top of page

Search Results

195 results found with an empty search

  • Make Email Attachments Safe | GSA

    < News Make Email Attachments Safe 3 July 2024 Email attachments continue to be the single biggest threat to your organisation’s cyber security. In 183 million phishing simulations conducted by Proofpoint customers this year, almost one in six recipients of a suspicious phishing email failed to protect their organisation’s valuable data. Employees either clicked a malicious link, performed a bogus password reset, or downloaded malware or ransomware. With such a high and persistent risk of cyber incursion, organisations increasingly require more from their file transfers than standard email attachments can provide. They need a smarter, more reliable way to send files, stay secure, and meet the needs of their clients, compliance mandates, and industry regulations. Managed File Transfer (MFT) future-proofs an organisation’s ability to send and receive files quickly, breaking free of the constraints of email attachments, and maintaining cyber security. Problem: Size Caps Most email applications cap the size of email attachments to 25 MB. That may have been “big enough” a couple of decades ago… but no longer. Now, a single high-resolution image can easily exceed 25Mb. Sending an entire folder typically requires zipping it to condense its contents. However, splitting ZIP files into chunks less than 25Mb is a time-consuming hassle. Problem: Insecure Even when successfully sent, email attachments pose ongoing security risks. They can be forwarded to unintended users. Worse, a single recipient with an infected device can infect the attachment with malware and spread it to others. On top of that, there’s always a possibility that an employee could send an email to the wrong person, or mistakenly send sensitive information outside of their network, causing compliance issues for your organisation. Problem: Indiscriminate If an attachment message originates internally, the protocol to keep sensitive data safe (or how to determine what sensitive data is) is often not widely disseminated or used. Encrypting attachments, one effective mechanism, can be tricky for casual users and implemented inconsistently, undermining its reliability as a whole-of-organisation solution. Problem: Degraded Performance Too many attachments can clog your inbox archive and slow backup processes. Some file types such as DLLs, JARs, and SOs may be completely blocked by email systems, disrupting business processes. Unpacking endless ZIP files also depletes available server resources. GoAnywhere MFT to the Rescue Email attachments have their place. But too often they’re a far from ideal way to move data, failing to provide the efficiency, agility, speed, and protection companies need when sending the files that underpin their business. That’s where GoAnywhere MFT can help. Solution: No Size Limits Providing a secure alternative to emailing files, the Secure Mail module in GoAnywhere MFT enables employees and other authorised users to easily send files. It’s much more secure than traditional email, and doesn’t limit file sizes or types. GoAnywhere not only frees your organisation from file size constraints, it also includes accelerated file transfer technologies which speed files to their destinations. Patented UDP file transfer technology enables even the largest files to be sent without incident from anywhere in the world. GoAnywhere’s MFT agent also helps ensure large batch files get to their destination with auto-resume and integrity checks, ensuring all of your message gets there in one piece, despite any network connectivity issues along the way. And if a network connectivity issue prevents the file being successfully transferred, GoAnywhere’s comprehensive alerts ensure you’ll know immediately. Solution: Secure Encrypted Sends Encryption is built into GoAnywhere. Any files sent are automatically encrypted end-to-end using one of a range of encryption protocols, including Open PGP, SFTP, FTPS, AS2 or AS4, and ZIP with AES. GoAnywhere also enables password protection for the attached downloads in case they are sent to the wrong recipient. Additionally, Secure Folders provide a place where your team can safely collaborate. Solution: Bottleneck Buster Lag, inefficiencies and other performance inhibitors are nullified GoAnywhere’s load balancing . Managed transfers help maximise uptime, and clustering functionality distributes files across your network, so they get there in the fastest time and with the least amount of disruption. Solution: Seamless Integration with Inbound Protection By combining GoAnywhere MFT with Clearswift in our Threat Protection Bundle , organisations can create layered cyber defences which enable their teams to receive and share information securely without impairing their productivity. It seamlessly integrates MFT with advanced threat protection and adaptive data loss prevention to keep your sensitive data secure. Not only does it prevent malware from entering your organisation, it also prevents employees from losing or mishandling data. For example, if an employee knowingly (or unknowingly) attempts to share any files containing malware, those files are sanitised by having the malicious elements automatically removed. The SFT Threat Protection Bundle can also automatically detect and - if you configure it to do so - prevent employees from sharing sensitive information. If you’d like to discuss how your organisation’s file transfers can be made more secure and efficient, please feel welcome to contact me, Bradley Copson (mail to:bradley@gensys.com.au). I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfe r. Previous Next

