Search Results
182 results found with an empty search
- Make Email Attachments Safe | GSA
< News Make Email Attachments Safe 3 July 2024 Email attachments continue to be the single biggest threat to your organisation’s cyber security. In 183 million phishing simulations conducted by Proofpoint customers this year, almost one in six recipients of a suspicious phishing email failed to protect their organisation’s valuable data. Employees either clicked a malicious link, performed a bogus password reset, or downloaded malware or ransomware. With such a high and persistent risk of cyber incursion, organisations increasingly require more from their file transfers than standard email attachments can provide. They need a smarter, more reliable way to send files, stay secure, and meet the needs of their clients, compliance mandates, and industry regulations. Managed File Transfer (MFT) future-proofs an organisation’s ability to send and receive files quickly, breaking free of the constraints of email attachments, and maintaining cyber security. Problem: Size Caps Most email applications cap the size of email attachments to 25 MB. That may have been “big enough” a couple of decades ago… but no longer. Now, a single high-resolution image can easily exceed 25Mb. Sending an entire folder typically requires zipping it to condense its contents. However, splitting ZIP files into chunks less than 25Mb is a time-consuming hassle. Problem: Insecure Even when successfully sent, email attachments pose ongoing security risks. They can be forwarded to unintended users. Worse, a single recipient with an infected device can infect the attachment with malware and spread it to others. On top of that, there’s always a possibility that an employee could send an email to the wrong person, or mistakenly send sensitive information outside of their network, causing compliance issues for your organisation. Problem: Indiscriminate If an attachment message originates internally, the protocol to keep sensitive data safe (or how to determine what sensitive data is) is often not widely disseminated or used. Encrypting attachments, one effective mechanism, can be tricky for casual users and implemented inconsistently, undermining its reliability as a whole-of-organisation solution. Problem: Degraded Performance Too many attachments can clog your inbox archive and slow backup processes. Some file types such as DLLs, JARs, and SOs may be completely blocked by email systems, disrupting business processes. Unpacking endless ZIP files also depletes available server resources. GoAnywhere MFT to the Rescue Email attachments have their place. But too often they’re a far from ideal way to move data, failing to provide the efficiency, agility, speed, and protection companies need when sending the files that underpin their business. That’s where GoAnywhere MFT can help. Solution: No Size Limits Providing a secure alternative to emailing files, the Secure Mail module in GoAnywhere MFT enables employees and other authorised users to easily send files. It’s much more secure than traditional email, and doesn’t limit file sizes or types. GoAnywhere not only frees your organisation from file size constraints, it also includes accelerated file transfer technologies which speed files to their destinations. Patented UDP file transfer technology enables even the largest files to be sent without incident from anywhere in the world. GoAnywhere’s MFT agent also helps ensure large batch files get to their destination with auto-resume and integrity checks, ensuring all of your message gets there in one piece, despite any network connectivity issues along the way. And if a network connectivity issue prevents the file being successfully transferred, GoAnywhere’s comprehensive alerts ensure you’ll know immediately. Solution: Secure Encrypted Sends Encryption is built into GoAnywhere. Any files sent are automatically encrypted end-to-end using one of a range of encryption protocols, including Open PGP, SFTP, FTPS, AS2 or AS4, and ZIP with AES. GoAnywhere also enables password protection for the attached downloads in case they are sent to the wrong recipient. Additionally, Secure Folders provide a place where your team can safely collaborate. Solution: Bottleneck Buster Lag, inefficiencies and other performance inhibitors are nullified GoAnywhere’s load balancing . Managed transfers help maximise uptime, and clustering functionality distributes files across your network, so they get there in the fastest time and with the least amount of disruption. Solution: Seamless Integration with Inbound Protection By combining GoAnywhere MFT with Clearswift in our Threat Protection Bundle , organisations can create layered cyber defences which enable their teams to receive and share information securely without impairing their productivity. It seamlessly