Search Results
184 results found with an empty search
- Privacy Policy | GSA
Generic Systems Australia Privacy Policy Generic Systems Australia (“GSA”, “we” or “us) are committed to protecting the privacy of the BUSINESS information we collect. Our Privacy Policy describes how we collect and use your business information where we are acting as a data controller (i.e. where we decide how and why your information is used). This Policy does not apply to personal information we hold as an employer or data processor when acting on behalf of, and in accordance with the instructions of our customers through our customers’ use of GSA services and the software licenced via us. We may make changes to our Privacy Policy from time to time to take account of changes to our standard practices and procedures or where necessary to comply with new laws and regulations. If we make changes, we will update the “last updated” date in the following paragraph, and the latest version will always be available on our website. This Policy was last updated on 1 June 2024 . We encourage you to check our website from time to time to ensure that you are aware of our current Privacy Policy. Types of personal information we collect The types of personal information we collect will depend on the circumstances in which the information is collected. However, the types of personal information we collect and hold about you may include: identifying information, such as your name; contact information, such as your address, email address and telephone/mobile number; usernames and passwords that you create when registering for an account with us; your organisation and position, where your organisation has business dealing with us; information about your occupation and employer organisation; information about how you use the products or services we provide to you; records of our communications with you, such as telephone, email, SMS, online and in person communications; if you visit our offices, images of you which may be captured on CCTV; other information that you provide us during the course of business; and other information that is capable of identifying you. You are always welcome to provide us with comments, queries and feedback in relation to our products and services. We may record and monitor telephone calls and other communications between you and us for training, quality control and compliance purposes. When you communicate with us, we may collect additional information including the languages you speak, how best to manage communications with you, and information about your dealings with us. If you participate in a survey or competition, or respond to a feedback request, we will collect the information that you provide in doing so, and associated information such as when and how you submitted the response. We collect information about people who are our contractors, suppliers and business partners, or who are employed by our contractors, suppliers and business partners. When you do business with us, we may collect information about you from others, such as from others who do business with you. Our website may contain links to third party websites. We are not responsible for the privacy practices or the content of those third-party websites. The privacy practices applicable to those third-party websites may differ substantially from ours, so we advise you to read the privacy policy of those websites before using them. Log data, device and location information When using our products and services (including our website), we will collect information about you and about your use of our products and services, such as which services you use and how you use them. We will collect information such as: user name and password; device information, such as the model and ID of the device you use, operating system, telephone number and mobile phone network; server log information, such as details of how you used the products or service (including our website), IP address, hardware settings, browser type, browser language, the date and time of your use and referral URL; and your browser or your account using cookies (see below for further information about our use of cookies). Our products and services (including our website) may also detect and use your IP address or domain name for internal traffic monitoring and capacity management purposes or to otherwise administer the products and services. The patterns of usage of visitors to the online services may be tracked for the purposes of providing improved service and content based on aggregate or statistical review of user traffic patterns. How we collect personal information We may collect personal information about you in the following ways: when you order products or services from us; when you use our online services and other products and services (including our website); when you visit our sites or offices; when you submit a query or request to us; when you respond to a survey that we run or fill in forms on our website; by tracking your use of our products and services (including our website); from third parties who are entitled to disclose that information to us; from publicly available sources; from online sources (including social media platforms and providers like LinkedIn); suppliers of information products and services (e.g. companies that consolidate data from multiple public sources); or other lawful means. From time to time, we may use third-party online services to collect personal information such as your name and email address or telephone number to administer online