top of page

Search Results

184 results found with an empty search

  • MediSecure hack Australia’s worst so far | GSA

    < News MediSecure hack Australia’s worst so far 19 July 2024 eScripts provider MediSecure has revealed that 12.9M Australians had their data stolen in a hack earlier this year, making it one of the largest cyber breaches in Australian history. MediSecure, which facilitates electronic prescriptions and dispensing, confirmed in May it was the victim of a ransomware attack, following an earlier theft of data which continued until November 2023. The company went into voluntary administration in June after the federal government ruled out a financial bailout. Sensitive Patient Data Lost In a statement released late Thursday afternoon, MediSecure gave details about the kinds of data stolen, including full names, phone numbers, dates of birth, home addresses, Medicare numbers, and Medicare card expiry dates. The 6.5 terabytes of data also included some sensitive health information, such as which medications people were prescribed, the name of the drug, dosage, the reason for their prescription, and instructions for taking the medication. Inadequate Protection MediSecure said it was unable to identify specific impacted individuals “due to the complexity of the data set" and that doing so would have come at a "substantial cost that MediSecure was not in a financial position to meet". A tiny sample of the data was published on a dark web forum following the hack, and the larger data set was listed as being for sale, for $50,000. It's not clear whether the data was sold, but it's considered likely. Vigilance Urged Cyber security experts have urged Australians to remain vigilant for signs of fraud being committed using their medical data. Said one: "If contacted by someone claiming to be a medical or other service provider, including financial service provider, seeking personal, payment or banking information, you should hang up and call back on a phone number you have sourced independently." Avoiding becoming the Next MediSecure Now in liquidation, MediSecure is an example of how not to protect the sensitive customer data entrusted to your organisation. One of your best defences against hackers is to centrally control the flow of data into and out of your organisation. Managed File Transfer (MFT) software does that for you. But MFT does more than just provide centralised control. It also offers encryption, efficiency boosts and auditing capabilities. Using enhanced security protocols, it ensures data privacy during transmission and storage. And it also provides detailed audit-ready logs which detail which data has been accessed and by who. Expert Local Advice At Generic Systems Australia , we’re the Asia-Pacific’s experts on the world’s #1 MFT, GoAnywhere . If you’d like an obligation-free discussion about how we could help you keep your organisation safe from cyber thieves, please feel welcome to get in touch . Attribution: This article was largely sourced from Australia’s ABC News service Previous Next

  • Boost Employee Productivity via Managed File Transfer | GSA

    < News Boost Employee Productivity via Managed File Transfer 19 Feb 2025 76% of employees report that they spend 1-3 hours a day simply moving data from one place to another, according to research by Zapier. What if you could give your team that time back, to spend on more value-added tasks? You can - with Managed File Transfer (MFT). When Tools Become Time Sinks IT tools are designed to enhance employee collaboration and productivity. However, as businesses grow, they adopt many different IT tools, often with differing file formats. That opens up a black hole of time-wasting as employees are forced to translate and transfer files every time they want to share data across the organisation or with customers or suppliers. GoAnywhere MFT – the world’s leading MFT – automates this task. It gives employees back precious time to focus on more value-added tasks. GoAnywhere translates files to and from a variety of widely-used formats without cumbersome manual scripts. Its comprehensive ETL (Extract, Transform, and Load) features enable data values to be mapped, formatted and modified between source and target files automatically. Even better, GoAnywhere's secure collaboration features make connecting and sharing between employees easier, faster and more secure – even when they’re mobile. It provides an intuitive browser-based web client for performing ad-hoc file transfers, enterprise file sync and sharing via GoDrive, and a handy mobile application for moving files quickly while on-the-go. Protected Productivity In addition to the productivity and efficiency benefits it offers, GoAnywhere MFT protects your organisation’s valuable data at rest, and in transit. Coupled with an Advanced Threat Protection Bundle , it enables organisations to safely collaborate while repelling the efforts of cybercriminals. This automated defense system protects your data in three important ways: 1. Prevents files containing malware from being shared. 2. Blocks sensitive data from being shared. 3. Redacts sensitive information from files before transfer. Time to Tame the Time Sink? If you’d like to discuss how GoAnywhere MFT could help boost your organisation’s productivity and bottom line, please feel welcome to get in touch with us for an obligation-free discussion. Previous Next