  • Cyber Target Paris Prepares | GSA

    < News Cyber Target Paris Prepares 23 July 2024 As the attention of sports fans turns to Paris this week, so too are the nefarious attentions of the world’s cyber criminals. So: how will the world’s largest sporting event keep its data and systems secure…? Read on to learn more from those charged with defending the Summer Olympics’ IT systems. Miscreant Magnet Vincent Strubel, head of France’s national cybersecurity agency (ANSSI), warned that this year’s summer Olympics was facing an unprecedented level of cyber threats. Said Strubel: “There will be cyberattacks during the Games and the Paralympics... Some won’t be serious. Some will be serious, but won’t have an impact on the Games. And perhaps there will be some that are serious and liable to have an impact on the Games.” Franz Regul, head of the cyber team responsible for Paris 2024, said he expects the number of security events this year to be “multiplied by 10 compared to Tokyo”. There is a need to keep an exceptionally tight attack surface and tie up any loose ends like SSL misconfigurations, open ports, and privacy issues such as cookie consent violations. French anti-cybercrime units have classified the cyber threats in five categories: 1. Amateur Hackers As the “as-a-service” cybercrime economy develops, it’s become easier than ever for novice threat actors to launch more sophisticated attacks than their limited skillsets would otherwise have allowed. This lowered bar for entry will lead to a higher overall number of attacks. 2. Thrill-Seekers The sheer size and popularity of the Olympic Games will tempt those broadly inclined to create nuisance or show off their “cyber chops” to their peers. They’ll likely seek to exploit any security weaknesses in the websites or booking sites purposed for the event, including those of media organisations and sponsors. Common website security attacks such as cross-site scripting, SQL injection, and DDoS attacks will be their primary threat vector. 3. Hacktivists Activists passionate for their cause of choice are likely to attempt to hijack the world’s largest stage. 4. Black Hat Thieves The immense cashflow around the Paris Olympics makes them a potentially lucrative target for cyber thieves. Phishing attempts – expected to arrive in the form of unsolicited emails about the Games, lodging, tickets, or information followed by “helpful links” – will abound. Those who open the emails and click on the links may find their bank accounts quickly compromised. 5. Nation-State Actors The Olympics have long been a huge world stage on which global powers send political signals to countries, governments, and the world at large. As the Associated Press recently noted, “Among the most threatening cyber-adversaries are countries who might want to embarrass and exact costs on France and the International Olympic Committee.” Defending the Games French cybersecurity authorities are cagey about the significant precautions they’re taking to thwart cyber criminals. Revealing too much would give away a tactical advantage to blog-reading Black Hats. However, here’s what we know so far… 1. Ethical Hackers The ANSSI has hired ethical hackers to test the attack vectors on all Olympic websites. According to Strubel, 500 sites, competition venues and local collectives have all been put under “friendly fire”. 2. AI Artificial Intelligence is being employed to test for multiple threats across IT systems and websites. Regul said that AI was helping differentiate “between a nuisance and a catastrophe”. 3. Physical Security Transportation, supply chains, and surveillance systems are other potential targets for those seeking to compromise the Games. All have been included in the safety perimeter of the Paris 2024 cybersecurity preparations. 4. External Expertise The 2018 Winter Olympic Games were targeted by malware dubbed “Olympic Destroyer”, which aimed to disrupt the opening ceremony. Paris cybersecurity teams have tapped the knowledge and experiences of the consultants who detected and disabled that threat. A Bug Bounty program has also sought to attract the time and skills of independent IT practitioners. 5. Education & War Gaming During the past two years, ANSSI has been “war gaming” cyber incidents with the International Olympic Committees’ IT partners, and deploying cyber defence education programs across the thousands of people responsible for operating the Paris Games’ IT systems. No News will be Good News The final word on Paris’s cyber preparations belongs to Jérémy Couture, who helms the official cybersecurity hub of the Paris Olympic games. Couture said his dream for the Olympics is that technology and cybersecurity won’t be talked about - because that will mean they were a non-issue. Sports fans around the world will be hoping his dreams become reality. Need a Local Expert? If – like the Paris Games - you’d like to tap local expertise keep cyber criminals at bay, please feel welcome to contact me, Bradley Copson ( mailto:bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. #MFT #managedfiletransfer #securefiletransfer #sft #cybersecurity #datatransfer Previous Next