competitions, customer feedback and surveys. If you provide us with personal information about someone else, you must only do so if that person has provided their permission for you to do so. Cookies We may also collect personal information about you and your use of our website, products and services using cookies. Amongst other things, we use cookies to monitor and observe your use of our website, products and services, compile aggregate data about that use, and provide you with a more effective service (which may include customising parts of our website based on your preferences and past activities on that website). How we use personal information and our legal basis for using your personal information We use personal information that we collect about you to: verify your identity when you are dealing with us; maintain our relationship with you; determine your eligibility for any of our products or services; answer your queries and requests; enable us to provide you or your organisation with our products and services; use in accordance with any request or instructions from you; make special offers related to our products or services that we think may be of interest to you; keep you informed about our activities and notify you of changes to our products or services; monitor use of our products and services (including our website); provide better products, services and information to our customers and to the community; assess, operate, maintain, upgrade and improve our products and services (including our website); maintain and update our records; carry out market analysis and research; carry out planning and forecasting activities and other internal business processes; manage and resolve any legal or commercial complaints or issues (including debt recovery); meet our obligations and perform our functions under applicable laws and agreements; comply with our legal and regulatory obligations; use as otherwise required or authorised by law or government agency. We may also use your personal information for any other purpose as authorised by you. Our legal basis for the above activities includes: consent; necessary for performance of a contract; necessary for our legitimate interests or the legitimate interests of a third party; necessary for compliance with our legal obligations. . When we have legitimate interests As set out above, in some cases we use your information where it is necessary for our legitimate interests or the legitimate interests of a third party. This includes where the use of your personal information is necessary to: administer our operations and business in an efficient and effective way including undertaking management planning and improving and developing our products and services; for our authorised third-party service providers or others to perform services on our behalf, such as payment processing and data analysis; understand and respond to queries, complaints and feedback; send direct marketing to business contacts; transfer personal information in relation to an actual or proposed sale, transfer or reorganisation of all or part of our business and the acquisition of the business; analyse and optimise our website's content by updating it in accordance with your preferences; ensure network and information security; and enforce our legal rights and manage any dispute and legal claims and take legal or other professional advice. Direct marketing and research If you have given us your consent or if we are otherwise legally entitled to do so, we may use and disclose your personal information for marketing purposes (but we will not sell your personal information to any third party) including contacting you about our products and services (including our website), the products and services of other people, or related special offers from our business partners, that we think may be of interest to you. This information may be sent to you by email, SMS or by other means. We may use your personal information to carry out consumer and market research, compile demographics and perform other research and analysis so that we can develop and implement initiatives to improve our services, improve the design, construction and operation of our products and identify people likely to be interested in our products and services. You can opt-out of receiving marketing communications from us at any time by following the “unsubscribe” link in any communication (or sending a return email with “un subscribe in the Subject line” from us or contacting us using the contact details below. Unsubscribing from marketing communications will not stop service-related communications from us, such as administrative alerts in relation to your account. De-identification We may de-identify information about you so that the information can no longer be used to identify you (anonymisation). We may use and disclose de-identified information in the course of our business (including in any promotional or marketing material). Aggregation We may aggregate information on the use of our products and services (including our website) in such a way that the information can no longer be related to identifiable individuals. We may use and disclose aggregated information in the course of our business (including in any promotional or marketing material). Who we disclose personal information to We may disclose your personal information to: your representatives, advisers and others you have authorised to interact with us on your behalf; controlled entities within our corporate group; our team members and third parties including business