integrates MFT with advanced threat protection and adaptive data loss prevention to keep your sensitive data secure. Not only does it prevent malware from entering your organisation, it also prevents employees from losing or mishandling data. For example, if an employee knowingly (or unknowingly) attempts to share any files containing malware, those files are sanitised by having the malicious elements automatically removed. The SFT Threat Protection Bundle can also automatically detect and - if you configure it to do so - prevent employees from sharing sensitive information. If you’d like to discuss how your organisation’s file transfers can be made more secure and efficient, please feel welcome to contact me, Bradley Copson (mail to:bradley@gensys.com.au). I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfe r. Previous Next
- Strong Growth in Cyber Security Workforce Projected | GSA
< News Strong Growth in Cyber Security Workforce Projected 6 June 2025 Australian Cyber Network’s recently released State of the Industry 2024 report contains some interesting reading about the composition and qualifications of Australia’s cyber security workforce. Continued Growth, Changing Composition According to ACN, the nation’s cyber security workforce has continued its rapid expansion, reflecting both increased demand for cyber security professionals and the evolving nature of cyber threats. In 2024, it reached 137,453 professionals, up 9% over the previous year. However, within the overall growth, there’s been a shift in how cyber security roles are structured, and the priorities being placed by organisations on different skill sets. For example, 41% of the total roles are dedicated cyber security positions which explicitly require security expertise, and the remaining 59% are related roles, where cyber security is a significant but not exclusive aspect of the jobholder’s responsibilities. Within the dedicated category, 36% require deep technical expertise. These include Cyber Security Engineers, Penetration Testers and Security Architects. This indicates that, while cyber security expertise is becoming more specialised, a growing number of professionals across all sectors are required to integrate security skills. Functionally, the cyber security workforce remains heavily concentrated in Database Administrators and ICT Security Specialist roles (54%), followed by Software and Applications Programming (24%) and ICT Management (22%). Among the roles requiring deep technical expertise, Cyber Security Engineers, Penetration Testers and Developer Programmers dominate, with 81% within the Software and Applications Programmers category. These figures suggest that cyber security remains deeply embedded within the software development and data security domains, reinforcing the importance of integrating security considerations into the early stages of software engineering and IT infrastructure development. Gender Diversity From a gender diversity perspective, Australia’s cyber security workforce remains heavily male-dominated, with only 25% women. However, that’s an 8% increase since 2021, so progress is being made. ACN attribute the improvement to sustained efforts by industry groups, government initiatives and corporate programs, as well as the work of organisations dedicated to fostering a stronger, more connected community for women in cyber security. Workforce Projections ACN projects the cyber security workforce to grow significantly through to 2029, albeit at a reduced rate. By 2029, they expect the total workforce to grow to 193,000 roles, with slightly higher growth in dedicated roles. They believe that, while demand will remain strong, the acceleration seen in previous years may stabilise. Overall, the data reveals that cyber security analysts and engineers are driving the bulk of workforce expansion, highlighting industry demand for both frontline detection and incident response capability as well as technical implementation expertise. Skills Still In High Demand State-by-state forecasts reveal that, while Australia’s cyber security workforce appears sizeable on paper, with many states showing a healthy current supply of workers including jobseekers, supply is not keeping pace with projected demand. Across most jurisdictions, the number of workers per vacant job is steadily declining, signalling increased pressure on talent pipelines. States like Victoria, New South Wales and Western Australia, despite having the largest supply pools, will still show significant tightening in their job markets by 2029. South Australia and Queensland, with some of the highest worker-to-job ratios today, are projected to see those gaps narrow. ACN says this trend underscores the urgent need to build new entry pathways, accelerate training and retain talent, or risk a widening disconnect between workforce availability and industry needs across the country. Previous Next
