Search Results
195 results found with an empty search
- MFT: Not Just Your First Line of Cyber Defence | GSA
< News MFT: Not Just Your First Line of Cyber Defence 16 Sept 2025 Every organisation serious about protecting its data will likely come to view a Managed File Transfer (MFT) solution as one of their first lines of defence. Employing MFT as the standard when exchanging data puts organisations light years ahead of businesses still relying on risky File Transfer Protocol and email to transfer files. MFT platforms not only centralise – and therefore, control - data transfer, they also enable companies to apply comprehensive policies which protect data. Data can be insulated from threats as diverse as inbound malware to careless employees entrusting files to external platforms beyond an organisation’s direct control, such as Google Drive and Dropbox. Critical protection policies, such as those encompassing encryption, monitoring, and auditing capability, can be enforced. High Volume = High Exposure In 2024, businesses were responsible for generating around 30% of the world’s data—an astonishing ~44.1 zettabytes. That included data such as transaction records, CRM logs, ERP systems, IoT sensor data from manufacturing and logistics, internal communications, analytics, and cloud backups, AI training datasets and other enterprise software usage. But as the volume of data used and consumed by businesses grows, so too does the cost and impact of potentially losing that data. The high ransoms now regularly being paid to cyberthieves amply demonstrate just how valuable business data has become. Surely it makes more sense to invest in a relatively inexpensive protective technology like MFT, than to lose equivalent funding — or greater — in the form of ransoms paid to cyber thieves? Lessons from Bankers Banks, traditional repositories of valuables from cash, precious metals and sensitive documents, have learned a lot over the years about protecting assets. And their learnings are relevant to how we should be protecting our valuable data. Banks no longer store our valuables in a single bank vault. Nor for that matter do they store our digital currency on a single server. Rather, banks protect our precious assets — physical and digital — behind layers of security. Physical valuables sit behind physical barriers, multiple locks, access control systems, remote monitoring and security guards. Digital valuables are protected against threats such as malware, ransomware, accidental data loss, third-party exposure, and zero-day attacks by a broad array of technologies. Sitting beneath those technologies, ensuring they’re enforced and providing a sound bedrock of centralised control, surveillance and auditing, is MFT. Adding Layered Defence At Generic Systems Australia we’re adept at installing and maintaining the world’s leading MFT, GoAnywhere . And our Advanced Threat Protection (ATP) bundle significantly enhances GoAnywhere’s data protection capabilities by introducing a proactive, multilayered defence against both external threats and internal data leakage. While GoAnywhere already provides secure encryption, access controls, and audit trails for file transfers, the ATP bundle adds dynamic inspection and sanitisation that targets the content itself—not just the container. At the heart of this integration is the Clearswift Secure ICAP Gateway, which enables deep content inspection and adaptive Data Loss Prevention (DLP). This means every file transferred through GoAnywhere can be scanned for malware, embedded scripts, macros, and other active content that could compromise systems. Unlike traditional antivirus tools, ATP sanitises files in real time—removing only the malicious elements while allowing legitimate content to pass through uninterrupted. Limiting Exposure Beyond malware, the ATP Bundle also addresses sensitive data exposure. It can detect and block files containing personally identifiable information (PII), financial records, or confidential metadata before they’re shared externally. Policies can be set to redact sensitive text, strip geotags and even apply optical character recognition (OCR) to scanned documents to catch hidden data. This empowers organisations to enforce granular control over who can transmit sensitive content and under what conditions—adding a layer of governance that encryption alone cannot provide. In essence, the ATP Bundle transforms GoAnywhere from a secure conduit into an intelligent gatekeeper. It doesn’t just move data safely—it understands what’s inside, evaluates its risk, and ensures that only clean, compliant content reaches its destination. Modular Enhancements Augmenting GoAnywhere’s capabilities are Modules which can further protect an organisation from the inherent risks of legacy protocols such as SFTP/FTPS, email attachments and