering attacks. Avoiding Costly Cyber Breaches To protect an organisation’s valuable data, it must be protected when it’s stored and while it’s “in motion”. As the research found, automation can ensure this takes place with the entirety of an organisation’s data transfers. Managed File Transfer (MFT) solutions such as the class-leading GoAnywhere MFT encrypt data at rest and in transit, complying with the highest data security standards (including the US’s and Europe’s HIPAA, HITECH, PCI DSS, SOX, and GDPR). MFT manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols such as SFTP, FTPS, and AS2 to send files securely, and encryption standards such as Open PGP and AES to protect data in transit and at rest. Advanced Threat Protection and Adaptive Loss Prevention add a further layer of defence. SFT Threat Protection enables safe collaboration with external parties, preventing malware from entering your organisation, and reducing opportunities for employees to lose or mishandle sensitive data. Local Expertise Ready to Help Generic Systems Australia are your local experts in Managed File Transfer and Advanced Threat Protection. We’ve assisted hundreds of organisations across the Asia-Pacific region to secure their data and keep cybercriminals at bay. If you’d like to discuss improving your cybersecurity, please feel welcome to contact me , Bradley Copson. I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. Previous Next

  • The Hardest Question About Your Organisation’s Cybersecurity | GSA

    < News The Hardest Question About Your Organisation’s Cybersecurity 18 June 2024 It’s the question every IT manager dreads. “How did you let this happen?!” And the worst time to be asked it is after your organisation has become the latest victim of a cybercrime. Here’s how to avoid it ever being asked… Anxiety Rising Boardroom anxiety about the protection of customer data has been growing across the country. High profile incidents such as the ransomware attacks on Optus and Medibank Private have sensitised the senior leaders to both the risks and costs of negligence. CEOs and CIOs are being quizzed: “Is our organisation doing enough to avoid becoming the next negative headline?” Incidents Rising The most recent report by the Australian Signals Directorate (ASD) showed that cyber attacks are happening far more frequently. On average, a new report is received every six minutes - a 23% increase year on year. One in 5 critical vulnerabilities was exploited within a mere 48 hours. The ASD warned that cybercriminals are constantly evolving their operations against Australian organisations, fuelled by a global industry of access brokers and extortionists. Thousands of businesses failed to fulfil their obligation to protect sensitive customer data, and millions of Australians had their information leaked on the dark web. Costs Rising Also troubling the C-suite is that the costs to businesses of “cyber negligence” are escalating rapidly. The ASD says the cost of cybercrime to businesses has increased by 14% compared to the previous financial year. However, direct financial losses are just one part of the broader costs of “cyber negligence”. For example, Medibank Private’s share price plunged more than 20% in the weeks following its loss of the personal information of 9.7m Australians. The company is facing class actions by both shareholders and consumers alleging breaches of the company’s duty of care to protect consumer information, manage risks and make timely disclosures to shareholders. Optus Communications saw its customer growth halved after its systems were breached. A class action by Slater and Gordon alleges that “Optus failed to protect, or take reasonable steps to protect, the personal information of its current and former customers”. In response to rising consumer concerns, Australia’s Attorney-General, Mark Dreyfus, has flagged “better laws to regulate how companies manage the huge amount of data they collect, and bigger penalties to incentivise better behaviour”. Reflecting the growing risks and costs of cybercrime, cyber insurance premiums are also rising. Email: the Critical Vulnerability According to the Australian Signals Directorate, Business Email Compromise (BEC) remains a key vector for conducting cybercrime. A form of email fraud, cybercriminals target organisations and scam them out of money or goods by tricking employees into revealing important business information, often by impersonating trusted senders. BEC can also involve a cybercriminal gaining access to a business email address and then sending out spear phishing emails to clients and customers for information or payment. IT Managers Stepping Up Responding to these trends, responsible IT Managers are increasingly focussed on preventing their organisations from becoming the next headline victim of cybercrime. In a survey conducted recently by Tenable, IT leaders said that, while the ability to respond to and recover from cyber incidents remained essential, they’re now focusing more on preventing such incidents altogether. The Best Answer to the Hard Question A proactive and layered strategy for storing, transferring and securing data is essential for keeping cyberthieves at bay. Secure managed file transfer, secure content engines, secure digital rights management, and employee education combine to create the optimal way to prevent data theft and cyber breaches. At Generic Systems Australia , we recommend the class-leading secure managed file transfer solution, GoAnywhere MFT , to keep data safe - at rest, and in transit. Coupled with our Advanced Threat Protection Bundle , we enable organisations to safely collaborate without exposing their systems to the risk of malware gaining a foothold within their IT systems. Seamless integration between GoAnywhere MFT and the Clearswift Secure ICAP Gateway provides anti-virus and malware protection, deep inspection of the content inspection, adaptive data loss prevention, and media type protection. Together, they provide three key defences. 1. Prevents file containing malware from being shared. GoAnywhere provides easy anti-virus protection through the Secure ICAP Gateway to scan all inbound file transfers. It can also detect and automatically strip out active content like embedded malware, triggered executables, scripts, or macros used to extract or hold sensitive data hostage. Advanced Threat Protection “sanitises” files and emails without delaying delivery, guarding against today's leading malware and ransomware (e.g. CryptoLocker, CryptoWall, TorrentLocker, Dridex Dyre, BlackEnergy, etc.) and tomorrow's even more sophisticated threat variants. 2. Blocks sensitive data from being shared. Files with Personal Identifiable Information or other sensitive data can be prevented from being transferred. GoAnywhere Threat Protection can inspect file contents, then stop and block files from being shared, based on policies you define. 3. Redacts sensitive information from files before transfer. Advanced Threat Protection can ensure sensitive data is neither transmitted nor received, detecting and/or removing geotags, document properties, email addresses, and other metadata from documents, and replacing sensitive text with asterisks. Using Optical Character Recognition, it can even remove text contained in scanned images. No question: 'Prevention' is Better than 'Cure' Cyber attacks are inevitable . However, falling victim to them is optional . If you’d like to learn more, and be able to comprehensively reassure your Board about the steps you’ve taken to protect your business’s data, reputation and bottom line, please feel welcome to get in touch with me, Bradley Copson ( mailto:bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, and even offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your Local Experts in Secure Managed File Transfer. Previous Next