  • Sound Advice on Choosing a New MFT | GSA

    < News Sound Advice on Choosing a New MFT 7 May 2024 Tech Wire Asia , an independent tech news website that covers enterprise and technology across the Asia-Pacific region, offers sound advice to help companies choose a new Managed File Transfer (MFT) solution. The Shadow of Clop Tech Wire Asia issued their advice in the wake of attacks last year by Clop, a notorious ransomware group, on the online file transfer tool MOVEit. PWC’s Australian unit, Prudential Assurance Malaysia Berhad and Prudential BSN Takaful Berhad in Malaysia were among APAC region victims of Clop’s attacks. While Tech Wire Asia said it did not “insinuate an everlasting vulnerability in MOVEit or imply that its usage should be permanently discontinued”, it noted that it had received “a wave of enquiries from current and prospective customers about the continued safety of using MOVEit” in the wake of the attack. In response, the website offered this advice for those wishing to move on from MOVEit . Crucial Considerations Tech Wire Asia said the crucial consideration in choosing the best file transfer software is finding an MFT solution that is simple, capable of encrypting sensitive data, can automate transfers, meets compliance regulations, and operates seamlessly across various platforms. It noted that there are many aspects and features to consider while choosing MFT software, including: Average daily file transfer volume; Regulatory obligations; Industry-specific needs; and Budget. Other vital features could include: Advanced auditing and tracking abilities; Clustering functionality; Cloud integrations; Capability to translate EDI files; and Availability of remote agents. The website recommended that selecting the appropriate MFT solution should be driven by a company’s specific requirements. GoAnywhere MFT highly-regarded In its review of contenders to replace MOVEit, Tech Wire Asia described GoAnywhere MFT as “a sophisticated enterprise solution for transfers and file management”, saying that the product “excels at securing file transfers across multiple platforms, protocols, and encryption standards”. The website noted that GoAnywhere is designed for SMEs and Enterprises, and is deployable on-premise, in the cloud, or hybrid environments, enabling secure data exchange between organisations, employees, customers, and trading partners. In the capacity of enterprise-secure file transfer software, GoAnywhere shields data, ensuring compliance with regulations and standards. Its integration prowess also extends to applications like Salesforce and SharePoint. Try Before You Buy In conclusion, Tech Wire Asia “highly recommended” that customers moving on from MOVEit take advantage of a free trial of new MFT software. Previous Next

  • Tame the File Transfer Time Sink | GSA

    < News Tame the File Transfer Time Sink 23 Oct 2023 When asked “How could you get more done at work?”, most people are quick to respond: “Fewer meetings, please!” However, research has revealed that other hidden time sinks may be an even greater drain on our personal productivity. For example: the amount of time lost while team members manually share files and data between themselves. A recent report found that a typical desk worker now uses 11 different applications to complete their tasks. during the course of their working day. According to research by Productiv , most company departments use between 40 and 60 different applications. Company-wide, that number sprawls to more than 200 apps. IT tools are designed to enhance our collaboration and productivity. But when different parts of a business adopt different tools, with different file formats, it opens up a black hole of time-wasting file translation and transference across the entire organisation. So, how can we help our employees spend more time productively contributing to the organisation, and less time on the drudge work of wrangling files…? Ideally, we can work to rein in the proliferation of apps across our organisations, standardising on a common set of enterprise IT tools. But that can be easier said than done. It takes time – and even some business risk – to wean teams off their familiar tools and train them on new ones. Until then, a Managed File Transfer (MFT) solution can help . With GoAnywhere MFT, data can be translated to and from a variety of widely-used formats without having to write cumbersome scripts or programs. Its comprehensive Extract, Transform, and Load features enable data values to be mapped, formatted and modified between source and target files automatically. Even better, GoAnywhere's secure collaboration features make connecting and sharing between employees easier and faster - even when they’re mobile. Features include an intuitive browser-based web client for performing ad-hoc file transfers, enterprise file sync and sharing using GoDrive, and a handy mobile application for moving files quickly while on-the-go. The benefits of using an advanced MFT like GoAnywhere continue well beyond the point where your team has happily standardised on common enterprise tools. The same flexibility and automations that enabled your team to eliminate their internal productivity time sink are just as useful in improving your interactions with customers and supply chain partners. Time to Tame This Time Sink? If you’d like to discuss how GoAnywhere MFT could help boost your organisation’s productivity and bottom line, please feel free to contact me ( bradley@gensys.com.au ) for an obligation-free discussion, or read more at Generic Systems Australia . Bradley Copson Business Manager Generic Systems Australia Previous Next