- Hidden Cost of "Free" File Transfers | GSA
< News Hidden Cost of "Free" File Transfers 1 Nov 2023 The Hidden Cost of "Free" File Transfers With 329 million terabytes of data being created each day, the ability to transfer files quickly and dependably has become a core business process for every business. Surprisingly, some businesses continue to entrust this critical dependency to free file transfer software. But is this software truly “free”…? A study by Aberdeen Group identified hidden costs that businesses incur using “free” file transfer mechanisms. In fact, 80% of files sent through e-mail attachments or “free” file transfer services ended up costing organisations money in the long run. How…? It’s taking longer to move a lot of data around. For example, as our businesses are finding new ways to make use of the high-resolution cameras in our smartphones, video files growing exponentially in size. HD video – with files measured in gigabytes - is already the standard. But 4K videos – typically hundreds of gigabytes– will soon be the norm. Moving high-res movies around finds employees spending more time than ever before simply waiting for file transfers to complete. When your team is sitting around waiting for a file to arrive, there’s a significant reduction in their productivity. If it takes them 3 hours to send a file, that’s 3 hours where both they and their collaborator are without the file needed to work effectively. Multiply the number of hours by the salaries of both professionals in question and the “free” file transfer isn’t free anymore. How often have you tried to send a file, only to have the transfer crash out midway? It’s not just frustrating, it’s a further waste of time. When file transfers fail, the non tech savvy among us need to seek the help of their IT department. So, not only is their time being wasted, but there’s a labour cost in resolving the problem. Aberdeen’s study estimated that resolving each stalled file transfer required a cumulative 11 hours of team time. Even when files successfully transfer, there remain significant cybersecurity risks when sensitive files are sent via free services. In Aberdeen’s study, free service transfers were twice as likely to result in security breaches compared to those conducted with professional Managed File Transfer software such as GoAnywhere . Major security issues took an average of 16 business hours to resolve and cost companies millions of dollars. When files are too big to send as email attachments, employees turn to “free” transfer tools. However, the time spent finding such tools could have been better spent on their core responsibilities. There’s not only a better way to move data around your business and its supply chain… it’s also a more cost-effective way. Aberdeen’s study found that businesses which invested a little in a professional Managed File Transfer solution had a median return of almost 500 times their investment. When it comes to Managed File Transfer solutions, there is one acknowledged industry leader – GoAnywhere MFT . GoAnywhere automates and encrypts data between an organisation’s employees and with its trading partners, protecting from unnecessary vulnerabilities while vastly improving file transfer speed and quality. If you’d like to discuss how GoAnywhere MFT could improve your organisation’s productivity and bottom line, please feel free to contact me ( bradley@gensys.com.au ), or read more at the Generic Systems Australia website. Bradley Copson, Business Manager, Generic Systems Australia Previous Next
- The GoAnywhere Customer Who Didn’t Panic | GSA
< News The GoAnywhere Customer Who Didn’t Panic 20 Aug 2025 In Douglas Adams’ much-loved work of science-fiction whimsy, The Hitchhiker’s Guide to the Galaxy, the Babel Fish is a small yellow fish inserted into a person's ear to provide instant translation of any language. Described by The Guide as “probably the oddest thing in the universe”*, the Babel Fish is a neat (if somewhat slimy) solution to the pervasive galactic challenge of interspecies communication. It reminds me how GoAnywhere MFT once solved a customer’s pressing “payslip-up”. “But the plans were on display…”* Our customer, a leading provider of human services who employs thousands, had installed a new payroll system. This system, like the outdated system it was replacing, produced employee payslips as PDF files. These were subsequently distributed to employees via a separate Human Resources system. Installation, testing and initialisation of the new payroll system had all gone according to plan. Until, that is, the first pay run was performed. “Have you any idea what these strange symbols are?”