  • GA MODULES FOR LICENCING PRODUCT | GSA

    GA Modules for Licencing Product Datasheet GoAnywhere is a robust and complete managed file transfer solution. Modules are available that can satisfy a wide array of file transfer requirements – you can choose to licence only the modules you currently need, and easily unlock additional modules if necessary. REVIEW REPORT RESOURCES HOME

  • USE APIS TO ACCELERATE YOUR MFT'S ROI | GSA

    Use APIs to Accelerate Your MFT's ROI. How to boost the ROI of your MFT Read More. Use APIs to Accelerate Your MFT’s ROI Leveraging APIs alongside your Managed File Transfer (MFT) solution is a great way to boost the return on investment from your MFT, and scale its deployment more broadly across your organisation. Here’s how to use APIs to add further automation, integration, scalability, and customisation to your MFT. APIs…? APIs (Application Programming Interfaces) help software applications communicate with another. Enabling APIs with a robust MFT solution is a simple way to add new functionality to your data transfer software, and accelerate the productivity and efficiency gains it offers. APIs will help you integrate your organisation’s data transfers with the many applications your organisation already use daily - CRM platforms, business intelligence tools, ERP systems and more. In doing so, you can synchronise data across your organisation and provide your team with more secure collaboration. Flexible MFT solutions that support APIs also enable you to further customise and automate your file transfers for your unique business and operational needs. Enhanced Security Of particular value is the way APIs can boost an organisation’s cyber defences by integrating their MFT solution with other data-centric security systems. For example, Generic Systems Australia’s Advanced Threat Protection Bundle layers an organisation’s protective measures with the security features of Fortra’s GoAnywhere MFT to further secure sensitive data. The added flexibility to evolve and scale as your needs change can be a game changer for IT teams seeking to maximise user experience and organisational ROI. Better Workflows Automated file transfer workflows can be “supercharged” using APIs. Here are seven specific API features and techniques organisations can leverage to maximise the value they derive from their managed file transfer solution. In each of these examples, we’ll feature API integration with GoAnywhere, the independently-assessed class-leading MFT. GoAnywhere not only provides APIs, it can also consume third-party APIs, and act as middleman, or API gateway, between other applications. 1. RESTful API An interface used by two computer systems to securely exchange information over the internet, REST (Representational State Transfer) can be used to manage users, groups, triggers, projects, and schedules. This simplifies new user onboarding and migrating systems and environments. For example, you can use the REST API to create a new web user programmatically and eliminate the manual tasks often needed for on-boarding new trading partners. You can also start/stop file transfer jobs and query the status of active jobs. 2. REST Enable a Secure Form Within the GoAnywhere dashboard you can select REST Enable Secure Forms to trigger more complex API calls on the backend of Advanced Workflows . Then, using standard REST calls you can invoke the secure form and its underlying project. Rest Enabled Secure Forms can also act as a REST API gateway to computing resources normally not available to public internet users. The GoAnywhere server can be deployed on the secure network and the solution’s Secure Gateway can act as the link to the public internet in the DMZ. An administrator can enable curated access to internal REST APIs that would normally be available only via VPN or by a dedicated network connection. Comprehensive audit logs and fine-grained user access controls can turn GoAnywhere MFT into a complete API gateway. The Method createPayload (GET https://localhost :6443/rest/forms/v1/ticket/payload ) will insert the payload. The Method uploadAttachments (POST https://localhost :6443/rest/forms/v1/ticket/payload/ :payloadId /file ) will upload one attachment at a time. The Method submitPayload (POST https://localhost :6443/rest/forms/v1/ticket/payload/ :payloadId /submit ) will submit the payload. The Method downloadAttachment (GET https://localhost :6443/rest/forms/v1/ticket/payload/ :payloadId /file/ :fileId ) will download one attachment at a time. 3. GoAnywhere HTTPS You can use GoAnywhere HTTPS project tasks