  • Secure Your Out-Of-Office Work with MFT and Secure Mail | GSA

    < News Secure Your Out-Of-Office Work with MFT and Secure Mail 11 Dec 2025 Though the holiday season is fast approaching, for too many business owners and corporate warriors, “holidays” aren’t a complete reprieve from keeping the business running. Many will find themselves reviewing confidential documents in hotel rooms or transferring files from a cafe or pool deck. The ability to work anywhere is an expected aspect of our connected modern business lives. However, this convenience comes with a hidden cost beyond work/life balance. Public wi-fi and mobile hotspots may be convenient, but they’re also prime targets for cybercriminals. Unsecured networks in holiday destinations can expose sensitive data to serious threats. But a Managed File Transfer (MFT) solution with a Secure Mail module can ensure your files remain protected no matter where you work. The Hidden Risks of Public Networks Unsecured connections are more than just slow—they’re dangerous. Common risks include: • Rogue access points that mimic legitimate Wi-Fi • Man-in-the-middle attacks intercepting communications • Packet sniffing and eavesdropping on data streams • Session hijacking to steal credentials • Malware injection during transfers • Credential harvesting for identity theft Real world data proves these aren’t just hypothetical risks. NordVPN recently reported that 70% of Australians use public Wi-Fi on smartphones, with a significant number connecting for work, especially while commuting or working remotely. Surprisingly, many do so  without  a VPN, putting their work and their employers’ data at risk. VPNs Aren’t Enough Virtual Private Networks (VPNs) encrypt traffic, but they don’t secure the entire file transfer process. VPNs cannot enforce role-based access controls, provide file-level auditing and reporting, authenticate users with precision or guarantee compliance with data protection standards. A VPN may protect the connection, but only MFT ensures the files themselves are transferred securely and in compliance with regulations. How MFT Protects Remote File Transfers Solutions like the industry-leading GoAnywhere MFT are designed to safeguard sensitive data even when you and your employees are working off-site. Key features include: • Secure protocols: SFTP, HTTPS, AS2, and FTPS ensure uncompromised transfers. • Encryption: AES-256, TLS, and SSL protect files both at rest and in motion. • Authentication controls: Prevent unauthorised users from initiating transfers. • Role-based access: Limit data visibility to only those who need it. • Auditing and logging: Create compliance-ready audit trails and visibility into file activity. • Automation: Schedule or trigger transfers to reduce human error and eliminate risky manual uploads. Secure Mail Completes the Protection GoAnywhere’s Secure Mail Module enables your employees to send messages and files as secure "packages" on an ad-hoc basis. Recipients get an email with a unique link to each package, allowing them to download the message and files through a secure HTTPS connection. It ’s a great, secure alternative to regular email, plus there are no file size or file type restrictions. Best Practices for Remote File Transfer Security Whether you’re uploading contracts from a hotel room, or signing off on the quarter’s accounts, using email or free cloud storage could expose that data to attackers. By using MFT, however, that transfer will be encrypted, authenticated, and logged—removing risk from the equation. More broadly, it’s always best to prefer secure Wi-Fi or personal hotspots over public networks, avoid free cloud storage services, and avoid using USB drives for confidential files. Work from Anywhere Without Compromising Security Flexibility doesn’t have to mean vulnerability. With GoAnywhere MFT, employees can securely send and receive sensitive files from anywhere in the world—whether working from home or halfway across the globe. Automated, encrypted transfers protect data and provide peace of mind. Local Experts At Generic Systems Australia , we’re Australia’s and New Zealand’s experts in Managed File Transfer. As one of Fortra’s top ten partners globally, we have decades of experience helping local companies install and leverage the world’s leading MFT solution. Let me know if you’d like an obligation-free chat about how MFT could secure your remote workers’ file transfers. Previous Next