manual processes. SFTP Server can be upgraded to by GoAnywhere SFTP Server Module, enabling SSH-encrypted transfer with centralised access control, audit logging and integration with Active Directory. FTPS Server can be upgraded to FT Module, offering SSL/TLS encryption, customisable access, and DMZ-safe deployment via GoAnywhere Gateway. HTTPS Web Uploads can be replaced by the Secure Folders Module to create browser-based file access with HTTPS encryption and user authentication. AS2/AS4/PeSIT can be replaced by Certified Protocol Modules, providing Retail and banking-grade secure exchange with Drummond certification. These modules consolidate disparate protocols into a single, scalable platform—reducing complexity, improving visibility, and enforcing consistent security policies across all transfers. Making Email Secure Email is ubiquitous. However, it's also one of the least secure ways to transmit sensitive data. Fortra’s Secure Mail module in GoAnywhere transforms ad-hoc file sharing into a secure, trackable process without disrupting user workflows. Using Secure Mail, Users send files as secure encrypted packages via their browser or an Outlook plugin. Recipients receive a unique link to download via HTTPS — no files are sent directly via email. Senders can set expiration dates, download limits, and password protection, and all activity is logged for auditability and compliance. Secure Mail keeps files on your infrastructure until accessed, eliminating third-party hosting risks and ensuring full control over sensitive data. Strategic Defence By replacing legacy protocols and insecure email practices with GoAnywhere’s modular architecture, organisations gain: • Unified governance over all file transfers; • Reduced attack surface via DMZ-safe deployment; • Improved compliance with GDPR, HIPAA, PCI DSS; and • Streamlined user experience without sacrificing security. Here to Help At Generic Systems Australia we have decades of experience helping Australian and New Zealand organisations protect themselves against malware and other cyber attacks through the power of the world’s leading MFT solution. Our Migration Service makes the transition even easier for organisations who prefer to use their resources building their businesses rather than improving their IT plumbing. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch with us. At Generic Systems Australia, we’re your local experts in Secure Managed File Transfer. Previous Next
- Local Businesses most at risk of Phishing Attacks: study | GSA
< News Local Businesses most at risk of Phishing Attacks: study 9 Apr 2024 A new study has found that employees in the Asia-Pacific region are more likely than any others worldwide to unwittingly expose their organisation to cybercrime. Fortra's newly-released study found 10% of employees worldwide will open a ‘phishing’ email sent to them. In Asia-Pacific, that number climbs to 14.9% – worse than any other region. Even more concerningly, 61% of those who fall for a bogus email will go on to disclose their password. The results of the experiment demonstrate the serious ongoing threat to local organisations posed by employees who are either uneducated on cybersecurity threats, or unmotivated to mitigate those risks. If you would like a copy of Fortra's report on the study, including helpful advice on how to address your cybersecurity challenges, please let me know – I’ll be happy to send you a copy. #mft #managedfiletransfer #sft #securefiletransfer #cybersecurity Previous Next
- Secret Ransomware Payments Rife: Survey | GSA
< News Secret Ransomware Payments Rife: Survey 19 Aug 2024 Pervasive cyberattacks are leading most companies to pay ransoms and break their “Do Not Pay” policies, according to recent research. A poll of IT and security decision-makers conducted by Cohesity found that that most companies have paid a ransom in the last two years. In fact, 79% of respondents said their company had been the victim of a ransomware attack during the second half of 2023. The breadth of an organisation’s “attack surfaces” depends on the size and scope of its data environments. However, 78% of respondents said their data security risk had increased faster than the growth in the data they manage. They also said their organisation’s cyber resilience and data security strategies had not kept pace with emerging threats – only 21% had full confidence in their company’s cyber resilience strategy. Slow Recovery, Lack of Testing Cyber resilience is a critical element of business continuity, and encompasses a company’s ability to recover their data and restore business processes when they suffer a cyberattack or IT outage. Key insights from the survey on this point included: All respondents said they need more than 24 hours to recover data and restore business processes. Only 7% said their company could recover data and restore business processes within 1-3 days. 35% said they could recover and restore in 4 to 6 days, while 34% need 1-2 weeks, and 23% need more than 3 weeks. Only 12% of those surveyed said their company had stress-tested their data security, data management, and data recovery processes or solutions in the six months prior to being surveyed. 