to automate file transfers, create Secure Mail Packages, or programmatically place files in Secure Folders for uploading or downloading For example, if you need to send a large, automatically generated report to a user, you can enable the GoAnywhere HTTPS Send Package task in GoAnywhere. Simply create a project to automatically pick a file (or files) and send a package as a link via Secure Mail. You can protect that package with a password, track the number of downloads, or prevent further downloads after 24 hours. Another GoAnywhere HTTPS task is the ability to set up programmable uploads to GoDrive, a solution which provides Enterprise File Sync and Sharing (EFSS) services for employees and partners. 4. Quick Uploads Enabling Quick Uploads in HTTP Service enables you to turn GoAnywhere into a REST endpoint for file exchange. Quick Uploads (which requires a POST Method with Authentication) allows the solution to upload files to GoAnywhere via REST, effectively turning your GoAnywhere Secure Folders feature into a REST-enabled file exchange gateway. REST-enabled file exchange is very useful for other applications to have a place to store and exchange files. The end users don’t really know what is happening under the hood, but it allows application developers to provide lots of flexibility and build easy-to-use applications. 5. Project Run Mode You can start a project in the background in the dashboard's triggers, schedules, and within the project designer’s Call Project task. For example, if you need to start a long-running job, you simply start a job in Batch mode, which will run in the background, and the system will be automatically notified when it is finished. Need to copy a huge file set? Then run a Job that spawns multiple Batch Jobs. For example, every sub folder in your file set could be sent as separately spawned batch jobs. Running multiple jobs in the background in parallel will help optimise your computing resources, increase your throughput, and spread the workload to other nodes in your GoAnywhere cluster. In addition to setting the run mode, you can also set the priority and the job queue. For example, some long-running CPU intensive jobs, such as archiving or backup, can be set to run on a lower priority status or on a lower priority queue so that your core MFT operations remain more responsive. 6. Consume Third-Party APIs Consuming APIs is the process by which an application developer accesses the various APIs that are exposed by the API provider and then uses those APIs to develop one’s own software applications and products. Within GoAnywhere you can use HTTP/HTTP Post and GET Project tasks or Webservices REST tasks to call third-party APIs. For example, once a file is uploaded, you can create a trigger that will automatically import the file into third-party applications, such as a CRM or trouble ticketing system. Additionally, GoAnywhere offers Cloud Connectors to the most popular applications in the industry. (If you cannot find a cloud connector for the application you need, use the Project Webservices or HTTP/HTTPS POST Project tasks to connect via REST to the application of your choice.) 7. Promote Features Continuous Integration and Delivery CI/CD functions are important in every large IT Project. GoAnywhere delivers the ability to promote every user, project, schedule, trigger, secure form etc, from development to staging to production. You can use “Promote” REST API calls to automatically migrate your configurations from development to staging to production. Working on a live production system presents additional challenges. Even the most diligent administrators can make mistakes and accidentally delete or rename configurations which take an entire system offline. Using GoAnywhere’s Promote features, either via GUI or as an API call, is required to maintain maximum system stability and reliability. If you do not have a test system yet, consider deploying one to minimise the risk of human error. API Options to Boost Automation GoAnywhere offers many powerful API options that can seamlessly automate basic file transfer tasks for IT teams and users. You can mix and match the seven techniques above to create a next-generation automation framework that goes far beyond standard MFT functionality. Need Help? It’s Here - Locally! If you’d like help using APIs to boost your MFT’s ROI and your team’s productivity, please feel welcome to get in touch with me . I’m always happy to have an obligation-free discussion. At Generic Systems Australia , we’re your local experts in Secure Managed File Transfer.