* In what The Hitchhiker’s Guide may well have cited as “a practical demonstration of the principles of infinite improbability” employees didn’t receive their payslips. It was soon realised that the problem had occurred because the PDF payslips produced by the new payroll system were formatted differently to the PDFs previously produced by the old one. (The old system had output the PDFs as individual PDF files for each employee, compressed into a zip file. The new system output one PDF file for each employee and, further complicating the situation, the new payslips varied in number of pages.) These PDF formatting changes rendered the output from the new payroll system unreadable by the Human Resources system - a problem which had somehow been overlooked during testing. “The consequences of not knowing any of this stuff are particularly terrible”* This failure of inter-systems communication wasn’t just a problem for the employees, who had understandably grown accustomed to keeping tabs on their earnings, but it created a looming compliance problem for the business. Australia’s Fair Work Act is vexingly inflexible when it comes to the timing of providing employees with payslips. (This is in marked contrast to the famously flexible relationship with time enjoyed by The Guide’s author Douglas Adams, particularly as relates to deadlines). Failure to fix the problem quickly would expose the business to financial penalties, legal consequences and potential union action. “Don’t Panic!”* Heeding the single most important piece of advice in The Hitchhiker’s Guide to the Galaxy , our customer didn’t panic. Instead, they called me to ask whether Generic Systems Australia could help solve their predicament. And - thanks to their installed GoAnywhere Managed File Transfer solution – we could! The Babel Fish* Faster than a Vogon invited to a poetry recital**, our Solutions Architect revised the customer’s GoAnywhere automated file transfer process. GoAnywhere was already collecting the PGP-encrypted PDF from the new payroll system via SFTP, decrypting it, and transferring it to the customer’s Human Resources system. He added to that automated transfer process new logic which split the PDF pages, correctly formatting the output and allowing for payslips of varying page lengths. GoAnywhere was, in effect, performing the role of a computerised Babel Fish. And, thanks to GoAnywhere’s easy to use drag-and-drop interface, it took our Solutions Architect less than half a day to set up the workflows. He didn’t even need a towel***. “If you ever need help again…”* There’s no need to go to the ends of the universe**** to get expert help on file transfers and translations. At Generic Systems Australia , we’re Australia and New Zealand’s experts in helping business take advantage of every one of GoAnywhere’s many capabilities. We’ve assisted hundreds of organisations to automate their data flows, making their file transfers resilient, secure and reliable, and boosting their efficiency. If you’d like to discuss how we can boost your organisation’s efficiency, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how easily we can transition you from your current approach to a galaxy-leading level of productivity. At Generic Systems Australia, we’re your local experts in data transfer. _______________________________________________________________________________________ * A direct quote from The Hitchhiker's Guide to the Galaxy . ** In The Guide , Vogon poetry is described as the third worst in the universe, surpassed only by the poetry of the Azgoths of Kria and the late Paula Nancy Millstone Jennings. It's so bad, it's often used as a form of torture, causing physical pain to the listener. *** The Guide describes a towel as the most massively useful thing an interstellar hitchhiker can have - not just useful for practical purposes like warmth, sunbathing, or even as a weapon, but also with significant psychological value. A hitchhiker who knows where their towel is is seen as someone together and capable, as it implies they also possess other essential items. **** The Guide describes Milliways, the Restaurant at the End of the Universe, as being enclosed in a time bubble and offering a unique floorshow featuring the end of the universe. Previous Next
- How to Secure Online Data Acquisition with Secure Forms | GSA