  • Protect Your Organisation From Stranger Strings | GSA

    < News Protect Your Organisation From Stranger Strings 1 Dec 2025 In the hit Netflix series Stranger Things , danger lurks in the shadows of ordinary life — a flickering light, a hidden passage, or a seemingly harmless object can conceal a gateway to the Upside Down. That’s how it is with the batch files still used by many organisations to conduct critical daily file transfers. These batch files may look mundane, even routine. However, a single hidden line of code can unleash chaos. Hiding in Plain Sight A batch file is essentially a script: a sequence of commands executed by the operating system. While this makes them convenient for repetitive tasks, it also makes them vulnerable to tampering. A single malicious line can transform a routine transfer into a catastrophic event. Consider this simple example: “del C:\*.* /Q /F” This line, if inserted into a batch file, would attempt to delete every file on the C: drive. To the untrained eye, it might blend seamlessly among legitimate commands like ‘xcopy’ or ‘robocopy’. Yet its impact would be devastating — wiping out critical data, halting operations, and potentially opening the door to further exploitation by hackers. The danger lies not in the complexity of the attack, but in its simplicity. One unnoticed command can undo years of work. The Demogorgon in the Detail Batch files are inherently insecure because they lack the safeguards modern IT environments demand. Their key risks include: Ease of manipulation: as they’re plain text, anyone with access can edit them, inserting destructive or unauthorised commands. No authentication or encryption: they move files without verifying the sender or encrypting the data, leaving sensitive information exposed. Limited logging and visibility: they provide little or no audit trail. You may not even know a breach has occurred until the damage becomes apparent. Escalated privileges: a malicious line may not just affect files; it may compromise your entire system. Prone to human error: a simple mistyped command can have disastrous consequences. No Place for 80s Nostalgia Batch files are relics of a time when networks were simpler and threats less sophisticated. In today’s environment of ransomware, insider threats, and regulatory scrutiny, relying on them is a huge gamble. The Modern Alternative Managed File Transfer (MFT) solutions address batch file vulnerabilities by providing a secure, automated framework for moving data. Unlike batch files, MFT platforms are designed with security, compliance, and reliability at their core. Here’s why MFT is a safer choice: Encryption by default: MFT solutions encrypt files both in transit and at rest, ensuring sensitive data cannot be intercepted or read by unauthorised parties. Authentication and access control: Only authorised users and systems can initiate transfers, and different permissions can be assigned to each user. This prevents tampering and ensures accountability. Audit trails and monitoring: Every transfer is logged, providing visibility into who moved what, when, and where. This is invaluable for compliance and incident response. Error handling and recovery: MFT platforms include built-in mechanisms to detect failed transfers and retry automatically, reducing the risk of data loss. Scalability and automation: MFT systems can handle complex workflows across multiple environments, eliminating the need for fragile, manually maintained scripts. Compliance support: For industries bound by regulations such as GDPR, HIPAA, or PCI DSS, MFT provides the controls and reporting necessary to demonstrate compliance. Staying Out of the Upside Down The contrast between batch files and Managed File Transfer is stark. Batch files are like handwritten notes left on a desk — easy to read, easy to alter, and easy to misuse. MFT, by comparison, is like a secure courier service: encrypted, tracked, and accountable at every step. At Generic Systems Australia , we’re Australia’s and New Zealand’s experts in helping organisations automate their file transfers with Managed File Transfer solutions. If you’d like to discuss how we can help you, please feel welcome to get in touch with me . I’m always happy to have an obligation-free chat and explain how simply and affordably we can replace your outdated batch files with a reliable and efficient MFT solution. Previous Next