  • GenAI Cyber Attacks on the Rise: Gartner | GSA

    < News GenAI Cyber Attacks on the Rise: Gartner 30 Sept 2025 Attacks using Generative AI (“GenAI”) for phishing, deepfakes and social engineering have become mainstream, and attacks on GenAI application infrastructure and prompt-based manipulations are emerging. These are among the troubling findings of a recent survey of cyber security leaders by Gartner, the technology insights company. GenAI is a form of artificial intelligence designed to create original content—such as text, images, music, video, or code—based on patterns it learns from existing data. Unlike traditional AI which classifies or predicts, GenAI generates new data that mimics human creativity. Rise of the Machines 62% of organisations experienced a deepfake attack involving social engineering or exploiting automated processes. These attacks included: deepfake videos used against automated face biometrics or identity verification (29%); deepfake audio clips used against automated voice biometrics (32%); social engineering with deepfake during video calls with an employee (36%); and social engineering with deepfake during audio calls with an employee (44%). In addition, 29% of cybersecurity leaders reported that their organisations had experienced an attack on enterprise GenAI infrastructure in the last 12 months. 32% said they experienced an attack on AI applications that leveraged the application prompt during the last 12 months. Gartner said that chatbot assistants are vulnerable to a variety of adversarial prompting techniques, such as attackers generating prompts to manipulate large language models (LLMs) or multimodal models into generating biased or malicious output. Emerging Threats Speaking at a Gartner Security and Risk Management Summit in London, Akif Khan, Gartner’s specialist VP in identity and access management, said: “As adoption accelerates, attacks leveraging GenAI for phishing, deepfakes and social engineering have become mainstream, while other threats — such as attacks on GenAI application infrastructure and prompt-based manipulations — are emerging and gaining traction.” While 67% of cybersecurity leaders said emerging GenAI risks demand significant changes to existing cybersecurity approaches, Gartner said a more balanced strategy is warranted. “Rather than making sweeping changes or isolated investments, organisations should strengthen core controls and implement targeted measures for each new risk category,” Khan said. MFT vs GenAI One such core control is a Managed File Transfer (MFT) solution, such as GoAnywhere MFT . It should be among an organisation’s first lines of defence. Managed File Transfer (MFT) solutions play a critical role in defending organisations against deepfake phishing and social engineering by enforcing secure, authenticated channels for data exchange. Unlike ad hoc file sharing methods that can be easily exploited, MFT platforms integrate multi-factor authentication (MFA), encryption, and access controls to ensure that only verified users can initiate or receive transfers. This mitigates the risk of attackers impersonating trusted individuals using deepfake audio or video to trick employees into sharing sensitive files. Additionally, robust MFT systems include audit trails and automated alerts which help security teams detect anomalous behaviour — such as unusual file requests or access patterns — that may indicate social engineering attempts. By centralising and securing file movement, MFT reduces the attack surface and strengthens organisational resilience against increasingly sophisticated deception tactics. Local Expertise Available At Generic Systems Australia we’re Australia’s and NZ’s experts in deploying Managed File Transfer solutions. We’ve assisted businesses of all sizes to protect their customer data and secure their file transfers, while keeping their operations running smoothly. If you’d like to discuss how we can help you, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how simply we can help you maintain your customers’ trust. Previous Next