46% hadn’t tested in more than 12 months. Secret Ransom Payments While 84% had a “do not pay” policy, Cohesity reported that 94% of respondents divulged that their company would pay a ransom to recover data and restore business processes. 5% said “maybe, depending on the ransom amount”. Two thirds said their company would be willing to pay over US$3M to recover data and restore business processes, and a third said their company would be willing to pay over $5M. Don’t Pay: Prevent! The volume, frequency, and sophistication of ransomware attacks will only increase. And paying ransoms only encourages cyberthieves to escalate their efforts. Worse, if ransoms are seen as “easy money”, new miscreants will be tempted to acquire ransomware tools from the dark web and join the cyber crimewave. Rather than investing in ransoms, organisations need to invest in their cyber resilience. That starts with keeping thieves at bay - protecting valuable data where it is stored, and when it is transferred – and building organisational capability in rapidly responding to and recovering from cyberattacks. Building cyber resilience need not be a drag on an organisation’s efficiency. Automation can ensure data is protected at rest and in motion, requiring little to no manual management. For example, Managed File Transfer (MFT) solutions such as the class-leading GoAnywhere MFT encrypt data at rest and in transit, complying with the highest data security standards (including the US’s and Europe’s HIPAA, HITECH, PCI DSS, SOX, and GDPR). MFT manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols such as SFTP, FTPS, and AS2 to send files securely, and encryption standards such as Open PGP and AES to protect data in transit and at rest. Advanced Threat Protection and Adaptive Loss Prevention add a further layer of defence. SFT Threat Protection enables safe collaboration with external parties, preventing malware from entering your organisation, and reducing opportunities for employees to lose or mishandle sensitive data. Local Expertise Ready to Help Generic Systems Australia are your local experts in Managed File Transfer and Advanced Threat Protection. We’ve assisted hundreds of organisations across the Asia-Pacific region to secure their data, keep cybercriminals at bay… and keep ransomware off the books. If you’d like to discuss improving your cybersecurity, please feel welcome to contact me , Bradley Copson. I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. About the survey: Cohesity’s findings are based on a survey of 902 IT and Security decision-makers (split as close to 50:50 as possible) commissioned by Cohesity and conducted by Censuswide. Survey respondents were polled from businesses in Australia, the United Kingdom, and the United States. The top five industries selected by respondents as best representing the industry their company operates in were: IT & Telecommunications, Finance, Healthcare, Finance, HR, and Manufacturing & Utilities. Previous Next
- Why financial services organisations rely on Managed File Transfer solutions | GSA
< News Why financial services organisations rely on Managed File Transfer solutions 30 June 2025 Few sectors rely on secure data transfers quite as much as the financial services sector. That’s why so many banks, insurers, financiers and those who support them leverage the security and reliability of Managed File Transfer (MFT) solutions. MFT enables organisations to securely and reliably exchange electronic data between systems while complying with regulatory requirements. With MFT solutions, organisations can confidently facilitate internal and external enterprise data transfers, including sensitive, compliance-protected, and high-volume data. This is particularly important in the financial sector, among the most heavily regulated industries in the world. The sheer quantity of sensitive personal information financial institutions handle makes them a near-irresistible target for cybercriminals. MFT solutions play a critical role in helping financial institutions protect this priceless data in transit and at rest in five ways. 1. Secure Data Transfer Financial institutions handle and transfer highly sensitive financial and customer data. This data needs to be secured, especially when in transit. MFT solutions automate file transfer processes, enforcing policies which mitigate the risk of human error and subsequent cyber security incidents resulting from manual