Search Results
186 results found with an empty search
- Cybersecurity Insiders Reveal Their Top Fears | GSA
< News Cybersecurity Insiders Reveal Their Top Fears 29 May 2024 A survey by Fortra has revealed cybersecurity insiders’ top concerns for the remainder of 2024. Top Concern: Phishing and Smishing (81%) Phishing is tricking individuals into clicking on malicious links in emails or on the web to steal logins, passwords, or personal information. Smishing is a text-based version of phishing, with scammers posing as trusted companies to get individuals to reveal sensitive or personal information such as credit card numbers or passwords. Concern 2: Ransomware and Malware (76%) Ransomware is software designed to hold information hostage until a payoff is made. Malware is intrusive software hackers use to steal data or to damage computer systems. Concern 3: Accidental Data Loss or Leakage (63%) Concern 4: Social Engineering (55%) Social Engineering is the tactic of manipulating, influencing, or deceiving a victim to gain control over a computer system, or to steal personal and financial information. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information. Concern 5: Third-party exposure (52%) Industry insiders are also increasingly concerned about cybercriminals leveraging Artificial Intelligence to bolster their efforts. Proactive, Layered Defences Organisations with a proactive strategy for storing, transferring and securing their data are best-placed to keep cyberthieves at bay. And those which take a layered approach - secure file transfer, secure content engines, secure digital rights management, and employee education – are leading the way in preventing data breaches. At Generic Systems Australia, we recommend the class-leading secure managed file transfer solution, GoAnywhere MFT, to help organisations tackle the risks that can come with exchanging data. When coupled with our Threat Protection bundle, organisations can more safely collaborate without exposing systems to the risks of malware even entering your organisation in the first place. Here’s how SFT Threat Protection helps mitigate risks: Stops malware from entering your environment by scanning all inbound file transfers: GoAnywhere’s anti-virus protection delivered through the Secure ICAP Gateway is unique in its ability to deny the file ever being written to disk if it contains malware. Blocks files with sensitive data from being shared: Files containing PII (personally identifiable information) or other sensitive data identified by the organisation’s policies are prevented from being transferred. Redacts sensitive data from being shared: Embedded malware, triggered executables, or macros that could hold sensitive data hostage are detected and automatically stripped out of content to be shared via MFT. Content “sanitised” in this way is then permitted to be transferred so that business continues uninterrupted. On-Prem, in the Cloud… and in Between 64% of cybersecurity insiders surveyed said that hybrid cloud was their preferred IT operating environment. A combination of an on-premises/private data centre, and public cloud service provider, is seen by many to provide the best of both worlds. Utilising this approach, the most sensitive data can be maintained inside the organisation. In fact, some organizations are bound by compliance requirements to maintain an on-premises footprint to some degree. Unfortunately, not all cloud-first developed solutions can deftly manage the interface between on-premises and cloud transfers. A comprehensive secure file transfer solution, GoAnywhere MFT is deployment-flexible, executing the on-premises/cloud interface seamlessly. It maintains security and control of data transfers between organisations and their trading partners. --- If you’d like to discuss how a secure Managed File Transfer solution can help you keep the cybercriminals at bay, please feel welcome to contact our Business Manager, Bradley Copson ( mail to: bradley@gensys.com.au ). He's always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. At Generic Systems Australia, we’re your local experts in secure Managed File Transfer. Previous Next
- DATASHEET THREAT BRAIN | GSA
GoAnywhere MFT is the world’s leading Managed File Transfer solution. This datasheet summarises its key technical features. Review product datasheet below: RESOURCES HOME
- How to Protect Your Customers’ Personal Identifiable Information | GSA