  • Experts Again Declare GoAnywhere “Top MFT” | GSA

    < News Experts Again Declare GoAnywhere “Top MFT” 23 Apr 2024 Respected independent tech analysts Info-Tech have compared Managed File Transfer solutions and once again declared GoAnywhere MFT to be the best. Their latest finding is consistent with their 2022 analysis of the most popular MFT software solutions and vendors. Taking into account vendor experience and capabilities, product features and customer satisfaction, they found then – as now – that GoAnywhere MFT was the 2024 Data Quadrant Gold Medallist. Info-Tech’s data was sourced from real end users, meticulously verified for veracity, and exhaustively analysed. Each product was compared and contrasted with all other products in the category to create a holistic, unbiased view of the product landscape. Besides achieving the highest overall score in the MFT category, GoAnywhere also ranked highest for Vendor Capability Satisfaction, including the key dimensions of: · “Business Value Created” · “Breadth of Features” · “Quality of Features” · “Product Strategy and Rate of Improvement” · “Useability and Intuitiveness” · “Vendor Support” · “Ease of Data Integration” · “Ease of Customisation” · “Availability and Quality of Training”, and · “Ease of Implementation” Market Leader – for a reason GoAnywhere MFT's combination of versatility, security, ease of use, and budget-friendliness has propelled it to the top of the MFT market, as recognised by Info-Tech. For businesses on the quest for a comprehensive and reliable file transfer solution, GoAnywhere MFT is the smart and strategic choice. Grab Your Free Copy of the Independent Report To read more about why experts and customers alike consider GoAnywhere MFT to be the leading Managed File Transfer solution, let us know your email address via this link , and we’ll happily send you a complimentary copy Info-Tech’s report. Experience GoAnywhere MFT for yourself Generic Systems Australia is the Asia-Pacific region’s leading provider of secure MFT solutions. If you’d like to explore how your organisations’ efficiency and bottom line could be boosted through MFT technology, please get in touch with our Business Manager, Bradley Copson , for an obligation-free discussion. At Generic Systems Australia, we’re your local experts in managed file transfer. Previous Next

  • Outdated Protocols Leave Precious Data Vulnerable | GSA

    < News Outdated Protocols Leave Precious Data Vulnerable 30 Oct 2024 Business today is critically dependant on highly interconnected systems. The ability to transfer files securely between those systems is crucial to operational integrity and efficiency. That’s why secure file transfer solutions, which protect against unauthorised access and interception, foster trust among stakeholders, and help ensure compliance with regulatory standards, are becoming a must-have for responsible IT departments. Surprisingly, there are still businesses who rely on outdated, insecure file transfer protocols such as FTP and email. It’s making them vulnerable to cyber criminals, who can exploit their lack of built-in protective security measures. Open to Interception FTP, for instance, lacks built-in encryption. Data travelling via FTP is vulnerable to interception and eavesdropping by malicious actors. This susceptibility compromises the confidentiality and integrity of sensitive information. Compounding this vulnerability is the transmission of user credentials in plain text during the FTP login process. Usernames and passwords, transmitted without encryption, can easily be intercepted by anyone with access to network traffic. This opens the door to unauthorised access across an organisation’s network, systems and sensitive data. Using FTP scripts and batch files in automated processes significantly exacerbates the inherent security risks of FTP. The scripts themselves often contain plaintext user IDs and passwords, providing an easy-to-read roadmap for hackers and malicious software to exploit sensitive information. Even when the FTP server is secure, leaving credentials exposed in scripts widens an organisation’s “attack surface” and compromises its security. Compliance Risk Compliance with regulatory standards is another key concern. Industries such as healthcare and finance are subject to increasingly stringent data security and privacy regulations. However, with its inherent vulnerabilities and lack of encryption, traditional FTP falls well short of meeting these compliance standards, exposing organisations to regulatory scrutiny and penalties. The risks extend beyond interception to full unauthorised redirection of data. Improperly configured or intercepted FTP connections can lead to data being redirected to unintended destinations, exposing sensitive information to unsanctioned parties and increasing the likelihood of data breaches. Moreover, traditional FTP lacks comprehensive logging and auditing capabilities, making it challenging for administrators to track and monitor file transfers. Without proper records, it’s even more difficult to identify and address security incidents or ensure compliance with security policies and regulations. The Cost of Outdated Protocols Vulnerable file transfer protocols may come at a huge cost to businesses - financially and operationally. Financial loss, reputational damage, loss of customer trust, legal penalties and compensation cases add the initial business disruption. The fallout from a breach may also require substantial resources for investigation, remediation, and recovery efforts, furthering the business disruption and loss of productivity. Securing File Transfers Managed File Transfer (MFT) software provides a comprehensive solution to address these modern challenges. It enhances data security through advanced features such as encryption, secure protocols, and identity authentication, ensuring sensitive data remains protected during transmission. Compliance with regulations is also facilitated by MFT’s auditing capabilities and detailed logs, helping businesses mitigate regulatory risks and build customer trust. MFT also boosts an organisation’s efficiency and productivity. It automates file transfers, integrates seamlessly with existing systems to eliminate any need for manual intervention. That in turn cuts the risk of human error and accelerates time-to-market. Scalable, Flexible, Centralised Scalability and flexibility are other benefits of MFT, supporting increased data volumes, new file formats, and emerging technologies. On-prem MFT can be easily supplemented by cloud-based MFT, offering virtually unlimited scalability. Centralised management and visibility further streamline operations by providing a unified platform for managing file transfers, and detailed insights into transfer status and performance. By addressing the evolving needs of modern businesses, MFT has become a critical element of IT infrastructure in today’s competitive digital landscape. Local MFT Expertise Available Generic Systems Australia are experts in helping companies deploy Managed File Transfer. We’ve assisted hundreds of organisations across Australia and New Zealand to secure their file transfers, keep cybercriminals at bay and improve their operational efficiency. If you’d like to discuss how we can help you, or check out GoAnywhere – the award winning MFT used by thousands of organisations worldwide - please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how simply we can transition you from outdated protocols and approaches. I can even arrange a simple, zero-cost Proof of Concept. Previous Next