partners, consultants, contractors, suppliers, service providers, professional advisers and agents who need the information to assist us with conducting our business activities; prospective purchasers of all or part of our business or shares in our company or a related entity; government agencies or authorities, regulators, law enforcement agencies and other parties where authorised or required by law who ask us to disclose that information and to which we are legally required to disclose your personal information; parties identified at the time of collecting your personal information or as otherwise authorised by you. How we maintain and secure your personal information Security is a priority for us when it comes to your information. We take reasonable steps to ensure that any of your personal information which we hold is accurate, complete and up to date. These steps include promptly updating personal information when we are advised that personal information has changed, checking our contact lists for accuracy, and providing individuals with a simple means to update their personal information. On rare occasions, we also keep hard copy records of this personal information in physical storage facilities. We use a range of physical and technical security processes and procedures to protect the confidentiality and security of the information that we hold, and we update these from time to time. These measures include: implementing physical and technical access and security controls to our physical and electronic databases, such as security procedures for access to our business premises; and technological security procedures including password protection, network firewalls, encryption, intrusion detection and site monitoring where practicable to do so. We also take steps to monitor access to and modification of your information by our team members and contractors, and ensure that our team members and contractors are aware of and properly trained in their obligations for managing your privacy. However, the internet is not a secure environment and no matter what physical and technical security processes and procedures are used we cannot guarantee the security of your personal information. You also play an important role in keeping your information secure by maintaining the confidentiality of any usernames and passwords you use with our products and services (including our website). How long we store your personal information for Personal information is only retained for as long as it is needed for the purpose for which it was collected or as required by law. After the expiry of this period, we will take reasonable steps to make sure its de-identified or destroyed. The criteria used to determine appropriate retention periods for personal information include: the length of time we have an ongoing business relationship with you; the amount, nature and sensitivity of the personal information; whether we have a legal obligation to retain personal information; and whether retaining the personal information is necessary to resolve legal disputes (including the establishment, exercise or defence of legal claims). Your rights Depending on where you are located, you may have a right to: request a copy of your personal information. In relation to personal data you have supplied to us, and which is held by us for the purpose of entering into a contract between us or on the basis of your consent, you may be entitled to ask us for a copy of this information in a structured, commonly used and machine readable format so that you can reuse it or share it with other organisations; object to our processing of your data and ask us to restrict the use of your information and to delete it; or correct or rectify any personal information that is out-of-date, incorrect, incomplete or misleading. Such requests should be submitted to us in writing using the contact details below. We may ask you to verify your identity before responding to your request. We will respond to your request in a timely manner and action your request in accordance with applicable data protection laws. You have a right to withdraw your consent where you have previously given us consent to use your personal information (e.g. to receive marketing communications). You can do this by contacting the Privacy Officer using the contact details below or, where the consent relates to marketing, by unsubscribing using the link in any of our communications. Complaints If you have a concern about your privacy or how we have collected or handled your personal information, please contact our Privacy Officer using the contact details below. If you wish to make a complaint, you should forward a written complaint to our Privacy Officer using the contact details below. In the complaint, please include your contact details (such as email address, name, address and telephone number) so we can contact you for further information and clearly describe the complaint. We will respond to your query or complaint within a reasonable time and in accordance with applicable data protection laws. If you are not satisfied with our response, you may contact us to discuss your concerns or may raise a complaint with your local data protection authority through their official channels. In Australia it is the Office of the Australian Information Commissioner, in New Zealand it is the Privacy Commissioner. Contact us If you require further information this Privacy Policy or Generic Systems Australia’s management of your personal information please contact us via the following contact details: Privacy Officer Phone: +61 2-9959-2239 Email: info@gensys.com.au
