Search Results
184 results found with an empty search
- How to Protect Your Customers’ Personal Identifiable Information | GSA
< News How to Protect Your Customers’ Personal Identifiable Information 8 Nov 2024 Protecting customers’ Personal Identifiable Information (PII) has fast become a critical duty of care for every organisation. What is PII, and why is it valuable? PII includes information such as Tax File Numbers, Medicare numbers and other health records, credit card details, student addresses and more. Cybercriminals attempt to access PII for financial gain, either directly – by selling it to data brokers on the dark web – or indirectly, by identity theft. Stolen PII can be used by hackers to open bogus credit card and bank accounts, and to socially engineer attacks using methods such as phishing and ransomware. Organisations need to zealously protect the PII provided to them by customers – not only for the sake of maintaining trust, but also to guard against heavy sanctions for non-compliance by regulators such as ASIC and the ACCC. And those compliance requirements are ramping up. Just last month, Australia’s federal government introduced legislation to parliament which will revolutionise Australia’s cyber security preparedness by imposing new protection standards and reporting requirements on local businesses. International Obligations However, compliance requirements for the protection of PII don’t stop at our national borders. For example, businesses with customers in Europe need to comply with the EU’s General Data Protection Regulation. Local businesses trading in the US need to comply with America’s Health Insurance Portability and Accountability Act, Federal Information Security Management Act, Payment Card Industry Data Security Standard, Gramm-Leach Bliley Act and California Consumer Privacy Act. Rising Risks and Impacts Recent statistics demonstrate the growing risk and significant impact of PII data breaches. Verizon’s Data Breach Investigation Report for 2024 shows that some 60% of data breaches involve some form of personal information. And IBM’s 2024 Cost of a Data Breach Report revealed the global average cost of a data breach now exceeds A$7 million. Protecting PII Stepping up to the needs of PII guardianship requires both technology solutions and sound business practices. Layered defences, with integrated solutions that address encryption, threat protection, and data loss prevention, enable safe collaboration without risking malware, mishandled data, breaches and non-compliance. Given most breaches involve a human element, technology solutions need to be automated and easy for employees to use. Software needs to be able to manage: How access to data is granted; How access is authenticated; How access is tracked and controlled; and How access be speedily revoked, when needed. Layered Protection A standalone managed file transfer (MFT) solution – such as GoAnywhere MFT - is a great first layer of defence. It provides security for files at rest and in-transit. However, integrating Threat Protection as an additional layer enables you to take appropriate action when there’s PII in the data moving in and out of your organisation. Based on rules you predefine, our Advanced Threat Protection Bundle can mask, remove, or permit PII to be moved within your organisation and beyond, via a Secure ICAP Gateway. Medical Case Study A medical enterprise needed to transfer attachments between employees and trading partners containing detailed billing information. They had long used a managed file transfer solution to exchange patient records within and outside the organisation. However, they realised they needed to further safeguard patients’ PII via deep content inspection. The organisation integrated GoAnywhere MFT with Secure ICAP Gateway, adding anti-virus protection as well as structural “sanitisation” of files being transferred. Their combined MFT/Advanced Threat Protection now works to: Inspect for malware and viruses; Intercept content based on threat protection and data loss prevention requirements; Run rule sets such as renaming, script removal, keyword searches to control if content is allowed in or is blocked; and Sanitise PII content to permit ongoing transfer (or block it, if content cannot be adequately sanitised). Thanks to layered protection, the organisation can now exchange patient records free from viruses and malware, while only disclosing a use-appropriate level of PII. Controlling PII Disclosure Adding granular rules-based controls to data handling is the “killer feature” of Advanced Threat Protection. For example: You can permit some specified individuals to transmit PII, but not everyone. You can apply role-based access to PII. You can audit who is sending what information. GoAnywhere MFT’s encryption can be enhanced by limiting who can transfer PII data and what that data contains. The automatic detection and sanitisation of files removes some of the human factor risks so that employees can focus on their work instead of fussing with manual interventions. Augmenting technical solutions with employee training further reduces human factor risks. Here to Help Generic Systems Australia are the Asia-Pacific region’s experts in deploying Managed File Transfer and Advanced Threat Protection. We’ve assisted dozens of organisations to protect their PII and secure their file transfers, while keeping their businesses running smoothly. If you’d like to discuss how we can help you, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how simply we can transition you from outdated protocols and approaches. I can even arrange a simple, zero-cost Proof of Concept. Previous Next