< News How to Protect Your Customers’ Personal Identifiable Information 8 Nov 2024 Protecting customers’ Personal Identifiable Information (PII) has fast become a critical duty of care for every organisation. What is PII, and why is it valuable? PII includes information such as Tax File Numbers, Medicare numbers and other health records, credit card details, student addresses and more. Cybercriminals attempt to access PII for financial gain, either directly – by selling it to data brokers on the dark web – or indirectly, by identity theft. Stolen PII can be used by hackers to open bogus credit card and bank accounts, and to socially engineer attacks using methods such as phishing and ransomware. Organisations need to zealously protect the PII provided to them by customers – not only for the sake of maintaining trust, but also to guard against heavy sanctions for non-compliance by regulators such as ASIC and the ACCC. And those compliance requirements are ramping up. Just last month, Australia’s federal government introduced legislation to parliament which will revolutionise Australia’s cyber security preparedness by imposing new protection standards and reporting requirements on local businesses. International Obligations However, compliance requirements for the protection of PII don’t stop at our national borders. For example, businesses with customers in Europe need to comply with the EU’s General Data Protection Regulation. Local businesses trading in the US need to comply with America’s Health Insurance Portability and Accountability Act, Federal Information Security Management Act, Payment Card Industry Data Security Standard, Gramm-Leach Bliley Act and California Consumer Privacy Act. Rising Risks and Impacts Recent statistics demonstrate the growing risk and significant impact of PII data breaches. Verizon’s Data Breach Investigation Report for 2024 shows that some 60% of data breaches involve some form of personal information. And IBM’s 2024 Cost of a Data Breach Report revealed the global average cost of a data breach now exceeds A$7 million. Protecting PII Stepping up to the needs of PII guardianship requires both technology solutions and sound business practices. Layered defences, with integrated solutions that address encryption, threat protection, and data loss prevention, enable safe collaboration without risking malware, mishandled data, breaches and non-compliance. Given most breaches involve a human element, technology solutions need to be automated and easy for employees to use. Software needs to be able to manage: How access to data is granted; How access is authenticated; How access is tracked and controlled; and How access be speedily revoked, when needed. Layered Protection A standalone managed file transfer (MFT) solution – such as GoAnywhere MFT - is a great first layer of defence. It provides security for files at rest and in-transit. However, integrating Threat Protection as an additional layer enables you to take appropriate action when there’s PII in the data moving in and out of your organisation. Based on rules you predefine, our Advanced Threat Protection Bundle can mask, remove, or permit PII to be moved within your organisation and beyond, via a Secure ICAP Gateway. Medical Case Study A medical enterprise needed to transfer attachments between employees and trading partners containing detailed billing information. They had long used a managed file transfer solution to exchange patient records within and outside the organisation. However, they realised they needed to further safeguard patients’ PII via deep content inspection. The organisation integrated GoAnywhere MFT with Secure ICAP Gateway, adding anti-virus protection as well as structural “sanitisation” of files being transferred. Their combined MFT/Advanced Threat Protection now works to: Inspect for malware and viruses; Intercept content based on threat protection and data loss prevention requirements; Run rule sets such as renaming, script removal, keyword searches to control if content is allowed in or is blocked; and Sanitise PII content to permit ongoing transfer (or block it, if content cannot be adequately sanitised). Thanks to layered protection, the organisation can now exchange patient records free from viruses and malware, while only disclosing a use-appropriate level of PII. Controlling PII Disclosure Adding granular rules-based controls to data handling is the “killer feature” of Advanced Threat Protection. For example: You can permit some specified individuals to transmit PII, but not everyone. You can apply role-based access to PII. You can audit who is sending what information. GoAnywhere MFT’s encryption can be enhanced by limiting who can transfer PII data and what that data contains. The automatic detection and sanitisation of files removes some of the human factor risks so that employees can focus on their work instead of fussing with manual interventions. Augmenting technical solutions with employee training further reduces human factor risks. Here to Help Generic Systems Australia are the Asia-Pacific region’s experts in deploying Managed File Transfer and Advanced Threat Protection. We’ve assisted dozens of organisations to protect their PII and secure their file transfers, while keeping their businesses running smoothly. If you’d like to discuss how we can help you, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how simply we can transition you from outdated protocols and approaches. I can even arrange a simple, zero-cost Proof of Concept. Previous Next
- Ad-Hoc Filesharing Services Add Risk | GSA