< News How to Secure Online Data Acquisition with Secure Forms 3 Feb 2026 Whenever you ask someone to complete a form online, you’re asking for their trust. They’re handing over details that your organisation needs. In return, they expect your organisation to handle those details in confidence and with care. From payment methods to sensitive medical histories, people want assurance that their information won’t fall into the wrong hands. Earn Trust with Secure Forms Using HTTPS to transmit form data is a solid baseline. However, there’s an even stronger and more structured alternative - Secure Forms. An add‑on module for GoAnywhere Managed File Transfer , Secure Forms not only protect the information being submitted but also streamline how that information moves through your business. Secure Forms offer far more than encrypted submissions. You gain control over how forms look, how they’re accessed, and how the collected data flows into your internal systems. Public or private URLs, automatic encryption for uploaded files, and seamless workflow integration all come standard. Why It’s Worth Upgrading Choosing a purpose‑built Secure Forms solution doesn’t just improve protection - it boosts efficiency across your processes. With GoAnywhere Secure Forms, you can: Build tailored forms for authenticated users or open access Let users upload supporting documents as needed Support drag‑and‑drop file attachments, automatically encrypted with AES‑256 Define your preferred media types Add Data Loss Prevention (DLP) and Threat Protection Embed forms directly into your website Use Advanced Workflows to route submitted data into platforms like Salesforce or other business systems Trigger email notifications when submissions are received Insert submitted data straight into a database table. How Secure Forms Work At Generic Systems Australia we have years of experience designing custom Secure Forms for organisations. Or, you can DIY… Build and configure: design a form with the fields and options your process requires. Then share access through either a public or restricted URL, giving you full control over who can submit information. Complete and protect: Users fill out the form and attach any necessary files. Every uploaded item is encrypted automatically using AES‑256, ensuring sensitive content stays protected from the moment it’s submitted. Submit and automate: Once the form is sent, GoAnywhere triggers the workflow you’ve defined. This removes manual steps and ensures the information moves quickly to the right system or team. Customisation Without Compromise Secure Forms are built to adapt to your needs. You can fine‑tune nearly every element, from field labels to file‑upload rules, giving you complete control over the data you collect. You’re able to: Configure fields, dropdowns, tooltips, and default values Accept a wide range of file types Submit forms via SOAP or REST APIs, or directly through a URL Display personalised confirmation messages and provide downloadable follow‑up files (such as PDFs) Redirect users to additional forms after submission Enable or disable submission notifications Set limits on file size, type, and quantity Receive alerts via email or SMS Transform submitted data as needed Allow users to save drafts and finish later. Trust the Secure Forms with a Track Record Recognising GoAnywhere’s advanced capabilities, some software vendors have recently sought to emulate the tried-and-tested Secure Forms approach within their less fully-featured MFT solutions. However, trust is established over a long time. GoAnywhere’s Secure Forms were introduced 2016, and so benefit from a decade of refinement and successful implementation. Here to Help Whether it’s designing and implementing your Secure Forms, or talking more broadly about how MFT can help your business become more secure and efficient, Generic Systems Australia is here to help. No need to do deal with hands-off multinationals and their odd time zones - we’re right here in Australia, right now, ready to help. Previous Next
- Ditch Your File Transfer Scripts | GSA
< News Ditch Your File Transfer Scripts 10 Sept 2024 More and more companies across the Asia-Pacific region are realising they have a pressing need to eliminate their use of outdated file transfer scripts. A Key Vulnerability A recent survey found that our region is on the frontline, subject to more cyber attacks than any other. 72% of local organisations experienced four or more cybersecurity incidents in the past year - 20% more than the global average. Manual scripts – often written by employees to reduce the repetitive burden of manually transferring files – are a key vulnerability. Not only are file transfer scripts risky, they’re also inefficient and prone to failure. MFT: safer, more efficient Managed File Transfer (MFT) is a powerful technology which comprehensively addresses the risks and challenges of moving information, both within an organisation, and with external suppliers, partners and customers. It simplifies and secures data transfer by providing centralised control, encryption, enhanced security protocols and auditing. Unsurprising then that more and more IT departments are using MFT to replace their outdated manual file transfer scripts. Reasons to Ditch Scripts Scripts don’t play well with new tech. For example, cloud-based computing environments require file transfers to be integrated with cloud-based