- Ad-Hoc Filesharing Services Add Risk | GSA
< News Ad-Hoc Filesharing Services Add Risk 27 May 2025 Make no mistake - unintentional errors by employees and supply chain partners are a leading cause of data breaches. The uncontrolled use of ad-hoc file sharing services (e.g. WeTransfer, Dropbox, Google Workspace, Cerberus FTP Server, and ShareFile) significantly increases the risk of employees making mistakes and for those mistakes to go unnoticed. Here then are seven reasons why organisations should reconsider their use of ad-hoc cloud file sharing services. 1. They may not enforce automatic file encryption. A key means of preventing your data falling into the wrong hands is to ensure it’s always encrypted, both in transit, as well as when it’s being stored. A secure Managed File Transfer (MFT) solution can automatically encrypt your data. 2. Dubious key and certificate management. Beyond encryption of the file being transferred, some cloud applications leave files open to malicious intent by failing to maintain strong keys and certificates. 3. They may create compliance gaps. Not all cloud platforms meet regulatory requirements around file transfers, leaving your organisation liable for financial, legal, and reputational damages. 4. Limited data control. Unsupervised file sharing and collaboration can lead to files being sent to or accessed by unauthorised individuals. With many cloud-based solutions, once files are transferred, there’s no ongoing control over their use. A secure MFT provides ongoing safeguards with tight controls on who can access, edit, and transfer files, and for how long. 5. No workflow automation. MFT solutions such as GoAnywhere MFT simplify and automate file transfer processes, with multi-step workflows to execute repetitive, manual tasks. "Projects" can be easily created by dragging and dropping modules which define business processes to seamlessly transfer files, eliminating the need for complicated scripting or programming. For example: a Project can be created to retrieve encrypted data from a server, decrypt it, read file contents and submit them to a downstream internal application. The file can also be altered, added to, re-encrypted, and then sent to another external SFTP server. 6. Lack of centralised user management. Cloud file sharing solutions may not provide a comprehensive and easy to use dashboard for administrators to control access, authentication, and encryption of sensitive files. The more tools and applications that must be coordinated, the greater the risk of human or systems error. A robust MFT solution manages all types of file-send situations, including ad-hoc emails, large files, and batch files. 7. Threat detection and management. Protecting your organisation from viruses, malware, ransomware, Advanced Persistent Threats, and banned media types requires constant vigilance. Our Advanced Threat Protection can automatically block these threats and remove the element of human error from your risk profile. Local Expertise Available If you’d like to discuss removing the risk of ad-hoc file sharing applications from your organisation, please feel welcome to contact me . I’m always happy to have an obligation-free discussion, demonstrate the capabilities of the world’s most advanced MFT, and even offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. Previous Next
- Why Your Business Needs PROACTIVE Cyber Security | GSA
< News Why Your Business Needs PROACTIVE Cyber Security 4 Apr 2025 Blocking cyber criminals before they gain access to your IT systems requires your cyber security solution to have access to, and pre-emptively act upon, the very latest intel on threats. It needs an early warning system. Activating the proactive features in your existing security solutions is a good first step to keeping bad actors out. However, layering security with solutions that guard your data – instead of merely alerting you to breaches after the fact – is much better. Six Reasons Here are six reasons your organisation should consider making a proactive Managed File Transfer (MFT) security solution the foundation for your layered data security. Traditional threat intelligence is reactive against cyberthreats rather than proactive. While Brute Force and Denial of Service (DoS) attacks can be detected automatically, that’s only after your systems have come under attack. A vulnerability discovered by a cybercriminal in one business system can be quickly replicated across other businesses’ systems in a wave of copycat attacks . Some attacks may only be detectable through (all-too-infrequent) manual inspection of activity logs. New and previously unknown vulnerabilities can lead to Zero Day incidents , if cyber security solutions don’t continually check for bad IP addresses. Cybercriminals systematically probe MFT service endpoints to evade automatic IP blocking. An Example A manufacturing plant with multiple MFT deployments was concerned about rising cyberthreats and the potential for their systems to be compromised. While they were confident in their MFT solution’s ability to protect sensitive data while in transit and in motion, their system didn’t pre-emptively detect bad actors or threats before they entered their MFT environment. While they could add trusted IPs to their “allowed” list, that