  • Accountability Gap Creates Cyber Risk | GSA

    < News Accountability Gap Creates Cyber Risk 22 Oct 2024 New research has revealed a concerning gap in accountability for cyber security in many Australian organisations. Security firm Trend Micro polled 100 Australian IT leaders to better understand their attitudes toward Attack Surface Risk Management. They found that most organisations lacked clear leadership buy-in and sufficient resources to measure and mitigate cyber risks. The top three gaps in cyber resilience were: Insufficient staffing for round-the-clock cybersecurity coverage. Inadequate techniques to measure and manage attack surface risks. Not using proven regulatory and other frameworks, such as the NIST Cybersecurity Framework. Only 37% of those surveyed said their organisation had satisfactorily closed each of these exposures. The buck stops… nowhere? Seeking root causes for unclosed gaps in organisational cyber resilience, Trend found that the failures could be traced back to a lack of leadership and accountability at the top of the organisation. More than a third of respondents claimed their leadership didn’t consider cybersecurity to be their responsibility. When asked who does or should hold responsibility for mitigating business risk, respondents gave a variety of answers, indicating a lack of clarity on reporting lines. Nearly a third (32%) said the buck stopped with organisational IT teams. Trend spokesperson, Srujan Talakokkula, said the “lack of clear leadership on cybersecurity, can have a paralysing effect on an organisation, leading to reactive, piecemeal and erratic decision making”. “A lot of that comes down to collaboration and communication across the business,” he said. “Companies need CISOs to clearly communicate in terms of business risk to engage their boards. “Ideally, they should have a single source of truth across the attack surface from which to share updates with the board, continually monitor risk, and automatically remediate issues for enhanced cyber-resilience,” he added. ASIC Cracking Down Trend’s warning comes on the heels of reports that Australia’s corporate regulator is preparing legal actions against some company directors for their lack of governance relating to cyberattacks. ASIC has previously cautioned directors that they need to prepare for hacks, and that sanctions would be applied to those who didn’t. They told The Australian Financial Review that companies wouldn’t get away with paying lip service to cyber defence and must provide evidence they had performed their duties if their organisation was breached by cybercriminals. “With one cyberattack reported every six minutes in Australia, ASIC’s message for directors is to make sure your organisations have appropriate cybersecurity measures in place – this is your responsibility,” a spokesperson said. Not just “an IT Issue” ASIC’s heightened investigations show that cyber security is no longer a fringe issue that can be relegated to technical staff. However, a survey of in-house lawyers by Herbert Smith Freehills recently found many boards are not yet engaged on the topic of cyber resilience. 58% said it would take an actual cyberattack to motivate their organisation to meaningfully improve their data risk management. Owning and managing the risk Rather than letting cyber resilience slip between the cracks in org charts, directors need to put cyber resilience at the top of their companies’ board agendas. Executive management should be requested to report on the measures and investments they’re making to keep cyber thieves at bay. A Managed File Transfer (MFT) solution such as the class-leading GoAnywhere MFT can encrypt data at rest and in transit, complying with the highest data security standards. It manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols and encryption to protect data in transit and at rest. Advanced Threat Protection and Adaptive Loss Prevention add a further layer of defence. SFT Threat Protection enables safe collaboration with external parties, preventing malware from entering an organisation, and reducing the risk of employees losing or mishandling sensitive data. Local Experts On Hand Generic Systems Australia are local experts in Managed File Transfer and Advanced Threat Protection. We’ve assisted hundreds of organisations across the Asia-Pacific region to secure their data and keep cybercriminals at bay. If you’d like to discuss how we can help improve your company’s cybersecurity, please feel welcome to contact me , Bradley Copson. I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. Previous Next