- 'Twas the Week Before Christmas... | GSA
< News 'Twas the Week Before Christmas... 16 Dec 2024 Previous Next
- Small-to-Medium Businesses the Big Targets for Cybercrime | GSA
< News Small-to-Medium Businesses the Big Targets for Cybercrime 17 Mar 2024 While cyberattacks on large corporates make the headlines, it’s small to medium businesses who are being hit the hardest. The 2024 Sophos Threat Report found that the sophistication of cyberthreats faced by small to medium organisations is often on par with those used to attack large enterprises. Apparently, while the amount of money that can be stolen is less than that available from a larger organisation, cybercriminals more than make up the difference in the volume of thefts. More vulnerable, greater impact Sophos say that organisations with fewer than 500 employees are not only more vulnerable to cybercriminals, they also suffer more proportionally from the results of cyberattacks. The greater vulnerability is due to a lack of experienced security operations staff, underinvestment in cybersecurity, and smaller information technology budgets. And, when these businesses are hit by cyberattacks, the expense of recovery forces many to close. Attractive Ransomware Targets 90% of the world’s businesses are small- and medium-sized. In Australia, these businesses contribute more than 60% of the nation’s overall GDP. According to The Institute for Security and Technology’s Ransomware Task Force, 70% of ransomware attacks target small to medium businesses. Other Prevalent Threats Beyond Ransomware, a variety of other cyberthreats also pose an existential threat to small and medium businesses. Data theft is the focus of most malware targeting small and medium businesses. Password stealers, keyboard loggers, and other spyware make up nearly half of malware detections. Credential theft through phishing and malware can expose small businesses’ data on cloud platforms and service providers, and network breaches can be used to target their customers as well. Web-based malware distribution — through “malvertising” or malicious search engine optimisation — is also on the rise. Unprotected devices connected to organisational networks — including unmanaged computers without security software installed, improperly configured computers and systems running software fallen out of support by manufacturers — are a primary point of entry. Attackers are increasingly abusing device drivers — both vulnerable drivers from legitimate companies, and malicious drivers that have been signed with stolen or fraudulently obtained certificates. Email attacks have begun to feature more active engagement with targets over email, using a thread of emails and responses to make their lures more convincing. Attacks on mobile device users, including social engineering-based scams tied to the abuse of third-party services and social media platforms, have grown exponentially, affecting individuals and small to medium businesses. Your Data is Their Target The greatest cybersecurity challenge facing organisations of all sizes is data protection. More than 90% of attacks reported to Sophos involved data or credential theft, with methods ranging from ransomware attacks, to data extortion, unauthorised remote access, and simple data theft. Compromised business email userids are also a substantial problem for small to medium businesses, and the next most prevalent threat after ransomware. Stolen credentials, including browser cookies, can be used to compromise business email userids, provide unauthorised access to third-party services such as cloud-based finance systems, and entry to internal resources. Turning Your Own Tech Against You Sophos said that, as 2023 progressed, they observed an increase in the use of remote execution of ransomware. Unmanaged devices on an organisation’s own network were hijacked to encrypt files on other systems via network file access. Ransomware and other malware developers are increasingly using cross-platform languages to build versions for not only Windows, but also macOS and Linux operating systems. Small and medium businesses also need to be concerned about the security of the services they depend upon to manage their business. Attacks against managed service providers became an enduring part of the ransomware playbook in 2023. How to Protect Your Business Criminal syndicates count on smaller organisations to be less well-defended and to not have deployed modern, sophisticated tools to protect their users and assets. The key to successfully defending against their threat is to use a multi-layered strategy that includes robust data transfer protection, staff education, and multifactor authentication. A Secure Managed File Transfer solution such as the class-leading GoAnywhere MFT addresses the many risks of ad hoc techniques through a holistic approach to security, including: Automatic authentication, encryption and decryption User access controls Auditing and Reporting, and Industry standards compliance. If you’d like to beef up your organisation’s defences against the increasing threats posed by cybercriminals , please feel free to contact me , Bradley Copson (mail to: bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, and explain how we can quickly and affordably transition you from your existing approaches without disrupting your business. I’ll even offer you a zero-cost Proof of Concept. Bradley Copson Business Manager Generic Systems Australia Your Local Experts in Secure Managed File Transfer #MFT #managedfiletransfer #securefiletransfer #sft #cybersecurity #datatransfer Previous Next