created a future level of risk. What if that IP address was subsequently compromised…? Thinking Ahead GoAnywhere MFT , the world’s most fully-featured MFT, offers a unique proactive threat intelligence advantage over other lesser solutions , mitigating the risk of persistent IP address trust. By simply turning on the feature in the latest version of GoAnywhere, organisations can leverage the dynamic intelligence database of Fortra’s Threat Brain . This “brain” is comprised of data and indicators from Fortra’s deep portfolio of cybersecurity solutions. It provides a forward-leaning approach to cybersecurity threats, blocking IPs with bad reputations or malicious intent before they enter the MFT environment. When activated within GoAnywhere, Threat Brain pre-emptively blocks bad actors across all attack vectors, continually checking trustworthiness with each new session. Proactive Security Benefits for MFT As a built-in module, Fortra’s dynamic cybersecurity intelligence database benefits GoAnywhere customers by: Consistent re-verification : An IP's reputation is re-checked with every session to ensure it remains safe”. Other MFT products don’t offer this ongoing monitoring of IP addresses once they are white-listed. Comprehensive threat intelligence data sources : Threats detected in one of Fortra’s many security solutions is shared with the Threat Brain, increasing the overall intelligence data available to GoAnywhere MFT. Layered protection : Combined with Threat Protection and Zero Trust File Transfer, GoAnywhere provides unmatched options to safeguard data throughout the entire data lifecycle. Stay A Step Ahead of Cyber Crims Blocking the door to your MFT environment can be as easy as enabling the Threat Brain module in GoAnywhere and determining which level of security you require to meet your organisation’s security mandates or compliance requirements. If you’d like help tapping GoAnywhere’s proactive capabilities for your organisation, please feel welcome to contact me . I’m always happy to have an obligation-free discussion, demonstrate GoAnywhere’s capabilities, and even offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. Previous Next
- Contact Us | GSA
We're Happy to Help Generic Systems Australia are your local experts in Secure Managed File Transfer, servicing Australia and the Asia-Pacific region. We're always happy to answer your questions, or offer you an obligation-free discussion and zero-cost Proof of Concept. Address Generic Systems Australia Level 25, 100 Mount Street North Sydney NSW 2060 Australia Phone +61-2-9959-2239 Email mktg@gensys.com.au Social Media First Name Last Name Email Phone Number (optional) Message Enquiry Type Learn More Send Thank for your message! You will receive an email shortly! We respect your privacy! We won't share your details with third parties or AI. Your enquiry will be handled personally by a member of our technical team. And we won't spam you.
- Why financial services organisations rely on Managed File Transfer solutions | GSA
< News Why financial services organisations rely on Managed File Transfer solutions 30 June 2025 Few sectors rely on secure data transfers quite as much as the financial services sector. That’s why so many banks, insurers, financiers and those who support them leverage the security and reliability of Managed File Transfer (MFT) solutions. MFT enables organisations to securely and reliably exchange electronic data between systems while complying with regulatory requirements. With MFT solutions, organisations can confidently facilitate internal and external enterprise data transfers, including sensitive, compliance-protected, and high-volume data. This is particularly important in the financial sector, among the most heavily regulated industries in the world. The sheer quantity of sensitive personal information financial institutions handle makes them a near-irresistible target for cybercriminals. MFT solutions play a critical role in helping financial institutions protect this priceless data in transit and at rest in five ways. 1. Secure Data Transfer Financial institutions handle and transfer highly sensitive financial and customer data. This data needs to be secured, especially when in transit. MFT solutions automate file transfer processes, enforcing policies which mitigate the risk of human error and subsequent cyber security incidents resulting from manual processes. Similarly, MFT’s automation capabilities continuously monitor file transfer activities and generate logs and audit trails, as well as process files through automated workflows. By providing system administrators with real-time alerts to critical events such as failed transfers, security breaches and policy violations, MFT solutions empower security teams to identify and respond to security threats as and when they occur. MFT solutions also support security protocols such as HTTPS, SFTP, and FTPS to encrypt data in transit and prevent unauthorised users from accessing or tampering with it. 2. Regulatory Compliance MFT helps enable financial institutions to meet their stringent industry regulatory requirements. This includes international Standards such as the Payment Card Industry Data Security Standard (PCI DSS), Gramm-Leach-Bliley Act, and the EU’s General Data Protection Regulation (GDPR). MFT solutions ensure data integrity through checksums and cryptographic hashing algorithms to verify file integrity and ensure that data received matches data sent. Most regulatory standards require that data remains unaltered during transit - MFT makes sure that happens. There’s a productivity bonus, too. Compliance reporting can be highly time-consuming. However, MFT solutions streamline the task, enabling organisations to demonstrate regulatory compliance quickly and efficiently via detailed reports on file transfer activities. 