  • MFT as Middleware…?! | GSA

    < News MFT as Middleware…?! 5 Feb 2025 Enterprise customers are increasingly seeking middleware that enables them to secure and streamline connections between their internal systems and external third-party services. Fortra’s GoAnywhere MFT helps fulfil that need. Integration without Security spells danger Most modern enterprises find themselves balancing the flow of information between complex internal systems and external cloud services. But on both sides of the corporate firewall, there is a shared need for corporate data to be transferred securely and efficiently. “Extract Transfer Load” (ETL) solutions process data and store data in a common internal warehouse. “Enterprise Service Buses” (ESBs) act as a hub providing overall visibility and control over the flow of data and services across different applications. However, neither of these tools specialise in security - an especially critical consideration when dealing with third parties. As security and integration are where current solutions fall flat or fail to provide a unified answer, enterprises are left to look for new models to bridge the gap. GoAnywhere steps up Fortra’s GoAnywhere MFT is not your traditional limited MFT solution. It operates as a lightweight ETL, a functional ESB, and as an efficient MFT platform. What sets GoAnywhere apart from other tools is its focus on security. And in that way, it’s one of the only tools on the market today that can fulfil enterprises’ nascent need for secure and efficient data flows within and outside their organisations. Secure Management, Integration, Automation GoAnywhere provides many of the same automation and integration features as ETL, ESB, and Enterprise Application Integration solutions, enabling enterprises to connect their internal resources with cloud resources and third parties such as: Banks and credit card providers Financial data providers Foreign exchange markets Retirement and pension systems If required, GoAnywhere MFT can perform a middleware role, integrating with an organisation’s existing ETL solution and acting as a managing solution which connects systems, secures communications and integrates. Enterprise-level Security Even when enterprises have dedicated ETL solutions in place, GoAnywhere can fit right in to boost the security of data file transfers. It provides a full range of security layers and controls to protect the exchanged data which no other integration solution can offer. A secure architecture is deployed thanks to a multi-tier solution, including the GoAnywhere Gateway as a reverse proxy on the DMZ, isolating exchanged data from threats on the internet. A Secure ICAP Gateway - a deep content inspection engine – can also be built in, a security tier preventing malicious content infiltrating through third-party interfaces. GoAnywhere’s proactive security has been further enhanced through integration with the Fortra Threat Brain , a massive threat intelligence database which continuously identifies and blocks incoming IPs with bad reputations or malicious intent befor e those threats can enter an organisation. Connect Cloud and On-Prem Applications A final differentiator that makes GoAnywhere a standout in the enterprise middleware space is its ability to connect both on-premises systems and cloud-based applications. GoAnywhere goes beyond what a typical SaaS middleware application can do. For instance, if you offer a middleware platform as a SaaS solution, a lot of organisations still have different on-prem applications in addition to their legacy systems, segmented networks, private and public cloud-based systems and external interfaces with their trading partners. Having yet another SaaS platform makes it challenging to interconnect all these on-prem and cloud data points. However, GoAnywhere can secure file transfers and centralise them across cloud, on-premises, hybrid, or SaaS environments. It isn’t confined to one or the other. Consolidate, downshift, simplify, and streamline For enterprises looking to boost their efficiency and streamline their operations (and that’s all enterprises!) the right middleware can make all the difference. GoAnywhere MT offers more than a typical MFT. With GoAnywhere, enterprises can create a flexible, scalable, high-performance middleware platform to securely: transfer at speeds up to 10 Gbps interface with a wide variety of systems, applications and cloud services protect files from malware get zero trust protection, no matter where files travel, and keep data out of the DMZ. GoAnywhere as Middleware Consistently declared to be the world’s leading MFT , GoAnywhere is renowned for its robust security features, flexibility, and ability to work where and how you need it. For enterprises, that’s becoming the space between all the moving parts. Local Expert Help At Generic Systems Australia , we have many years of experience helping Australian and New Zealand IT teams streamline their file transfers and protect their valuable data with GoAnywhere MFT. From the initial scoping of organisations’ legacy data transfer approaches, through zero-cost Proof of Concepts and hassle-free Migration Services , we help companies stay focused on running their business without disruption as we transition them to more secure approaches. Please feel welcome to contact me for an obligation-free discussion about how GoAnywhere can help your organisation. At Generic Systems Australia, we’re your local experts in Managed File Transfer. Previous Next