  • How to Protect Your Customers’ Personal Identifiable Information | GSA

    < News How to Protect Your Customers’ Personal Identifiable Information 8 Nov 2024 Protecting customers’ Personal Identifiable Information (PII) has fast become a critical duty of care for every organisation. What is PII, and why is it valuable? PII includes information such as Tax File Numbers, Medicare numbers and other health records, credit card details, student addresses and more. Cybercriminals attempt to access PII for financial gain, either directly – by selling it to data brokers on the dark web – or indirectly, by identity theft. Stolen PII can be used by hackers to open bogus credit card and bank accounts, and to socially engineer attacks using methods such as phishing and ransomware. Organisations need to zealously protect the PII provided to them by customers – not only for the sake of maintaining trust, but also to guard against heavy sanctions for non-compliance by regulators such as ASIC and the ACCC. And those compliance requirements are ramping up. Just last month, Australia’s federal government introduced legislation to parliament which will revolutionise Australia’s cyber security preparedness by imposing new protection standards and reporting requirements on local businesses. International Obligations However, compliance requirements for the protection of PII don’t stop at our national borders. For example, businesses with customers in Europe need to comply with the EU’s General Data Protection Regulation. Local businesses trading in the US need to comply with America’s Health Insurance Portability and Accountability Act, Federal Information Security Management Act, Payment Card Industry Data Security Standard, Gramm-Leach Bliley Act and California Consumer Privacy Act. Rising Risks and Impacts Recent statistics demonstrate the growing risk and significant impact of PII data breaches. Verizon’s Data Breach Investigation Report for 2024 shows that some 60% of data breaches involve some form of personal information. And IBM’s 2024 Cost of a Data Breach Report revealed the global average cost of a data breach now exceeds A$7 million. Protecting PII Stepping up to the needs of PII guardianship requires both technology solutions and sound business practices. Layered defences, with integrated solutions that address encryption, threat protection, and data loss prevention, enable safe collaboration without risking malware, mishandled data, breaches and non-compliance. Given most breaches involve a human element, technology solutions need to be automated and easy for employees to use. Software needs to be able to manage: How access to data is granted; How access is authenticated; How access is tracked and controlled; and How access be speedily revoked, when needed. Layered Protection A standalone managed file transfer (MFT) solution – such as GoAnywhere MFT - is a great first layer of defence. It provides security for files at rest and in-transit. However, integrating Threat Protection as an additional layer enables you to take appropriate action when there’s PII in the data moving in and out of your organisation. Based on rules you predefine, our Advanced Threat Protection Bundle can mask, remove, or permit PII to be moved within your organisation and beyond, via a Secure ICAP Gateway. Medical Case Study A medical enterprise needed to transfer attachments between employees and trading partners containing detailed billing information. They had long used a managed file transfer solution to exchange patient records within and outside the organisation. However, they realised they needed to further safeguard patients’ PII via deep content inspection. The organisation integrated GoAnywhere MFT with Secure ICAP Gateway, adding anti-virus protection as well as structural “sanitisation” of files being transferred. Their combined MFT/Advanced Threat Protection now works to: Inspect for malware and viruses; Intercept content based on threat protection and data loss prevention requirements; Run rule sets such as renaming, script removal, keyword searches to control if content is allowed in or is blocked; and Sanitise PII content to permit ongoing transfer (or block it, if content cannot be adequately sanitised). Thanks to layered protection, the organisation can now exchange patient records free from viruses and malware, while only disclosing a use-appropriate level of PII. Controlling PII Disclosure Adding granular rules-based controls to data handling is the “killer feature” of Advanced Threat Protection. For example: You can permit some specified individuals to transmit PII, but not everyone. You can apply role-based access to PII. You can audit who is sending what information. GoAnywhere MFT’s encryption can be enhanced by limiting who can transfer PII data and what that data contains. The automatic detection and sanitisation of files removes some of the human factor risks so that employees can focus on their work instead of fussing with manual interventions. Augmenting technical solutions with employee training further reduces human factor risks. Here to Help Generic Systems Australia are the Asia-Pacific region’s experts in deploying Managed File Transfer and Advanced Threat Protection. We’ve assisted dozens of organisations to protect their PII and secure their file transfers, while keeping their businesses running smoothly. If you’d like to discuss how we can help you, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how simply we can transition you from outdated protocols and approaches. I can even arrange a simple, zero-cost Proof of Concept. Previous Next