processes. Similarly, MFT’s automation capabilities continuously monitor file transfer activities and generate logs and audit trails, as well as process files through automated workflows. By providing system administrators with real-time alerts to critical events such as failed transfers, security breaches and policy violations, MFT solutions empower security teams to identify and respond to security threats as and when they occur. MFT solutions also support security protocols such as HTTPS, SFTP, and FTPS to encrypt data in transit and prevent unauthorised users from accessing or tampering with it. 2. Regulatory Compliance MFT helps enable financial institutions to meet their stringent industry regulatory requirements. This includes international Standards such as the Payment Card Industry Data Security Standard (PCI DSS), Gramm-Leach-Bliley Act, and the EU’s General Data Protection Regulation (GDPR). MFT solutions ensure data integrity through checksums and cryptographic hashing algorithms to verify file integrity and ensure that data received matches data sent. Most regulatory standards require that data remains unaltered during transit - MFT makes sure that happens. There’s a productivity bonus, too. Compliance reporting can be highly time-consuming. However, MFT solutions streamline the task, enabling organisations to demonstrate regulatory compliance quickly and efficiently via detailed reports on file transfer activities. 3. Streamline Business Processes Beyond compliance, MFT solutions help streamline business processes in other useful ways. Through workflow orchestration, MFT solutions ensure file transfers follow a predefined sequence and adhere to business rules. Workflows typically involve multiple steps, including file conversion, data transformation, encryption, validation, and delivery to specific destinations. MFT solutions ensure this process runs smoothly and securely. The complex network infrastructures of modern organisations can make file transfers challenging to track and maintain. Through centralised management and control capabilities, MFT solutions enable security teams to define transfer settings, security policies, and user access controls from a single, browser-based interface. Centralised management and control allow for enhanced visibility and governance of file transfers and eradicate the need for security teams to trawl through disparate data siloes to track and secure data transfers. 4. Integrate with Financial Systems Financial institutions typically have very complex IT infrastructures comprising multiple disparate systems, applications, and platforms. The best MFT solutions offer integration capabilities that connect financial systems such as core banking, enterprise resource planning (ERP) systems, treasury management systems, and trading platforms. These integrations ensure smooth, secure, and efficient data exchange between systems and facilitate financial operations and decision-making. 5. Business Continuity and Disaster Recovery Business continuity and disaster recovery are crucial for financial institutions, where significant downtime can result in huge financial and reputational impacts. Via features such as data replication, failover mechanisms, and backup options, MFT enables organisations to respond to and mitigate the effects of cyber incidents, preventing data loss and ensuring business continuity. The Leading MFT GoAnywhere MFT , independently assessed to be the world’s leading MFT , helps the finance industry securely exchange data, comply with regulatory requirements, streamline business processes, integrate with financial systems, and ensure business continuity. Many financial institutions around the world use GoAnywhere as a foundational file transfer platform, helping them address and resolve their unique data security and compliance challenges. Australia’s and NZ’s Local MFT Experts Generic Systems Australia has decades of experience helping Australian and New Zealand financial organisations leverage the power of the world’s leading MFT solution. Our Migration Service makes the transition even easier for organisations who prefer to use their resources building their businesses rather than improving their IT plumbing. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch with us. At Generic Systems Australia, we’re your local experts in Secure Managed File Transfer. Previous Next
- MFT'S ROLE IN BUISNESS : EBOOK | GSA
“MFT's Role in Business: IT Leaders Weigh In” eBook A good way to learn the value of a Managed File Transfer (MFT) solution is to hear about it from those who use one. In Fortra’s eBook “MFT's Role in Business: IT Leaders Weigh In”, nine IT and security professionals share their experiences using Fortra’s GoAnywhere MFT. To receive a complimentary copy of the eBook, simply send us your email address below: First name Last name Enter your email address Phone You'll receive the "MFT's Role in Business: IT Leaders Weigh In" eBook RESOURCES Receive Report HOME