  • Understanding your organisation’s obligations for protecting Personal Identifiable Information | GSA

    < News Understanding your organisation’s obligations for protecting Personal Identifiable Information 19 Nov 2024 With the Australian Government’s imminent introduction of new cyber security legislation, it’s becoming more important than ever to understand your organisation’s legal responsibilities for protecting Personal Identifiable Information (PII). What is PII? The Australian Signals Directorate (ASD) – Australia’s top government cyber security agency – says that personal data includes a broad range of information that could identify an individual. That may include an individual’s: Name Date of birth Address Medical records Racial/ethnic origin Political opinion Religious beliefs Gender Sexual orientation or practices Criminal record Payment details Email address Password License Photo Video Phone number Passport Employment information Biometrics, such as voice prints and facial recognition The Office of the Australian Information Commissioner (OAIC) extends that definition even further, saying it can include: Signatures Credit information IP addresses Trade union membership and associations Genetic information The OAIC cautions that sensitive information has a higher level of privacy protection than other personal information. It includes in that definition race and ethnicity, political opinions and associations, religious and philosophical beliefs, trade union membership and associations, sexual orientation and practices, criminal record, health or genetic information and some aspects of biometric information. Importantly, personal data is often greater than the sum of its parts. When seemingly innocuous data is aggregated or combined, it can be used to form a more complete picture about an individual. What Existing Laws Require The Privacy Act 1988 sets out how organisations must handle personal information, and applies to organisations with an annual turnover of more than $3 million, unless they’re a small business operator, registered political party, state or territory authority or a prescribed instrumentality of a state. Some small business operators do have obligations under the Act. These include: private sector health service providers businesses that sell or purchase personal information credit reporting bodies, contracted service providers for the Australian Government employee associations businesses accredited under the Consumer Data Right System businesses that have opted-in to the Privacy Act businesses related to a business covered by the Privacy Act businesses prescribed by the Privacy Regulation 2013 . New Obligations Incoming In October 2024, The Australian Government introduced to parliament the Cyber Security Act 2024, Australia’s first standalone cyber security legislation. If passed as expected, this new Act will impose new compliance and reporting requirements on Australian businesses. The Act is designed to address seven initiatives within the 2023-2030 Australian Cyber Security Strategy , including: • Mandating minimum cyber security standards for smart devices • Mandatory ransomware reporting for certain businesses to report ransom payments • A ‘limited use’ obligation for the National Cyber Security Coordinator and the Australian Signals Directorate • Establishment of a Cyber Incident Review Board. The legislation will also progress and implement reforms under the Security of Critical Infrastructure Act 2018 (SOCI Act) : • Clarifying existing obligations in relation to systems holding business critical data • Simplifying information sharing across industry and Government • Introducing Government powers to direct entities to address serious deficiencies within their risk management programs • Moving regulation for the security of telecommunications into the SOCI Act . Legal firm A&O Shearman cautioned that the new Cyber Bill will introduce several new critical areas of compliance and reporting. It advised businesses to