< News Ad-Hoc Filesharing Services Add Risk 27 May 2025 Make no mistake - unintentional errors by employees and supply chain partners are a leading cause of data breaches. The uncontrolled use of ad-hoc file sharing services (e.g. WeTransfer, Dropbox, Google Workspace, Cerberus FTP Server, and ShareFile) significantly increases the risk of employees making mistakes and for those mistakes to go unnoticed. Here then are seven reasons why organisations should reconsider their use of ad-hoc cloud file sharing services. 1. They may not enforce automatic file encryption. A key means of preventing your data falling into the wrong hands is to ensure it’s always encrypted, both in transit, as well as when it’s being stored. A secure Managed File Transfer (MFT) solution can automatically encrypt your data. 2. Dubious key and certificate management. Beyond encryption of the file being transferred, some cloud applications leave files open to malicious intent by failing to maintain strong keys and certificates. 3. They may create compliance gaps. Not all cloud platforms meet regulatory requirements around file transfers, leaving your organisation liable for financial, legal, and reputational damages. 4. Limited data control. Unsupervised file sharing and collaboration can lead to files being sent to or accessed by unauthorised individuals. With many cloud-based solutions, once files are transferred, there’s no ongoing control over their use. A secure MFT provides ongoing safeguards with tight controls on who can access, edit, and transfer files, and for how long. 5. No workflow automation. MFT solutions such as GoAnywhere MFT simplify and automate file transfer processes, with multi-step workflows to execute repetitive, manual tasks. "Projects" can be easily created by dragging and dropping modules which define business processes to seamlessly transfer files, eliminating the need for complicated scripting or programming. For example: a Project can be created to retrieve encrypted data from a server, decrypt it, read file contents and submit them to a downstream internal application. The file can also be altered, added to, re-encrypted, and then sent to another external SFTP server. 6. Lack of centralised user management. Cloud file sharing solutions may not provide a comprehensive and easy to use dashboard for administrators to control access, authentication, and encryption of sensitive files. The more tools and applications that must be coordinated, the greater the risk of human or systems error. A robust MFT solution manages all types of file-send situations, including ad-hoc emails, large files, and batch files. 7. Threat detection and management. Protecting your organisation from viruses, malware, ransomware, Advanced Persistent Threats, and banned media types requires constant vigilance. Our Advanced Threat Protection can automatically block these threats and remove the element of human error from your risk profile. Local Expertise Available If you’d like to discuss removing the risk of ad-hoc file sharing applications from your organisation, please feel welcome to contact me . I’m always happy to have an obligation-free discussion, demonstrate the capabilities of the world’s most advanced MFT, and even offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. Previous Next
- Why Your Business Needs PROACTIVE Cyber Security | GSA
< News Why Your Business Needs PROACTIVE Cyber Security 4 Apr 2025 Blocking cyber criminals before they gain access to your IT systems requires your cyber security solution to have access to, and pre-emptively act upon, the very latest intel on threats. It needs an early warning system. Activating the proactive features in your existing security solutions is a good first step to keeping bad actors out. However, layering security with solutions that guard your data – instead of merely alerting you to breaches after the fact – is much better. Six Reasons Here are six reasons your organisation should consider making a proactive Managed File Transfer (MFT) security solution the foundation for your layered data security. Traditional threat intelligence is reactive against cyberthreats rather than proactive. While Brute Force and Denial of Service (DoS) attacks can be detected automatically, that’s only after your systems have come under attack. A vulnerability discovered by a cybercriminal in one business system can be quickly replicated across other businesses’ systems in a wave of copycat attacks . Some attacks may only be detectable through (all-too-infrequent) manual inspection of activity logs. New and previously unknown vulnerabilities can lead to Zero Day incidents , if cyber security solutions don’t continually check for bad IP addresses. Cybercriminals systematically probe MFT service endpoints to evade automatic IP blocking. An Example A manufacturing plant with multiple MFT deployments was concerned about rising cyberthreats and the potential for their systems to be compromised. While they were confident in their MFT solution’s ability to protect sensitive data while in transit and in motion, their system didn’t pre-emptively detect bad actors or threats before they entered their MFT environment. While they could add trusted IPs to their “allowed” list, that created a future level of risk. What if that IP address was subsequently compromised…? Thinking Ahead GoAnywhere MFT , the world’s most fully-featured MFT, offers a unique proactive threat intelligence advantage over other lesser