solutions, and platforms such as Azure and AWS. Scripts lack advanced features. For example, automating file transfers – say, with FTP - requires you to add a second solution, which is time-consuming and complex. Scripts are also challenged to detect and implement automatic “re-try” features in the event of failure, or prevent employees mishandling sensitive data. Scripts are time consuming. Developing, maintaining, and troubleshooting scripts takes time, distracting valuable IT staff from more important tasks. Worse, if the author of a script isn’t available when it fails, bottlenecks can occur in your workflow. Scripts don’t offer built-in reporting. Logging needs to be manually added to scripts. Accessing those logs – say, when you need to prove audit compliance, or meet other regulatory reporting requirements – is time consuming and difficult, requiring an effective filter and search tools. Scripts aren’t secure. As explained above, scripts don’t offer the security features necessary to keep cyber thieves at bay. User credentials aren’t encrypted, there’s no in-built key management, no access controls, and they’re unlikely to use up-to-date security protocols. Why MFT is Better than Scripts As well as increasing the security of your file transfers, ditching scripts offers your organisation many other compelling advantages. Centralised Control. Instead of using multiple different tools, programs, and scripts to encrypt, send, and automate your file transfers, MFT can enable all of these from a single interface. That significantly streamlines day-to-day operations and reduces wasted tool maintenance time. Automate. No matter the volume of files to be transferred across your business and supply chain, the best MFTs enable your team to spend time focusing on other things. Save Money. Clients are often surprised how many employee-hours they’re spending creating, maintaining and resolving problems with file transfer scripts. These ongoing hidden costs can really mount up. (And that’s without considering the potentially catastrophic cost to your business of a data breach enabled by an insecure script!) Flexible Scalability. The best MFTs scale fluidly – horizontally and vertically - as file transfer loads increase. They make redundant tedious and uncertain processes of buying, deploying and understanding gateways, load balancers and other expensive network devices and hardware. Cloud-friendly MFT tools also exploit new cloud and virtualisation capabilities to scale up quickly to meet demand. They can even be “failed over” to a DR site in the event of an outage. Regulatory Compliance. By logging file transfers and access across your organisation, the best MFTs ensure your compliance with legal requirements, such as data privacy and encryption. Logs are also readily accessible if you’re called on to demonstrate your compliance during an audit or need to conduct forensics after an internal security breach. The Best MFT Independent analysts agree that that GoAnywhere MFT is the industry’s leading Managed File Transfer solution. GoAnywhere not only enables your data to be moved securely - both internally and externally – it also enhances your team’s productivity. Asia-Pacific’s MFT Experts No-one better understands local MFT needs and best practices than Generic Systems Australia. Our local team has decades of experience helping businesses replace outdated and risky scripts with the world’s leading MFT solution, and our Migration Service makes the transition easy. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably transition from risky scripts to an advanced MFT solution, please feel welcome to get in touch . Previous Next
- Cyber Security to be Top Investment for 2025: CIOs | GSA
< News Cyber Security to be Top Investment for 2025: CIOs 17 Sept 2024 Australian and New Zealand CIOs are planning to invest significantly in improved cyber security in 2025, according to a recent survey by analysts Gartner. Some 88% of the region’s CIOs and technology executives said they would invest in heightened cyber security measures. 82% said it would be their top investment priority. More Attacks, More Regulation Gartner attributes this focus to greater government regulation, coupled with some of the largest cyberattacks seen in ANZ so far. Speaking at the 2025 Gartner IT Symposium/Xpo on the Gold Coast, Gartner VP Brian Ferreira said “Organisations face greater scrutiny as they batten down the hatches to avoid becoming the next target or breaching stewardship. This continues to drive significant focus and investment towards cybersecurity and legal compliance into next year.” The uncertain economic climate businesses have operated in recently has increased executive and board scrutiny on technology investments, he said. Gartner’s survey found that increased focus on cyber security