take heed of these new obligations, and ensure they put in place robust cyber security measures. • Ransomware Reporting Obligations: Entities impacted by cyber security incidents and making ransomware payments must report these payments within 72 hours. • Security Standards for Smart Devices: The Cyber Bill mandates that manufacturers and suppliers of smart devices comply with specified security standards. • Protected or Limited Use of Incident Information: The Cyber Bill includes provisions to ensure that information provided about cyber security incidents is used or disclosed only for permitted purposes, with strict limitations on using this information for civil or regulatory actions against the reporting entity. • Cyber Incident Review Board: The new Board will review certain cyber security incidents and make recommendations. It will have the authority to require documents. A&O Shearman said organisations should make sure they implement security standards in compliance with the specified security measures currently provided for in the Cyber Bill, and make sure they can comply with the ransomware reporting obligations, including the timelines foreseen in the Cyber Bill. ASD Advice on Data Security Practices ASD says that, for businesses to be confident they’re employing appropriate data security practices, they should consider implementing these measures: Create a register of personal data Limit personal data collected Delete unused personal data Consolidate personal data repositories Control access to personal data Encrypt personal data Back up personal data Log and monitor access to personal data Implement secure Bring Your Own Device practices Report a data breach involving personal data ASD warned that “businesses cannot afford to forgo investing in their security, and risk compromising the security of their customers’ personal data. The prevalence of data breaches and ransomware attacks underscores the importance of sound security practices. Businesses cannot afford to assume that they will not be targeted. Investing in security proactively can be far more cost effective than having to manage the repercussions and costs of a major data breach”. Solutions to Help Meet PII Obligations Cyber criminals succeed when organisations don’t adequately protect their data transfers and systems access. Keeping the thieves at bay requires a multi-layered strategy, including robust data transfer protection, multifactor authentication and employee training. Managed File Transfer (MFT) solutions such as the class-leading GoAnywhere MFT encrypt data at rest and in transit, complying with the highest data security standards. MFT manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols such as SFTP, FTPS, and AS2 to send files securely, and encryption standards such as Open PGP and AES to protect data in transit and at rest. GoAnywhere MFT also provides audit reports, which will help organisations meet the new reporting and compliance needs. All file transfer and administrator activity is stored and easily searchable. To help organisations report on file transfer activity and remain compliant with the new legislation, these audit logs can be automatically generated and provided as PDFs. Advanced Threat Protection adds a further layer of defence. SFT Threat Protection enables safe collaboration with external parties, preventing malware from entering an organisation, and reducing the risk of employees losing or mishandling sensitive data. Local Experts Here to Help Generic Systems Australia are your local experts in Managed File Transfer solutions. We’ve assisted dozens of organisations across the Asia-Pacific region to secure their data and keep cybercriminals at bay. If you’d like to discuss improving your cybersecurity, please feel welcome to contact me, Bradley Copson . I’m always happy to have an obligation-free discussion, explain how simply we can transition you to the latest software and approaches, and even offer you a zero-cost Proof of Concept. Previous Next