solutions , mitigating the risk of persistent IP address trust. By simply turning on the feature in the latest version of GoAnywhere, organisations can leverage the dynamic intelligence database of Fortra’s Threat Brain . This “brain” is comprised of data and indicators from Fortra’s deep portfolio of cybersecurity solutions. It provides a forward-leaning approach to cybersecurity threats, blocking IPs with bad reputations or malicious intent before they enter the MFT environment. When activated within GoAnywhere, Threat Brain pre-emptively blocks bad actors across all attack vectors, continually checking trustworthiness with each new session. Proactive Security Benefits for MFT As a built-in module, Fortra’s dynamic cybersecurity intelligence database benefits GoAnywhere customers by: Consistent re-verification : An IP's reputation is re-checked with every session to ensure it remains safe”. Other MFT products don’t offer this ongoing monitoring of IP addresses once they are white-listed. Comprehensive threat intelligence data sources : Threats detected in one of Fortra’s many security solutions is shared with the Threat Brain, increasing the overall intelligence data available to GoAnywhere MFT. Layered protection : Combined with Threat Protection and Zero Trust File Transfer, GoAnywhere provides unmatched options to safeguard data throughout the entire data lifecycle. Stay A Step Ahead of Cyber Crims Blocking the door to your MFT environment can be as easy as enabling the Threat Brain module in GoAnywhere and determining which level of security you require to meet your organisation’s security mandates or compliance requirements. If you’d like help tapping GoAnywhere’s proactive capabilities for your organisation, please feel welcome to contact me . I’m always happy to have an obligation-free discussion, demonstrate GoAnywhere’s capabilities, and even offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. Previous Next
- Contact Us | GSA
We're Happy to Help Generic Systems Australia are your local experts in Secure Managed File Transfer, servicing Australia and the Asia-Pacific region. We're always happy to answer your questions, or offer you an obligation-free discussion and zero-cost Proof of Concept. Address Generic Systems Australia Level 25, 100 Mount Street North Sydney NSW 2060 Australia Phone +61-2-9959-2239 Email mktg@gensys.com.au Social Media First Name Last Name Email Phone Number (optional) Message Enquiry Type Learn More Send Thank for your message! You will receive an email shortly! We respect your privacy! We won't share your details with third parties or AI. Your enquiry will be handled personally by a member of our technical team. And we won't spam you.
- Why financial services organisations rely on Managed File Transfer solutions | GSA
< News Why financial services organisations rely on Managed File Transfer solutions 30 June 2025 Few sectors rely on secure data transfers quite as much as the financial services sector. That’s why so many banks, insurers, financiers and those who support them leverage the security and reliability of Managed File Transfer (MFT) solutions. MFT enables organisations to securely and reliably exchange electronic data between systems while complying with regulatory requirements. With MFT solutions, organisations can confidently facilitate internal and external enterprise data transfers, including sensitive, compliance-protected, and high-volume data. This is particularly important in the financial sector, among the most heavily regulated industries in the world. The sheer quantity of sensitive personal information financial institutions handle makes them a near-irresistible target for cybercriminals. MFT solutions play a critical role in helping financial institutions protect this priceless data in transit and at rest in five ways. 1. Secure Data Transfer Financial institutions handle and transfer highly sensitive financial and customer data. This data needs to be secured, especially when in transit. MFT solutions automate file transfer processes, enforcing policies which mitigate the risk of human error and subsequent cyber security incidents resulting from manual processes. Similarly, MFT’s automation capabilities continuously monitor file transfer activities and generate logs and audit trails, as well as process files through automated workflows. By providing system administrators with real-time alerts to critical events such as failed transfers, security breaches and policy violations, MFT solutions empower security teams to identify and respond to security threats as and when they occur. MFT solutions also support security protocols such as HTTPS, SFTP, and FTPS to encrypt data in transit and prevent unauthorised users from accessing or tampering with it. 2. Regulatory Compliance MFT helps enable financial institutions to meet their stringent industry regulatory requirements. This includes international Standards such as the Payment Card Industry Data Security Standard (PCI DSS), Gramm-Leach-Bliley Act, and the EU’s General Data Protection Regulation (GDPR). MFT solutions ensure data integrity through checksums and cryptographic hashing algorithms to verify file integrity and ensure that data received matches data sent. Most regulatory standards require that data remains unaltered during transit - MFT makes sure that happens. There’s a productivity bonus, too. Compliance reporting can be highly time-consuming. However, MFT solutions streamline the task, enabling organisations to demonstrate regulatory compliance quickly and efficiently via detailed reports on file transfer activities. 