3. Streamline Business Processes Beyond compliance, MFT solutions help streamline business processes in other useful ways. Through workflow orchestration, MFT solutions ensure file transfers follow a predefined sequence and adhere to business rules. Workflows typically involve multiple steps, including file conversion, data transformation, encryption, validation, and delivery to specific destinations. MFT solutions ensure this process runs smoothly and securely. The complex network infrastructures of modern organisations can make file transfers challenging to track and maintain. Through centralised management and control capabilities, MFT solutions enable security teams to define transfer settings, security policies, and user access controls from a single, browser-based interface. Centralised management and control allow for enhanced visibility and governance of file transfers and eradicate the need for security teams to trawl through disparate data siloes to track and secure data transfers. 4. Integrate with Financial Systems Financial institutions typically have very complex IT infrastructures comprising multiple disparate systems, applications, and platforms. The best MFT solutions offer integration capabilities that connect financial systems such as core banking, enterprise resource planning (ERP) systems, treasury management systems, and trading platforms. These integrations ensure smooth, secure, and efficient data exchange between systems and facilitate financial operations and decision-making. 5. Business Continuity and Disaster Recovery Business continuity and disaster recovery are crucial for financial institutions, where significant downtime can result in huge financial and reputational impacts. Via features such as data replication, failover mechanisms, and backup options, MFT enables organisations to respond to and mitigate the effects of cyber incidents, preventing data loss and ensuring business continuity. The Leading MFT GoAnywhere MFT , independently assessed to be the world’s leading MFT , helps the finance industry securely exchange data, comply with regulatory requirements, streamline business processes, integrate with financial systems, and ensure business continuity. Many financial institutions around the world use GoAnywhere as a foundational file transfer platform, helping them address and resolve their unique data security and compliance challenges. Australia’s and NZ’s Local MFT Experts Generic Systems Australia has decades of experience helping Australian and New Zealand financial organisations leverage the power of the world’s leading MFT solution. Our Migration Service makes the transition even easier for organisations who prefer to use their resources building their businesses rather than improving their IT plumbing. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch with us. At Generic Systems Australia, we’re your local experts in Secure Managed File Transfer. Previous Next
- MFT'S ROLE IN BUISNESS : EBOOK | GSA
“MFT's Role in Business: IT Leaders Weigh In” eBook A good way to learn the value of a Managed File Transfer (MFT) solution is to hear about it from those who use one. In Fortra’s eBook “MFT's Role in Business: IT Leaders Weigh In”, nine IT and security professionals share their experiences using Fortra’s GoAnywhere MFT. To receive a complimentary copy of the eBook, simply send us your email address below: First name Last name Enter your email address Phone You'll receive the "MFT's Role in Business: IT Leaders Weigh In" eBook RESOURCES Receive Report HOME
- THINK LIKE A HACKER | GSA
THINK LIKE A HACKER To win the fight against cybercriminals, it helps to think like a hacker. In this guide, we explain the terminology and techniques used by cyber thieves, and share seven important strategies for protecting your valuable data. To receive our Guide, please submit your email address below: First name Last name Enter your email address Phone You'll receive the 'Think Like a Hacker' Guide shortly! RESOURCES Receive Report HOME
- LOCAL BUYERS GUIDE | GSA
MFT Local Buyer's Guide Finding the right Managed File Transfer solution for your organisation may not be easy... with dozens of factors to consider - including industry and government compliance requirements, cloud vs on-prem solutions, critical cybersecurity protections, pricing models and more. In this MFT Local Buyer’s Guide, you’ll find the key considerations, the questions you need to ask vendors, and a wealth of other advice to help you successfully evaluate MFT solutions. To receive our Local Buyers' Guide, simply submit your email address below: First name Last name Enter your email address Phone You'll receive the Buyers' Guide shortly! RESOURCES Receive Report HOME
- Moving on from MOVEit | GSA