- Employee Error Lets Hackers Clean Up at Clorox | GSA
< News Employee Error Lets Hackers Clean Up at Clorox 25 July 2025 The Clorox Company’s $574M lawsuit against IT services provider Cognizant Technology Solutions is a stark reminder of the cyber threat posed by unwitting or uncaring employees. Clorox alleges that help desk agents managed by Cognizant provided hackers with access to Clorox’s IT network in August 2023. They say that Cognizant agents repeatedly reset passwords and multi-factor authentication (MFA) tokens for hackers posing as Clorox employees without asking a single security question. One partial call transcript filed with the court shows a Cognizant agent volunteering “Let me provide the password to you” after a hacker said he couldn’t log in. Hackers used the credentials provided to paralyse manufacturing lines, which led to product shortages costing Clorox hundreds of millions in lost sales. Clorox says it had provided Cognizant with strict credential-reset protocols such as verifying a manager’s name and sending confirmation emails, but that these protocols weren’t followed. Human Error Common Clorox’s unfortunate experience is consistent with studies which have found human error a leading cause of most cyber security incursions. In a 2024 experiment by Fortra, 14.9% of employees across the Asia-Pacific region succumbed to hackers’ attempts to have them provide network access. 60% of the employees who clicked on that phishing link went on to further expose their organisation by sharing their password. Guarding Against Employee Error Employee education is a great start to protecting your organisation. But as Clorox’s experience shows, it’s not enough. Technical safeguards are needed, too. Generic Systems Australia’s Advanced Threat Protection Bundle enables your organisation’s email system to automatically detect and prevent phishing links and other malware from entering your organisation. Combining the layered strengths of GoAnywhere MFT and Clearswift, it enables your employees to receive and share information securely without impairing their productivity. How It Works Our Advanced Threat Protection Bundle seamlessly integrates managed file transfer with advanced threat protection and adaptive data loss prevention to keep your sensitive data secure. It not only prevents malware from entering your organisation, but it also prevents employees from losing or mishandling data. For example, if an employee knowingly (or unknowingly) attempts to share any files containing malware, those files are sanitised by having the malicious elements automatically removed. The Advanced Threat Protection Bundle can also automatically detect and –– if you configure it to do so –– prevent employees from sharing sensitive information. Local Support If you’d like to see first-hand how the Advanced Threat Protection Bundle can help keep your organisation’s data safe, please feel welcome to get in touch with me. My technical team at Generic Systems Australia are local experts in the field. Previous Next
- Legacy Tech Threatens Your Valuable Data | GSA
< News Legacy Tech Threatens Your Valuable Data 17 Mar 2026 The Australian Signals Directorate (ASD) has published a warning about the cyber security threat posed by legacy technology. ASD defines legacy technology as “any technology no longer supported by the manufacturer, developer or vendor”. These technologies don’t receive important security updates and patches, and this makes them much more vulnerable to cyber attacks. However, the threat isn’t only to the legacy systems themselves. Cyber thieves can also exploit vulnerabilities in legacy technology to gain access to the modern systems that your organisation relies on. The ASD says that managing legacy technology is a priority in maintaining the overall cyber security of your organisation. They counsel replacing it with technology that is still receiving support and updates from the manufacturer, developer or vendor. Legacy Scripts A related example of a legacy technology that’s way past it’s use-by date is the use of file transfer scripts to move sensitive data between systems. For years, organisations relied on home‑grown file transfer scripts to shuttle data between systems, partners, and applications. Scripts were simple, cheap, and easy to tweak. However, in today’s environment - where security needs are heightened, data volumes more immense, and compliance obligations mandatory - these scripts have quietly become legacy technology. Their limitations aren’t just inconvenient; they introduce operational and security risks that modern organisations should no longer tolerate. Scripts are brittle by design. A