  • Survive the Cyber Security Staff Drought | GSA

    < News Survive the Cyber Security Staff Drought 3 Sept 2024 Australian organisations are still struggling to recruit and train sufficient cyber security specialists to keep their valuable data safe. A report by government-funded industry body AustCyber predicted that Australia would need an extra 4800 cyber security workers each year to avoid a significant shortfall by 2030. It warned that the local industry is lagging those of other countries, urging further private sector investment in the area. AustCyber found that 74% of cyber security professionals were being impacted by non-availability of suitably qualified staff. Only 8.8% rated Australia’s cyber security sector as “highly competitive”, while 21% rated the local industry as “not competitive” compared to other global markets. 20% Positions Vacant The Australian Government’s 2023 Skills Priority List shows cyber security roles as among the highest-ranked skills with a national shortage. According to AustCyber, cyber security architects are the most in-demand cyber security role, followed by engineers and analysts. While there were ~51,300 dedicated cyber security workers in Australia last year, a staggering 12,500 jobs had remained vacant. The workforce needs to grow by 66% to reach the total of 85,000 who would be required by 2030. Speaking to The Australian Financial Review earlier this year, the RMIT’s Research Director from the Centre of Cyber Security, Matthew Warren, said: “We cannot run before we walk, and right now the Australian cyber security industry does not have the depth of dedicated, skilled cyber security workers required to strengthen Australia’s security posture against the increasing sophistication, ferocity and prevalence of cyber security threat actors.” AustCyber chief executive Chris Kirk said that cyber security was now a “non-negotiable, impacting every Australian”. Early Education + a Wider Funnel While there’s been a 30% year-on-year growth in the number of people studying cyber security at university, the funnel for future workers needs to be wider for AustCyber’s target to be met. Said Kirk: “We really need to get cyber into the education system quite early, like primary school. And, at the speed of which the industry moves, your skill set can be severely challenged very quickly. So it’s extremely important we upskill and keep globally relevant the professionals in these jobs.” Surviving Staff Shortfalls Organisations struggling to recruit cyber security specialists should consider how automation can augment and relieve the load being carried by their existing cyber security specialists. For example, advanced Managed File Transfer solutions, such as GoAnywhere MFT , can centrally manage and secure file transfers organisation-wide. Recognised for its class-leading features, GoAnywhere frees up your cyber security specialists, working in the background to comprehensively mitigate the risks of storing and moving your data, both within and outside your organisation. Through its centralised control, encryption, and auditing capabilities, GoAnywhere replaces risky traditional approaches and improves productivity. Its versatility, security, ease of use, and budget-friendliness have made it a must-have solution for organisations committed to protecting their information assets. Expert Local Advice On Hand At Generic Systems Australia , we’re Australia’s and the Asia-Pacific region’s experts on Managed File Transfer solutions. If you’d like a no-cost, no-obligation discussion about how we could help you augment your cyber security team’s efforts, please feel welcome to get in touch . Previous Next