- New Cyber Laws Impose New Business Obligations | GSA
< News New Cyber Laws Impose New Business Obligations 16 Oct 2024 Australia’s federal government last week introduced much-anticipated legislation to parliament which will revolutionise Australia’s cyber security preparedness. If passed as expected, the new laws will impose new compliance and reporting requirements on local businesses. Govt Intent Designed to protect businesses and consumers from the growing scourge of cyber crime, the Cyber Security Act 2024 is Australia’s first standalone cyber security legislation. Introducing the Act, Minister for Cyber Security, Tony Burke, said that – like IT systems themselves - legislation needed to be hardened to protect national security and economic stability. He described the package as providing a clear legislative framework for contemporary, whole-of-economy issues which would identify and respond to new and emerging cyber threats. Seven Initiatives There are seven initiatives under the 2023-2030 Australian Cyber Security Strategy which collectively address gaps in current legislation to: Mandate minimum cyber security standards for smart devices; Introduce mandatory ransomware reporting for certain businesses to report ransom payments; Introduce a ‘limited use’ obligation for the National Cyber Security Coordinator and the Australian Signals Directorate; and Establish a Cyber Incident Review Board. SOCI Reforms The legislation will also progress and implement reforms under the Security of Critical Infrastructure Act 2018 (SOCI Act): Clarifying existing obligations in relation to systems holding business critical data; Simplifying information sharing across industry and Government; Introducing Government powers to direct entities to address serious deficiencies within their risk management programs; and Moving regulation for the security of telecommunications into the SOCI Act. The SOCI Act reforms will also expand current Government assistance measures to ensure Government can step in as a last resort to manage the consequences of significant incidents. Govt Empowered Changes to government assistance measures will empower the Government to gather information or direct entities to take or refrain from certain actions, on authorisation from the Minister for Home Affairs, in response to a serious incident. Characterising the legislation as a significant step towards his government’s vision of becoming a world leader in cyber security by 2030, Tony Burke said: “We know government has to lead the way on cyber, but we also know we can’t do it alone. This is why these new laws have been consulted extensively with business. “To achieve Australia’s vision of being a world leader in cyber security by 2030, we need the unified effort of government, industry and the community.” New Business Obligations Legal firm A&O Shearman cautioned that the new Cyber Bill will introduce several new critical areas of compliance and reporting. It said businesses must take heed of these new obligations, and ensure they put in place robust cyber security measures. • Ransomware Reporting Obligations : Entities impacted by cyber security incidents and making ransomware payments must report these payments within 72 hours. The aim of this obligation is to improve the detection and response to ransomware incidents, thereby reducing their impact. Failure to report can result in civil penalties. • Security Standards for Smart Devices : The Cyber Bill mandates that manufacturers and suppliers of smart devices comply with specified security standards. This is crucial for businesses involved in the production or distribution of smart devices. Non-compliance can result in compliance notices, stop notices, and recall notices. These measures are designed to ensure that smart devices are secure and do not pose a risk to users. • Protected or Limited Use of Incident Information : The Cyber Bill includes provisions to ensure that information provided about cyber security incidents is used or disclosed only for permitted purposes, with strict limitations on using this information for civil or regulatory actions against the reporting entity. • Cyber Incident Review Board : The Cyber Bill establishes a Cyber Incident Review Board tasked with reviewing certain cyber security incidents and making recommendations. The Board has the authority to request and require documents from entities. Non-compliance may result in civil penalties. A&O Shearman said organisations should make sure they implement security standards in compliance with the specified security measures currently provided for in the Cyber Bill, and make sure they can comply with the ransomware reporting obligations, including the timelines foreseen in the Cyber Bill. Meeting New Requirements Criminal syndicates target organisations which haven’t adequately protected their data transfers and systems access. Defending against them requires a multi-layered strategy which includes robust data transfer protection, multifactor authentication and employee training. Managed File Transfer (MFT) solutions such as the class-leading GoAnywhere MFT encrypt data at rest and in transit, complying with the highest data security standards - including the US’s and Europe’s stringent HIPAA, HITECH, PCI DSS, SOX, and GDPR. MFT manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols such as SFTP, FTPS, and AS2 to send files securely, and encryption standards such as Open PGP and AES to protect data