small change in a directory name, a certificate expiry, or a vendor endpoint can cause silent failures. Because scripts rarely include centralised logging or alerting, teams often discover issues only after a downstream process breaks. This reactive approach to failures is the opposite of what modern IT environments require. Add in the fact that scripts are usually maintained by a handful of individuals—often without documentation—and you end up with a fragile web of tribal knowledge that becomes a liability when staff move on. Scripts are also inherently insecure. Hard‑coded credentials, inconsistent encryption practices, and ad‑hoc error handling create gaps that attackers can exploit. Regulators increasingly expect organisations to demonstrate control, auditability, and governance over data movement. Scripts simply weren’t built for that world. Modernise with MFT Managed File Transfer (MFT) platforms like the class-leading GoAnywhere MFT solve these problems by replacing scattered scripts with a centralised, policy‑driven system. MFT provides end‑to‑end encryption, automated workflows, real‑time monitoring, and detailed audit trails. Instead of relying on custom code, organisations gain a consistent, supportable framework that scales with business needs. MFT agents extend this capability to remote servers and cloud environments, enabling secure, automated transfers without manual intervention. Replacing legacy scripts with MFT isn’t just an upgrade - it’s a strategic shift toward reliability, visibility, and security. It frees teams from maintenance drudgery and provides organisations the confidence that their critical data flows are controlled, compliant, and future‑ready. Here to Help At Generic Systems Australia, we are Australia’s and New Zealand’s experts in MFT. Our decades of experience and unparalleled expertise have made us Fortra’s Top MFT Partner for the world’s leading MFT solution, GoAnywhere , in Oceania. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an MFT solution, please feel welcome to get in touch with us . Previous Next
- LOCAL BUYERS GUIDE | GSA
MFT Local Buyer's Guide Finding the right Managed File Transfer solution for your organisation may not be easy... with dozens of factors to consider - including industry and government compliance requirements, cloud vs on-prem solutions, critical cybersecurity protections, pricing models and more. In this MFT Local Buyer’s Guide, you’ll find the key considerations, the questions you need to ask vendors, and a wealth of other advice to help you successfully evaluate MFT solutions. To receive our Local Buyers' Guide, simply submit your email address below: First name Last name Enter your email address Phone You'll receive the Buyers' Guide shortly! RESOURCES Receive Report HOME
- Managed File Transfer: Conductor of Your Enterprise IT Orchestra | GSA
< News Managed File Transfer: Conductor of Your Enterprise IT Orchestra 4 Dec 2025 In today’s enterprise IT landscape, complexity is the rule rather than the exception. Organisations rely on dozens—sometimes hundreds—of applications, platforms, and services to keep operations running smoothly. Each system has its own rhythm, is its own “instrument,” and has its own way of producing value. The challenge lies not in the individual performance of these systems, but in how well they coordinate with one another. This is where Managed File Transfer (MFT) can step up and play the role of orchestra conductor. Your IT Orchestra Imagine your enterprise IT environment as a vast orchestra. The finance system is the brass section, bold and powerful. The HR platform is the woodwinds, steady and supportive. The customer relationship management tool is the strings, agile and expressive. Each application has its own sheet music, tuning and timing. Left to themselves, these musicians might play well individually. But without guidance, the ensemble risks descending into cacophony. MFT ensures that every musician receives the right cues, at the right tempo, and in the right order. It doesn’t matter if the ERP system “plays” in one key and the analytics platform in another; MFT provides the synchronisation and structure that allows them to perform together harmoniously. Timing and Precision In an orchestra, timing is everything. A single misplaced note can disrupt the entire performance. Similarly, in enterprise IT, a delayed or failed file transfer can ripple across departments, causing inefficiencies or even compliance risks. MFT acts as the baton, ensuring that data moves securely, reliably, and on schedule. It enforces discipline across the ensemble, so that the payroll system receives its inputs before payday, the supply chain platform gets its updates before shipments, and the analytics engine has fresh data before executives make decisions. Security as the Score A