< News Moving on from MOVEit 20 Oct 2023 Your Choice of MFT Matters Many organisations across the Asia-Pacific region are replacing their outdated MOVEit-based Managed File Transfer (MFT) systems with Forta’s advanced GoAnywhere suite . In this article, I’ll explain why. There are plenty of options when it comes to selecting a file transfer solution… from free, unsecure methods to the fully-featured marketplace leader. But as cybercrime has continued to surge, companies have increasingly realised how essential it’s become to secure their data transfers, maintaining a ‘circle of trust’ with their customers and supply chains. Additionally, companies have been searching for ways to boost their bottom lines through greater efficiency. The true cost – in terms of lost productivity - of outdated manual file transfer approaches has come into sharper focus. Business leaders are realising that their MFT solutions, which may have once met historic needs, are no longer enough . Superior Security Recent cybersecurity incursions make “Robust Security” top of mind for those seeking a better MFT solution. GoAnywhere MFT takes all aspects of data security seriously, protecting your sensitive data both “in motion” and “at rest”. Maintaining GoAnywhere’s security and compliance product leadership is a primary focus for its development team, who stay across the latest security standards to ensure up-to-date compliance with regulations, frameworks, and standards. Beyond Windows Organisations managing multiple operating systems soon encounter the constraints of MOVEit’s Windows-only solution. GoAnywhere flexibly supports any protocol, any platform, and any deployment, including Microsoft Azure, AWS, Linux, and more. The Need for Speed Included in GoAnywhere is GoFast, a file transfer acceleration protocol which can transmit data considerably faster than traditional FTP. The patented technology in GoFast takes the best of UDP’s speed and adds reliability and rate control, providing GoAnywhere with speed MOVEit can’t match. Drag & Drop Workflows Scripting – as required by MOVEit for some tasks - is clunky, time consuming and confusing for non-expert users. Through its breadth of Automated Workflows capabilities, GoAnywhere enables end users to quickly and easily build workflows. Manual and automated tasks can even be combined into one master workflow. Further, GoAnywhere provides easy reporting on partner Service Level Agreements, alerting you to any workflow issues before your trading partners do. Easy Centralised Control MOVEit requires you to install two products (MOVEit Automation and MOVEit Transfer) to enable full MFT functionality. Most users prefer GoAnywhere’s centralised, browser-based dashboard - an intuitive “one stop shop” for managing file transfers. Advanced Auditability GoAnywhere not only moves and shares data securely, it also provides full auditability of transfers. Logging full audit trails of all user events and file activity, it can also generate reports of file transfer activity, user statistics, and completed jobs – all from within its central management console. And.. Beyond the advantages above, former MOVEit users are often delighted to discover GoAnywhere’s advanced capabilities in: High availability and clustering, providing true active-active support and load balancing to distribute workloads across multiple systems; Remote agents - lightweight applications managed through the GoAnywhere interface which enable configuring and scheduling of file transfers throughout an enterprise; and Secure Forms - customised forms or files that which contain data other tasks can automatically process. Want to see a Better MFT in Action? If you’d like to discuss how GoAnywhere could help boost organisations’ security, efficiency and bottom line, please feel free to contact me ( bradley@gensys.com.au ) for an obligation-free discussion. Bradley Copson Business Manager Generic Systems Australia Previous Next
- Connector Service | GSA
Seamlessly Integrate GoAnywhere with ANY Cloud Cloud Connectors enable Fortra's GoAnywhere MFT, the world’s leading managed file transfer solution , to transfer files easily and securely between your organisation and external cloud services and applications. For example: Let’s say one of your trading partners requests an important file and wants you to share it via a folder in Dropbox. Or perhaps you have contacts or billing information you want to update automatically in Salesforce. Cloud Connectors enable you to do so, easily. Broad Range Cloud Connectors are easily downloaded from GoAnywhere MFT’s integrated Marketplace, which features Connectors for most common cloud services. Available "Out-of-the-Box Cloud Connectors Check availability Cloud Connectors can integrate with available on-premises and online versions of third-party software unless otherwise noted. Unique Custom Connector Service No Marketplace Connector for your special Cloud…? No problem! At Generic Systems Australia, we can design and implement Custom Connectors for you, using GoAnywhere’s Cloud Connector Designer. Contact Us Configuring Cloud Connectors is Easy! Once a Cloud Connector is installed, you can configure the connection properties as a GoAnywhere Resource. With this resource, you only need to specify the connection once before being able to seamlessly reuse it in any of your workflows and cloud file transfers. A Cloud Connector definition contains the various actions required to communicate with cloud applications. For example: authentication logging file transfer file management error handling In GoAnywhere, these actions appear as elements located under the Cloud Connector in the GoAnywhere Project Designer. Elements can be incorporated into your workflows alongside other project tasks, and processes can even be automated between multiple web and cloud services at once Contact Us