in transit and at rest. GoAnywhere MFT also provides audit reports, which will help organisations meet new reporting and compliance needs. All file transfer and administrator activity is stored and easily searchable. To help organisations report on file transfer activity and remain compliant with the new legislation, these audit logs can be automatically generated and provided as PDFs. Advanced Threat Protection and Adaptive Loss Prevention add a further layer of defence. SFT Threat Protection enables safe collaboration with external parties, preventing malware from entering an organisation, and reducing the risk of employees losing or mishandling sensitive data. Local Expertise on Hand Generic Systems Australia are your local experts in Managed File Transfer solutions. We’ve assisted dozens of organisations across the Asia-Pacific region to secure their data and keep cybercriminals at bay. If you’d like to discuss improving your cybersecurity, please feel welcome to contact me , Bradley Copson. I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. Previous Next
- Free Cyber Health Check from Australian Signals Directorate | GSA
< News Free Cyber Health Check from Australian Signals Directorate 16 Oct 2025 Australia’s leading government agency combatting cybercrime, the Australian Signals Directorate, has launched a free tool to help small businesses, not-for-profits and individuals assess their basic cyber security. The tool takes just five minutes to complete, its assessments are anonymous, and it provides good advice on how to protect yourself and your organisation from cyber criminals. At Generic Systems Australia we have decades of experience helping local organisations combat keep cyber thieves at bay through deployment of the world’s best Managed File Transfer solution, GoAnywhere MFT . If you’d like a no-obligation discussion about how we could help you – or a health check on your existing GoAnywhere deployment - please feel welcome to get in touch with me. Previous Next
- INFO TECH REPORT 24 | GSA
Independent Info-Tech MFT Quadrant Report (2024) Once again, respected tech analysts Info-Tech have evaluated the most popular MFT software and vendors, and found that GoAnywhere is the top MFT solution. Here’s their 2024 independent report. To receive a Complimentary Copy of the Report, simply submit your email address below: First name Last name Enter your email address Phone You'll receive the 'Independent Info-Tech MFT Quadrant Report' shortly! RESOURCES Receive Report HOME
- Nine Real World Experts Share How They’re Leveraging GoAnywhere | GSA
< News Nine Real World Experts Share How They’re Leveraging GoAnywhere 13 Feb 2025 A great way to learn about the value of a Managed File Transfer (MFT) solution is to hear from those who use one. Fortra have published a useful eBook “MFT's Role in Business: IT Leaders Weigh In” in which nine IT and security professionals share their experiences using Fortra’s GoAnywhere MFT . Meet the Experts · Chris Payne, Director of Strategic Alliances & Technical, Pro2col · Paulina Sumska, Regional & Supplier Security Coordinator, Canon · Heath Kath, Lead Solutions Engineer, Fortra · Christian Toon, Head of Cyber Professional Services, Pinsent Masons · Antonio Sanchez, Principal Evangelist, Fortra · Jay Triche, Senior Programmer/Analyst, Lamps Plus · Steve Merrigan, IT Operations Senior Specialist, BT · Loveleen Trotter, Solutions Architect, Fletcher Building · Matthew Hankinson, Infrastructure Manager, Seven Network MFT in Action MFT enables organisations to transfer large quantities and sizes of files securely and quickly, every time. It: · leverages secure file transfer protocols; · encrypts file transfers; and · employs authentication and authorisation to their recipients safely. However, as the class-leading MFT , GoAnywhere MFT goes several steps further. It turbo-charges your organisation’s efficiency by replacing repetitive, manual processes with centralised, automated, and fully-compliant ones. Unsafe legacy scripts can be replaced with automated workflows. Files transfer securely, when and where you say, and without a team of people spending valuable resources - every time - to ensure it happens. Large files can be sent quickly. GoAnywhere’s built-in transfer technologies accelerate file transfers at speeds up to 10Gbps - hundreds of times faster than typical FTP. And it achieves that even in environments experiencing packet loss or latency. GoAnywhere also features bundles for threat protection and secure collaboration. You can secure all incoming files against malware, encrypt all outgoing files, and even control access permissions once they’ve left your network. Encryption and compliance are further benefits. Files stay safe at rest and in motion, which builds trust and credibility across supply chain partners. With so much data transfer occurring in cloud environments, GoAnywhere MFT deploys on AWS, Microsoft Azure, and other cloud computing platforms to give you the same level of coverage no matter where you keep – or send – your data. Leveraging MFT As the experts explain in the eBook, organisations can scale their use of GoAnywhere’s features and technologies, starting with the basics and then exploring and expanding the solution’s more advanced features to supplant operations traditionally performed by specialised middleware. From integrating with web services to drive automation, to customising unique solutions complete with bespoke emails, nearly any file transfer capability is possible. If you’re wondering “could an MFT do that?”, this eBook may well have the answer. And with GoAnywhere MFT, that answer most often is “Yes!” If you’d like a complimentary copy of “MFT's Role in Business: IT Leaders Weigh In”, just let us know via the link on our Resources page. Previous Next