3. Streamline Business Processes Beyond compliance, MFT solutions help streamline business processes in other useful ways. Through workflow orchestration, MFT solutions ensure file transfers follow a predefined sequence and adhere to business rules. Workflows typically involve multiple steps, including file conversion, data transformation, encryption, validation, and delivery to specific destinations. MFT solutions ensure this process runs smoothly and securely. The complex network infrastructures of modern organisations can make file transfers challenging to track and maintain. Through centralised management and control capabilities, MFT solutions enable security teams to define transfer settings, security policies, and user access controls from a single, browser-based interface. Centralised management and control allow for enhanced visibility and governance of file transfers and eradicate the need for security teams to trawl through disparate data siloes to track and secure data transfers. 4. Integrate with Financial Systems Financial institutions typically have very complex IT infrastructures comprising multiple disparate systems, applications, and platforms. The best MFT solutions offer integration capabilities that connect financial systems such as core banking, enterprise resource planning (ERP) systems, treasury management systems, and trading platforms. These integrations ensure smooth, secure, and efficient data exchange between systems and facilitate financial operations and decision-making. 5. Business Continuity and Disaster Recovery Business continuity and disaster recovery are crucial for financial institutions, where significant downtime can result in huge financial and reputational impacts. Via features such as data replication, failover mechanisms, and backup options, MFT enables organisations to respond to and mitigate the effects of cyber incidents, preventing data loss and ensuring business continuity. The Leading MFT GoAnywhere MFT , independently assessed to be the world’s leading MFT , helps the finance industry securely exchange data, comply with regulatory requirements, streamline business processes, integrate with financial systems, and ensure business continuity. Many financial institutions around the world use GoAnywhere as a foundational file transfer platform, helping them address and resolve their unique data security and compliance challenges. Australia’s and NZ’s Local MFT Experts Generic Systems Australia has decades of experience helping Australian and New Zealand financial organisations leverage the power of the world’s leading MFT solution. Our Migration Service makes the transition even easier for organisations who prefer to use their resources building their businesses rather than improving their IT plumbing. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch with us. At Generic Systems Australia, we’re your local experts in Secure Managed File Transfer. Previous Next
- MFT'S ROLE IN BUISNESS : EBOOK | GSA
“MFT's Role in Business: IT Leaders Weigh In” eBook A good way to learn the value of a Managed File Transfer (MFT) solution is to hear about it from those who use one. In Fortra’s eBook “MFT's Role in Business: IT Leaders Weigh In”, nine IT and security professionals share their experiences using Fortra’s GoAnywhere MFT. To receive a complimentary copy of the eBook, simply send us your email address below: First name Last name Enter your email address Phone You'll receive the "MFT's Role in Business: IT Leaders Weigh In" eBook RESOURCES Receive Report HOME
- THINK LIKE A HACKER | GSA
THINK LIKE A HACKER To win the fight against cybercriminals, it helps to think like a hacker. In this guide, we explain the terminology and techniques used by cyber thieves, and share seven important strategies for protecting your valuable data. To receive our Guide, please submit your email address below: First name Last name Enter your email address Phone You'll receive the 'Think Like a Hacker' Guide shortly! RESOURCES Receive Report HOME
- LOCAL BUYERS GUIDE | GSA
MFT Local Buyer's Guide Finding the right Managed File Transfer solution for your organisation may not be easy... with dozens of factors to consider - including industry and government compliance requirements, cloud vs on-prem solutions, critical cybersecurity protections, pricing models and more. In this MFT Local Buyer’s Guide, you’ll find the key considerations, the questions you need to ask vendors, and a wealth of other advice to help you successfully evaluate MFT solutions. To receive our Local Buyers' Guide, simply submit your email address below: First name Last name Enter your email address Phone You'll receive the Buyers' Guide shortly! RESOURCES Receive Report HOME