  • Zero Unforced Errors | GSA

    < News Zero Unforced Errors 29 Jan 2026 GoAnywhere Managed File Transfer executes your organisations data transfers with consistency and accuracy, eliminating the risks that come with manual processes. It automates complex workflows so your data moves reliably between systems, partners, and applications. Strong security controls protect files in transit and at rest, ensuring compliance with organisational and regulatory requirements. Centralised monitoring provides clear visibility into every transfer. At Generic Systems Australia, we have decades of experience installing and providing LOCAL support to organisations taking GoAnywhere MFT. If you'd like an obligation-free chat about how MFT could secure and speed your data transfers... hit us up! 😉 Previous Next

  • How Load Balancing optimises your file transfers | GSA

    < News How Load Balancing optimises your file transfers 30 Apr 2024 Network bottlenecks that cause business downtime are the bete noir of corporate IT teams. Businesswire found that 82% of companies experienced at least one downtime incident during the past three years… costing small businesses $660 per minute, and larger organisations $14,000 per minute. Load balancing is a key technique for keeping network traffic flowing. What is Load Balancing? Load balancing is key to “clustering”, where multiple systems work together as a single unit to help ensure high-availability, scalability, and reliability. It’s a technique which enables organisations to distribute workloads and network traffic across multiple servers or network interfaces in a computer cluster. Effective load balancing means that network traffic is always directed to servers which are “available”, should a particular server become overwhelmed or fail. Balancing workloads optimises the performance of systems and applications –– for example, a managed file transfer (MFT) solution for exchanging data –– preventing bottlenecks and other efficiency-sapping impacts. Why Load Balance for File Transfers? Delays in sending files can have significant negative ripple effects throughout an organisation. Incoming orders may not be received, or shipping may be delayed, leading to dissatisfied customers. Delayed financial transactions with trading partners may weaken an organisation’s supply chain. Load balancing helps organisations continue to operate ‘business as usual’ even when a system fails or is inundated with a heavy network workload. Other benefits of load balancing include: Scalability: Load balancers can help organisations adapt to growing and changing conditions and workloads without suffering adverse events. New servers can be seamlessly added to the cluster when more scalability is needed. Performance Optimisation : Traffic is routed to the server most capable of handling a given request based on location or server health. Redundancy: Organisations safeguard themselves, should one server become overloaded or fail, with load balancing enabling processing work to continue without interruption. Using Middleware and Active-Active Framework for Load Balancing A robust managed file transfer solution, such as Fortra’s GoAnywhere MFT, delivers critical load balancing and scaling when installed in a cluster. The solution’s load balancer, GoAnywhere Gateway, serves as both a reverse proxy and load balancer. When paired with Gateway as a load balancer, each inbound file server connection can be distributed to available systems in the environment. MFT workflows performed in a clustering environment gain increased performance and throughput. If a system within a cluster fails, GoAnywhere Gateway automatically routes all new trading partner connections to the remaining systems in the cluster. For mission critical environments and processes, this is an “active-active” framework providing high availability. Enhanced Security GoAnywhere Gateway also provides an extra security layer when exchanging data. The Gateway keeps file sharing services such as FTPS, HTTPS, SFTP servers and any documents secure in the private or internal network. No additional inbound ports need to be opened, which helps organisations meet compliance requirements such as those for PCI DSS, SOX, HIPAA, GLBA, as well as certain privacy laws. This round robin algorithm essentially works like this: For each new FTP, FTPS, or SFTP connection from a trading partner, the Gateway distributes that session sequentially to the next FTP/FTPS/SFTP server within the cluster. HTTP/S, however, is a stateless protocol. It uses the round robin algorithm but will persist each connection for a time to maintain session integrity. HTTP/S sessions typically are only served by one HTTP/S server at a time. If you’d like to discuss how your organisation can reduce downtime through MFT load balancing, please feel welcome to contact our Business Manager, Bradley Copson (mail to: bradley@gensys.com.au ). He’s always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. Generic Systems Australia Your Local Experts in Secure Managed File Transfer Previous Next

bottom of page