- BEST PRACTICES FOR CLOUD MFT | GSA
Best Practices for Cloud MFT Data is the lifeblood of modern business. And most modern organisations rely to some extent on the Cloud as they transfer files between employees, trading partners, and customers. However, permitting your precious data to go “off-prem” increases the risk it will be intercepted or accessed by cybercriminals. To help you guard against cybercrime, here are best practices for safeguarding your data on its way to, from and in, the Cloud. Start with the Right Cloud Provider Cloud providers come in all sizes, capabilities … and risk profiles. Ensure your Cloud provider uses robust security protocols and safeguards. Do they utilise the latest encryption protocols, and offer strong user authorisation and access controls? Do their data transmission and storage approaches meet the regulatory requirements for your industry? What performance levels does your Cloud provider commit to? Can they quickly and reliably receive, store and transmit your business-essential files? Can your Cloud provider easily integrate with your existing systems? Can your Cloud provider offer an appropriate level of technical support when you need it? Select the Right Type of Cloud Cloud computing comes in three basic flavours… Public, Private, and Hybrid. Each offers differing degrees of security and risk. 1. Public Clouds may offer relatively robust security features. However, they must be appropriately configured to offer protection for your files. 2. Private Clouds provide enhanced levels of control and isolation. However, these come at a higher cost. 3. Hybrid Clouds combine elements of both, enabling you to balance security and cost-efficiency. Meet Industry Compliance Requirements Some industries are subject to heightened regulatory requirements regarding data storage and transfer. Even when using an “off-prem” Cloud provider, you remain responsible for meeting those requirements. Failing to utilise an appropriately compliant Cloud environment can lead to fines, law suits, loss of customers, loss of supplier trust, and reputational damage. Maintain Control and Data Sovereignty Governments increasingly require organisations to maintain authority and control of data within their jurisdictional boundaries – aka, “data sovereignty”. Private and Hybrid Cloud environments provide inherently greater authority over where data is stored, access permissions, and retention policies. In this way, they enable organisations to better navigate myriad data sovereignty mandates and evolving compliance standards . Utilising Managed File Transfer as a Service (MFTaaS) MFTaaS is an approach which can help organisations streamline their file transfer processes, while offering robust security, scalability, reliability, anywhere access and cost-effectiveness. However, be sure to confirm your MFTaaS solution offers robust encryption and security protocols, can scale grow with your organisation's needs, and complies with the industry regulations relevant to your business. Technical Best Practices for Cloud File Transfers Ensure secure and efficient transmission of data in a Cloud environment by observing these technical requirements: 1. Data Encryption at Rest and in Transit : Utilise encryption protocols like SSL/TLS for data in transit and encryption solutions provided by your Cloud provider for data at rest. In private Cloud settings, you can also leverage approaches like Bring Your Own Key (BYOK) or Hold Your Own Key (HYOK). 2. Data Loss Prevention (DLP) : A robust DLP solution helps prevent unauthorised data transfers and leakage by monitoring data in real-time and preventing it from being transmitted outside of your organisation. 3. Intrusion Detection Systems (IDS) : By monitoring and alerting IT security teams to any suspicious file transfer behaviour, IDS helps nip security breaches in the bud. Employee Best Practices Having your team follow best practices is also essential to secure data transfer and storage. 1. Staff Training : Teach your employees to recognise data security risks, and how to avoid them. Place special focus on phishing and social engineering – two of the most prevalent cybercriminal threats. 2. Multi-Factor Authentication (MFA) : Enforce MFA for file transfers, and utilise phishing-resistant techniques. 3. Access Control : Restrict access to files and systems, and provide users with only the minimum level of access necessary to perform their role. Implement a regular cycle of access permission reviews. Audit, Backup and Recovery Best Practices Continuous monitoring and auditing of Cloud file transfers not only maintains the security of your data, it also helps identify and mitigate potential threats, while monitoring on-going compliance. Log Analysis and Security Information and Event Management (SIEM) proactively monitor transfers, and enable your IT team to react quickly to emerging threats and incidents. Data backup and disaster recovery are the final critical components of your comprehensive safeguards against data loss in Cloud file transfers. They ensure that, if a disaster occurs, your organisation can provide business continuity by maintaining the availability and integrity of data. Making the Cloud Safe for File Transfers By following these best practices, the Cloud can be an efficient, reliable and secure element within your organisation’s overall data transfer approach. At Generic Systems Australia, we use and recommend the class-leading (link) managed file transfer solution, GoAnywhere MFT, for the way it integrates with the Cloud and embeds best practices. Providing peace of mind, by securing sensitive files in transit and at rest, GoAnywhere automates and encrypts data between an organisation and its trading partners, protecting it from unnecessary vulnerabilities while improving efficiency and reducing costs. If you’d like to learn more about GoAnywhere MFT , our Business Manager, Bradley Copson, would be happy to offer you an obligation-free discussion , a no cost trial, or even a Proof of Concept for your business RESOURCES HOME