  • World Braces for Cyber Retaliation | GSA

    < News World Braces for Cyber Retaliation 3 Mar 2026 Cyber security tensions are rising globally following the joint US–Israel strikes on Iran and the assassination of its supreme leader. Security analysts are warning that digital retaliation is already taking shape, with Iranian-aligned hacking groups mobilising, and critical infrastructure operators across multiple regions bracing for disruptive cyberattacks. Offensive cyber operations were a key part of the US and Israeli strikes that targeted Iran over the weekend, with critical infrastructure and media key targets. The Jerusalem Post described the cyberattack as the largest in history, and global internet monitoring firm NetBlocks said that Iranian internet activity has dropped to just one per cent of pre-attack levels. Ballistics and Binary While missiles and drones dominate news headlines, cyber operations offer Tehran a way to strike back asymmetrically - quietly, globally, and with potentially far‑reaching consequences. Security experts say the digital domain gives Iran a strategic avenue to pressure its adversaries. Interconnected critical infrastructure makes even small intrusions capable of triggering broader economic or safety impacts. Retaliation Strikes are already reshaping the threat landscape. Security analysts say they’ve observed reconnaissance activity and early-stage DDoS attacks from groups aligned with Iranian interests, indicating that a more aggressive campaign is being planned. CrowdStrike’s latest threat intelligence also highlights a shift in Iranian tactics toward cloud environments and identity‑based attacks, reflecting a steady evolution in capability. Historically, Iranian cyber operations have aligned closely with geopolitical objectives, targeting sectors such as energy, finance, telecommunications, healthcare, and other critical services. Analysts expect that pattern to continue as Tehran seeks to increase pressure and visibility on its chosen targets. Implications for Organisations The combination of geopolitical escalation, demonstrated offensive capability, and early signs of retaliatory activity suggests a volatile period ahead for governments and businesses alike. Operators of essential services - particularly those with regional ties or exposure - are being urged to strengthen monitoring, validate incident response plans, and prepare for potential spillover effects. Line of Defence State‑sponsored cyber operations increasingly target the systems that move, store, and validate sensitive information. This makes Managed File Transfer (MFT) a critical defensive control rather than a back‑office utility. Modern state actors operate with significant patience, resources, and strategic intent: they infiltrate supply chains, exploit unpatched interfaces, and quietly exfiltrate data to support espionage, political influence, or economic advantage. Government agencies have repeatedly warned that these actors use advanced tradecraft to compromise organisations across critical infrastructure and public institutions, as seen in advisories from the Australian Signals Directorate and its international partners. In this environment, any uncontrolled or ad‑hoc method of moving files - email attachments, unsecured cloud links, legacy FTP - becomes a soft target. MFT strengthens an organisation’s defensive posture by centralising, governing, and hardening all file‑based data flows. Instead of dozens of unmonitored channels, MFT provides a single, encrypted, policy‑driven platform with authentication, role‑based access, and full audit trails. This matters because state actors often exploit the weakest link in a distributed system, including overlooked transfer endpoints or poorly secured partner connections. Strategic Resilience When MFT is deployed correctly, it reduces the attack surface by eliminating shadow IT, enforcing encryption in transit and at rest, and providing the visibility needed to detect anomalies early - an essential capability when facing adversaries who specialise in stealth and persistence. Beyond technical controls, MFT also supports strategic resilience. State‑backed intrusions often aim to disrupt trust - undermining elections, destabilising supply chains, or eroding confidence in public institutions. Australia’s own experience with foreign interference highlights how attackers seek to manipulate or steal sensitive data to influence democratic processes. By ensuring that critical information moves through a secure, predictable, and fully auditable channel, MFT helps organisations maintain operational integrity even under sustained threat. It becomes not just a tool for secure transfer, but a foundational layer in a broader zero‑trust architecture - one that assumes compromise is possible and designs every data movement to be verifiable, controlled, and resilient. Local Expertise Available Generic Systems Australia is Fortra’s #1 GoAnywhere Partner in Australia and New Zealand, with decades of experience enabling organisations to defend against cyber-attacks. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch with me. Previous Next

  • INFO TECH REPORT 25 | GSA

    Independent Info-Tech MFT Quadrant Report (2025) For the 3rd consecutive year, respected tech analysts Info-Tech have evaluated the most popular MFT software and vendors, and found that GoAnywhere is the top MFT solution. To receive a complimentary copy of their 2025 report, simply submit your email address below and we'll email you back a PDF. First name Last name Enter your email address Phone You'll receive the 'Independent Info-Tech MFT Quadrant Report' shortly! RESOURCES Receive Report HOME

bottom of page