will attract investment away from previous ANZ CIO priorities of legacy infrastructure (43% of respondents), augmented reality, virtual reality and immersive technologies (17%) and next-generation compute technology (11%). Heightened Focus Consistent with their focus on cyber security, Gartner’s survey found that ANZ CIOs have a significantly heightened focus on ensuring compliance and minimising risks (92% - up from 57% last year). “As Australian regulatory landscapes continue to evolve, ANZ CIOs are also facing more stringent laws to increase stewardship obligations,” Ferreira said. “It’s incumbent upon CIOs to steer their organisations towards a future marked by digital stewardship, responsible innovation, stringent compliance and active participation in shaping regulatory norms.” Help for ANZ CIOs Generic Systems Australia has many years of experience helping ANZ CIOs and IT teams protect their valuable data with class-leading Managed File Transfer solutions. From the initial scoping of companies’ legacy data transfer approaches, through zero-cost Proof of Concepts and hassle-free Migration Services , we help ANZ companies stay focused on running their business without disruption as we transition them to more secure approaches. If you’d like a to discuss how your organisation’s cyber security can be boosted by a cost effective Managed File Transfer solution, please feel welcome to contact me . I’m always happy to have an obligation-free discussion. At Generic Systems Australia , we’re your local experts in Secure Managed File Transfer. Previous Next
- MediSecure hack Australia’s worst so far | GSA
< News MediSecure hack Australia’s worst so far 19 July 2024 eScripts provider MediSecure has revealed that 12.9M Australians had their data stolen in a hack earlier this year, making it one of the largest cyber breaches in Australian history. MediSecure, which facilitates electronic prescriptions and dispensing, confirmed in May it was the victim of a ransomware attack, following an earlier theft of data which continued until November 2023. The company went into voluntary administration in June after the federal government ruled out a financial bailout. Sensitive Patient Data Lost In a statement released late Thursday afternoon, MediSecure gave details about the kinds of data stolen, including full names, phone numbers, dates of birth, home addresses, Medicare numbers, and Medicare card expiry dates. The 6.5 terabytes of data also included some sensitive health information, such as which medications people were prescribed, the name of the drug, dosage, the reason for their prescription, and instructions for taking the medication. Inadequate Protection MediSecure said it was unable to identify specific impacted individuals “due to the complexity of the data set" and that doing so would have come at a "substantial cost that MediSecure was not in a financial position to meet". A tiny sample of the data was published on a dark web forum following the hack, and the larger data set was listed as being for sale, for $50,000. It's not clear whether the data was sold, but it's considered likely. Vigilance Urged Cyber security experts have urged Australians to remain vigilant for signs of fraud being committed using their medical data. Said one: "If contacted by someone claiming to be a medical or other service provider, including financial service provider, seeking personal, payment or banking information, you should hang up and call back on a phone number you have sourced independently." Avoiding becoming the Next MediSecure Now in liquidation, MediSecure is an example of how not to protect the sensitive customer data entrusted to your organisation. One of your best defences against hackers is to centrally control the flow of data into and out of your organisation. Managed File Transfer (MFT) software does that for you. But MFT does more than just provide centralised control. It also offers encryption, efficiency boosts and auditing capabilities. Using enhanced security protocols, it ensures data privacy during transmission and storage. And it also provides detailed audit-ready logs which detail which data has been accessed and by who. Expert Local Advice At Generic Systems Australia , we’re the Asia-Pacific’s experts on the world’s #1 MFT, GoAnywhere . If you’d like an obligation-free discussion about how we could help you keep your organisation safe from cyber thieves, please feel welcome to get in touch . Attribution: This article was largely sourced from Australia’s ABC News service Previous Next
- Boost Employee Productivity via Managed File Transfer | GSA