  • Top 5 MFT Trends in 2026 | GSA

    < News Top 5 MFT Trends in 2026 27 Jan 2026 With January’s holidays fading into memory and business getting back to work, it’s time to look ahead at what 2026 holds for data movement—the lifeblood of modern enterprises. As data volumes surge and digital ecosystems grow more complex, the systems responsible for secure file transfers are undergoing a major evolution. Organisations are exchanging more data than ever, and the demand for secure, compliant, automated file movement is rising just as quickly. Managed File Transfer (MFT) has long been the trusted foundation for these exchanges, but the landscape is shifting rapidly thanks to advances in AI, analytics, and cloud technologies. The era of basic point‑to‑point transfers is receding. Today’s MFT platforms must deliver intelligence, transparency, and the ability to scale across increasingly hybrid environments. Here are five major trends that will reshape MFT in 2026 and beyond. 1. Smarter Automation Through AI and Predictive Workflows Automation has always been a core strength of MFT, but AI is set to elevate it further. Organisations will use machine learning to predict issues before they occur, fine‑tune transfer schedules, and boost overall reliability. The file transfer logs and automated workflows generated by GoAnywhere MFT provide invaluable input to AI agents. By analysing this historical data, AI can recommend optimisations for bandwidth, security, and efficiency. 2. Real-Time Visibility and Advanced Reporting for Stronger Decisions In a world defined by big data, visibility is everything. Understanding how files move across an organisation—where they go, how fast they travel, and whether they meet compliance requirements—is essential. That’s why modern MFT platforms must offer real‑time monitoring, detailed reporting, and actionable insights. Dashboards and audit logs give IT teams a live view of transfer activity, helping them track throughput, capacity, SLA performance, and overall system health. This level of transparency is especially valuable for enterprises managing large volumes of sensitive data across multiple departments or global locations. Better visibility leads to better decisions and more efficient operations. 3. Centralised Security and Compliance Control With data privacy regulations tightening worldwide, organisations can no longer rely on a patchwork of tools for encryption, authentication, and data loss prevention. MFT platforms are increasingly becoming unified hubs for enforcing security and compliance. GoAnywhere MFT offers a single, web-based interface to automate, encrypt, and audit file transfers across on-premises, cloud, and hybrid environments. It replaces fragmented scripts and manual processes with a unified platform that secures data in transit and at rest—directly supporting compliance with PCI DSS, HIPAA, GDPR, FISMA, and other regulations. By consolidating these capabilities, organisations reduce compliance complexity and maintain consistent security across every file exchange. 4. Cloud-Ready Deployment and Hybrid Flexibility As organisations modernise their infrastructure, flexible deployment has become a top priority. MFT solutions now need to support on‑premises, cloud, and hybrid environments without compromising control or compliance. This shift toward cloud‑ready MFT reflects a broader trend: businesses want agility without sacrificing security. GoAnywhere MFT is a centralised, platform-agnostic solution that can be deployed across on-premises, cloud, and hybrid environments. It facilitates secure, automated data exchange between internal systems, trading partners, and popular cloud services (e.g. AWS S3, Azure Blob, SharePoint, Salesforce) using built-in Cloud Connectors and lightweight, centrally managed agents. 5. API-Driven Integration and Seamless Interoperability MFT is no longer just about moving files—it’s becoming a central connector between enterprise systems, cloud applications, and external partners. Modern platforms support robust REST APIs and standard protocols such as SFTP, FTPS, HTTPS, and AS2, making it easier to integrate with ERP, CRM, SIEM, and other business systems. This interoperability reduces manual handling, improves data consistency, and streamlines automation across workflows. In an API‑centric world, MFT plays a crucial role in ensuring data flows securely and efficiently across the entire ecosystem. The Next Era of Intelligent File Transfer MFT has been a staple technology for years, but many legacy solutions are reaching end‑of‑life. The next generation of MFT is about more than secure transfers—it’s about enabling intelligent, data‑driven operations. Organisations embracing AI‑enhanced automation, real‑time analytics, compliance‑ready security, flexible deployment models, and API‑first integration will be best positioned to protect their data and stay ahead of operational challenges. The future of file transfer isn’t just secure. I’s smart, adaptive, and deeply connected to the broader digital landscape. Global Trends – Local Expertise At Generic Systems Australia , we’re Australia’s and New Zealand’s experts in helping organisations leverage the world’s leading Managed File Transfer solutions. If you’d like to discuss how we can help you, please feel welcome to get in touch with me . I’m always happy to have an obligation-free chat. Previous Next