- GoAnywhere: the Swiss Army Knife of Systems Connectivity | GSA
< News GoAnywhere: the Swiss Army Knife of Systems Connectivity 29 July 2025 When all the buzzwords are said and done, the single biggest advantage of using information technology is enhanced efficiency through automation and connectivity . It’s in precisely these areas where GoAnywhere MFT shines. While GoAnywhere is a Managed File Transfer solution, its usefulness is far broader. It’s a “Swiss Army Knife” for automatically moving files between an organisation’s systems, suppliers and customers. Whether you’re moving data between your ERP , CRM , HRM , SCM , CMS , BI , BPM and ITSM systems, GoAnywhere helps you seamlessly interconnect their outputs and inputs, amplifying IT’s overall speed and efficiency benefits across your business. GoAnywhere not only monitors your various solutions for new output, it also translates that output into the new formats required by your other systems before routing the translated files to their destinations. Automatically. Comprehensive Extract Transfer Load features enable data values to be mapped, formatted and modified between source and target files. Automating with MFT Automation is where GoAnywhere really shines vs less capable Managed File Transfer solutions. It manages recurring and high-volume file transfers and eliminates the need for manual data processing. Surprisingly, there are still some organisations which continue to be dependent on tedious manual file transfer processes, complicated system configurations and manual batches. The reason they remain reliant on such risky approaches is often lost to the past - there’s simply no-one left on staff who was around at the time their systems were initially installed. “However it works … it does work” seems to be the thinking. “If it ain’t broke … don’t fix it” can be seductive when there’s lots else demanding your attention. However, failing to understand file transfer dependencies, and disregarding the need to make them resilient, is a dangerous way to run a business. Small changes in file formats and security protocols, or the unforeseen consequences of a software version update, can cause havoc. Background legacy scripts, homegrown processes, and outdated PC tools are prone to fail for the simplest of reasons. That means systems downtime, lost revenue, distrustful suppliers and unhappy customers. Minor Investment, Major Gain Making the relatively minor investment of time and expense to automate file transfers simplifies and streamlines critical everyday tasks, eliminates human error, saves time and cuts costs. GoAnywhere is more than just a file moving tool. It can monitor folders both on-premises or in the cloud, send you emails and SMS alerts when triggered events occur, and test and debug your automatic file transfer workflows. And, should you ever need to trace the movement of your data – say, for auditing or compliances purposes - GoAnywhere’s comprehensive logging tools and centralised dashboard make this easy. How It Works With GoAnywhere installed, a simple drag-and-drop interface defines how files will be securely and reliably moved between internal systems, supply chain partners and customers. It’s much easier than writing manual scripts, and no programming skills are required. GoAnywhere’s automation enables systems to execute each step of a business process one after the next without human intervention. File movements are monitored and controlled, including sending, retrieving and delivering data. You can schedule when files should be sent or retrieved between systems, users, trading partners, applications, and the cloud. Your business processes are made significantly more efficient. Here to Help At Generic Systems Australia , we’re Australia and New Zealand’s experts in helping business take advantage of every one of GoAnywhere’s many capabilities. We’ve assisted dozens of organisations to make their file transfers resilient, secure and reliable, boosting their efficiency. If you’d like to discuss how we can deliver these advantages to your organisation, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how easily we can transition you from your current approach to a new world of productivity. At Generic Systems Australia, we’re your local experts in data transfer. Previous Next
- CYBERSECURITY 2024 | GSA
2024 Cyber Insiders Survey Fortra's "2024 State of Cybersecurity Survey" shares the invaluable insights of more than 400 cybersecurity professionals from across the globe, including many in Australia, New Zealand and the Asia-Pacific region. Here’s their 2024 report. To receive a Complimentary Copy of the Report, simply submit your email address below: First name Last name Enter your email address Phone You'll receive the '2024 Cyber Insiders Survey Report' shortly! RESOURCES Receive Report HOME