conductor doesn’t just wave a baton; they interpret the score, ensuring fidelity to the composer’s intent. In IT, the “score” is the organisation’s security and compliance requirements. MFT enforces encryption, authentication, and auditing, ensuring that sensitive data is handled in accordance with regulations. Just as a conductor prevents the orchestra from straying off‑script, MFT prevents systems from improvising in ways that could compromise security or compliance. Flexibility and Adaptation Orchestras often perform different pieces, requiring the conductor to adapt to new tempos, styles, and arrangements. Likewise, enterprises constantly evolve—adding new applications, integrating with partners, or scaling to meet demand. MFT provides the flexibility to incorporate new “musicians” without disrupting the ensemble. It abstracts away the complexity of how systems connect, so IT teams can focus on the music rather than the mechanics. A Successful Symphony Ultimately, the value of MFT lies in its ability to transform disparate systems into a unified performance. It ensures that the finance section doesn’t drown out HR, that analytics doesn’t rush ahead of operations, and that customer data flows seamlessly across the organisation. The result is not just efficiency, but coherence—a symphony of systems working together to deliver business value. MFT is more than a logistics tool; it is the conductor that turns enterprise IT from a collection of talented but isolated musicians into a world‑class orchestra. By ensuring timing, security, and harmony, MFT enables organisations to perform at their best—producing not noise, but music. Here and Ready to Help At Generic Systems Australia we have decades of experience helping Australian and New Zealand organisations become more efficient, organised and protected through the power of the world’s leading MFT solution . Our Migration Service makes the transition even easier. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch with us. At Generic Systems Australia, we’re your local experts in secure Managed File Transfer. Previous Next
- Cyber Security to be Top Investment for 2025: CIOs | GSA
< News Cyber Security to be Top Investment for 2025: CIOs 17 Sept 2024 Australian and New Zealand CIOs are planning to invest significantly in improved cyber security in 2025, according to a recent survey by analysts Gartner. Some 88% of the region’s CIOs and technology executives said they would invest in heightened cyber security measures. 82% said it would be their top investment priority. More Attacks, More Regulation Gartner attributes this focus to greater government regulation, coupled with some of the largest cyberattacks seen in ANZ so far. Speaking at the 2025 Gartner IT Symposium/Xpo on the Gold Coast, Gartner VP Brian Ferreira said “Organisations face greater scrutiny as they batten down the hatches to avoid becoming the next target or breaching stewardship. This continues to drive significant focus and investment towards cybersecurity and legal compliance into next year.” The uncertain economic climate businesses have operated in recently has increased executive and board scrutiny on technology investments, he said. Gartner’s survey found that increased focus on cyber security will attract investment away from previous ANZ CIO priorities of legacy infrastructure (43% of respondents), augmented reality, virtual reality and immersive technologies (17%) and next-generation compute technology (11%). Heightened Focus Consistent with their focus on cyber security, Gartner’s survey found that ANZ CIOs have a significantly heightened focus on ensuring compliance and minimising risks (92% - up from 57% last year). “As Australian regulatory landscapes continue to evolve, ANZ CIOs are also facing more stringent laws to increase stewardship obligations,” Ferreira said. “It’s incumbent upon CIOs to steer their organisations towards a future marked by digital stewardship, responsible innovation, stringent compliance and active participation in shaping regulatory norms.” Help for ANZ CIOs Generic Systems Australia has many years of experience helping ANZ CIOs and IT teams protect their valuable data with class-leading Managed File Transfer solutions. From the initial scoping of companies’ legacy data transfer approaches, through zero-cost Proof of Concepts and hassle-free Migration Services , we help ANZ companies stay focused on running their business without disruption as we transition them to more secure approaches. If you’d like a to discuss how your organisation’s cyber security can be boosted by a cost effective Managed File Transfer solution, please feel welcome to contact me . I’m always happy to have an obligation-free discussion. At Generic Systems Australia , we’re your local experts in Secure Managed File Transfer. Previous Next