  • How to Secure Online Data Acquisition with Secure Forms | GSA

    < News How to Secure Online Data Acquisition with Secure Forms 3 Feb 2026 Whenever you ask someone to complete a form online, you’re asking for their trust. They’re handing over details that your organisation needs. In return, they expect your organisation to handle those details in confidence and with care. From payment methods to sensitive medical histories, people want assurance that their information won’t fall into the wrong hands. Earn Trust with Secure Forms Using HTTPS to transmit form data is a solid baseline. However, there’s an even stronger and more structured alternative - Secure Forms. An add‑on module for GoAnywhere Managed File Transfer , Secure Forms not only protect the information being submitted but also streamline how that information moves through your business. Secure Forms offer far more than encrypted submissions. You gain control over how forms look, how they’re accessed, and how the collected data flows into your internal systems. Public or private URLs, automatic encryption for uploaded files, and seamless workflow integration all come standard. Why It’s Worth Upgrading Choosing a purpose‑built Secure Forms solution doesn’t just improve protection - it boosts efficiency across your processes. With GoAnywhere Secure Forms, you can: Build tailored forms for authenticated users or open access Let users upload supporting documents as needed Support drag‑and‑drop file attachments, automatically encrypted with AES‑256 Define your preferred media types Add Data Loss Prevention (DLP) and Threat Protection Embed forms directly into your website Use Advanced Workflows to route submitted data into platforms like Salesforce or other business systems Trigger email notifications when submissions are received Insert submitted data straight into a database table. How Secure Forms Work At Generic Systems Australia we have years of experience designing custom Secure Forms for organisations. Or, you can DIY… Build and configure: design a form with the fields and options your process requires. Then share access through either a public or restricted URL, giving you full control over who can submit information. Complete and protect: Users fill out the form and attach any necessary files. Every uploaded item is encrypted automatically using AES‑256, ensuring sensitive content stays protected from the moment it’s submitted. Submit and automate: Once the form is sent, GoAnywhere triggers the workflow you’ve defined. This removes manual steps and ensures the information moves quickly to the right system or team. Customisation Without Compromise Secure Forms are built to adapt to your needs. You can fine‑tune nearly every element, from field labels to file‑upload rules, giving you complete control over the data you collect. You’re able to: Configure fields, dropdowns, tooltips, and default values Accept a wide range of file types Submit forms via SOAP or REST APIs, or directly through a URL Display personalised confirmation messages and provide downloadable follow‑up files (such as PDFs) Redirect users to additional forms after submission Enable or disable submission notifications Set limits on file size, type, and quantity Receive alerts via email or SMS Transform submitted data as needed Allow users to save drafts and finish later. Trust the Secure Forms with a Track Record Recognising GoAnywhere’s advanced capabilities, some software vendors have recently sought to emulate the tried-and-tested Secure Forms approach within their less fully-featured MFT solutions. However, trust is established over a long time. GoAnywhere’s Secure Forms were introduced 2016, and so benefit from a decade of refinement and successful implementation. Here to Help Whether it’s designing and implementing your Secure Forms, or talking more broadly about how MFT can help your business become more secure and efficient, Generic Systems Australia is here to help. No need to do deal with hands-off multinationals and their odd time zones - we’re right here in Australia, right now, ready to help. Previous Next

bottom of page