< News Boost Employee Productivity via Managed File Transfer 19 Feb 2025 76% of employees report that they spend 1-3 hours a day simply moving data from one place to another, according to research by Zapier. What if you could give your team that time back, to spend on more value-added tasks? You can - with Managed File Transfer (MFT). When Tools Become Time Sinks IT tools are designed to enhance employee collaboration and productivity. However, as businesses grow, they adopt many different IT tools, often with differing file formats. That opens up a black hole of time-wasting as employees are forced to translate and transfer files every time they want to share data across the organisation or with customers or suppliers. GoAnywhere MFT – the world’s leading MFT – automates this task. It gives employees back precious time to focus on more value-added tasks. GoAnywhere translates files to and from a variety of widely-used formats without cumbersome manual scripts. Its comprehensive ETL (Extract, Transform, and Load) features enable data values to be mapped, formatted and modified between source and target files automatically. Even better, GoAnywhere's secure collaboration features make connecting and sharing between employees easier, faster and more secure – even when they’re mobile. It provides an intuitive browser-based web client for performing ad-hoc file transfers, enterprise file sync and sharing via GoDrive, and a handy mobile application for moving files quickly while on-the-go. Protected Productivity In addition to the productivity and efficiency benefits it offers, GoAnywhere MFT protects your organisation’s valuable data at rest, and in transit. Coupled with an Advanced Threat Protection Bundle , it enables organisations to safely collaborate while repelling the efforts of cybercriminals. This automated defense system protects your data in three important ways: 1. Prevents files containing malware from being shared. 2. Blocks sensitive data from being shared. 3. Redacts sensitive information from files before transfer. Time to Tame the Time Sink? If you’d like to discuss how GoAnywhere MFT could help boost your organisation’s productivity and bottom line, please feel welcome to get in touch with us for an obligation-free discussion. Previous Next
- Sound Advice on Choosing a New MFT | GSA
< News Sound Advice on Choosing a New MFT 7 May 2024 Tech Wire Asia , an independent tech news website that covers enterprise and technology across the Asia-Pacific region, offers sound advice to help companies choose a new Managed File Transfer (MFT) solution. The Shadow of Clop Tech Wire Asia issued their advice in the wake of attacks last year by Clop, a notorious ransomware group, on the online file transfer tool MOVEit. PWC’s Australian unit, Prudential Assurance Malaysia Berhad and Prudential BSN Takaful Berhad in Malaysia were among APAC region victims of Clop’s attacks. While Tech Wire Asia said it did not “insinuate an everlasting vulnerability in MOVEit or imply that its usage should be permanently discontinued”, it noted that it had received “a wave of enquiries from current and prospective customers about the continued safety of using MOVEit” in the wake of the attack. In response, the website offered this advice for those wishing to move on from MOVEit . Crucial Considerations Tech Wire Asia said the crucial consideration in choosing the best file transfer software is finding an MFT solution that is simple, capable of encrypting sensitive data, can automate transfers, meets compliance regulations, and operates seamlessly across various platforms. It noted that there are many aspects and features to consider while choosing MFT software, including: Average daily file transfer volume; Regulatory obligations; Industry-specific needs; and Budget. Other vital features could include: Advanced auditing and tracking abilities; Clustering functionality; Cloud integrations; Capability to translate EDI files; and Availability of remote agents. The website recommended that selecting the appropriate MFT solution should be driven by a company’s specific requirements. GoAnywhere MFT highly-regarded In its review of contenders to replace MOVEit, Tech Wire Asia described GoAnywhere MFT as “a sophisticated enterprise solution for transfers and file management”, saying that the product “excels at securing file transfers across multiple platforms, protocols, and encryption standards”. The website noted that GoAnywhere is designed for SMEs and Enterprises, and is deployable on-premise, in the cloud, or hybrid environments, enabling secure data exchange between organisations, employees, customers, and trading partners. In the capacity of enterprise-secure file transfer software, GoAnywhere shields data, ensuring compliance with regulations and standards. Its integration prowess also extends to applications like Salesforce and SharePoint. Try Before You Buy In conclusion, Tech Wire Asia “highly recommended” that customers moving on from MOVEit take advantage of a free trial of new MFT software. Previous Next
