top of page

Search Results

136 results found with an empty search

  • Cyber Security to be Top Investment for 2025: CIOs | GSA

    < News Cyber Security to be Top Investment for 2025: CIOs 17 Sept 2024 Australian and New Zealand CIOs are planning to invest significantly in improved cyber security in 2025, according to a recent survey by analysts Gartner. Some 88% of the region’s CIOs and technology executives said they would invest in heightened cyber security measures. 82% said it would be their top investment priority. More Attacks, More Regulation Gartner attributes this focus to greater government regulation, coupled with some of the largest cyberattacks seen in ANZ so far. Speaking at the 2025 Gartner IT Symposium/Xpo on the Gold Coast, Gartner VP Brian Ferreira said “Organisations face greater scrutiny as they batten down the hatches to avoid becoming the next target or breaching stewardship. This continues to drive significant focus and investment towards cybersecurity and legal compliance into next year.” The uncertain economic climate businesses have operated in recently has increased executive and board scrutiny on technology investments, he said. Gartner’s survey found that increased focus on cyber security will attract investment away from previous ANZ CIO priorities of legacy infrastructure (43% of respondents), augmented reality, virtual reality and immersive technologies (17%) and next-generation compute technology (11%). Heightened Focus Consistent with their focus on cyber security, Gartner’s survey found that ANZ CIOs have a significantly heightened focus on ensuring compliance and minimising risks (92% - up from 57% last year). “As Australian regulatory landscapes continue to evolve, ANZ CIOs are also facing more stringent laws to increase stewardship obligations,” Ferreira said. “It’s incumbent upon CIOs to steer their organisations towards a future marked by digital stewardship, responsible innovation, stringent compliance and active participation in shaping regulatory norms.” Help for ANZ CIOs Generic Systems Australia has many years of experience helping ANZ CIOs and IT teams protect their valuable data with class-leading Managed File Transfer solutions. From the initial scoping of companies’ legacy data transfer approaches, through zero-cost Proof of Concepts and hassle-free Migration Services , we help ANZ companies stay focused on running their business without disruption as we transition them to more secure approaches. If you’d like a to discuss how your organisation’s cyber security can be boosted by a cost effective Managed File Transfer solution, please feel welcome to contact me . I’m always happy to have an obligation-free discussion. At Generic Systems Australia , we’re your local experts in Secure Managed File Transfer. Previous Next

  • The Value of 3rd-Party Reviews | GSA

    < News The Value of 3rd-Party Reviews 7 May 2025 Third-party review sites can be a valuable source of insight for IT teams tasked with selecting the best software solution for their organisation. Reputable and long-established sites such as PeerSpot , SoftwareReviews , G2 , and Capterra can help identify which solutions are most widely used and highest rated within your industry. This can in turn help you proceed quickly to a decision on which solution(s) to trial. Reliable Reviewers Whether you’re looking for Managed File Transfer (MFT) solutions or other software, it’s best to prioritise reviews on sites which have established themselves as trustworthy over the test of time and thousands of peer reviews. These sites capture the opinions of real product users sharing their real-life experiences – positive and negative. In fact, Gartner’s 2024 annual study of 2,499 software decision makers found that customer reviews and ratings were the most used information source by buyers, above personalised product demos, user guides, and case studies. More than a third of software buyers described reviews as “extremely important” to their purchase. Are Reviews Trustworthy? It’s illegal in Australia and New Zealand for businesses to create fake or misleading reviews or arrange for others do so. The Australian Competition and Consumer Commission suggests the following red flags may indicate that a review is fake: · a spike in highly positive or negative reviews over a short period of time; · many reviews written from the same email or IP address; · similar reviewers’ names; · generic reviews without specific detail about the business or product; and · reviews written in similar language as other reviews for the same business or product. Thankfully, the trusted third-party sites I listed above have processes in place to weed out dubious software reviews. They also publish the measures they take to assure the validity of the reviews they receive. Other Sources of Insight Beyond peer reviews, here are some other useful resources to consult when selecting the right software solution for your business. · Case studies : Demonstrate how businesses are using the solution; · Product videos : Illustrate solutions’ features and benefits; · Webinars : Subject matter experts demonstrate the configuration and use of the solutions; and · Written Resources : Provide a variety of reader-friendly explanations and examples Local Advice and Guidance At Generic Systems Australia, we have decades of experience installing and supporting the world’s premier MFT , GoAnywhere, across Australia and New Zealand. Founded in 1993, we’re proud to count among our clients some of the region’s most iconic brands. Leveraging our unique skills and readily available local support, they rely on us to make their IT systems more secure and efficient, in turn, making their teams more productive. A long-term partner of Fortra (formerly Help Systems, and Linoma Software, the original authors of GoAnywhere MFT), our in depth understanding of GoAnywhere’s capabilities - including Advanced Workflows, data translation, auditing and compliance, automation and security - enables us to devise optimal deployment solutions, provide rapid Proofs of Concept, and move ahead quickly with implementation. In fact, we have exclusively managed GoAnywhere deployments for some of the region’s largest multinational corporations and Government departments, as well as small- to medium-sized businesses. Our Australia-based technical experts provide clients with the reassurance that local help will always be on-hand. If you’re exploring how to boost your efficiency and bottom line by leveraging Secure Managed File Transfer technology, please feel welcome to contact me for an obligation-free discussion. Or, if you’d prefer to read more, you can check out the many resources on our Generic Systems Australia website, including our exclusive Local MFT Buyer’s Guide . At Generic Systems Australia, we’re your local experts in MFT. Previous Next

  • Asia-Pacific orgs are on Cybercrime Frontline | GSA

    < News Asia-Pacific orgs are on Cybercrime Frontline 12 July 2024 The Asia-Pacific region is the frontline in the fight against cybercriminals. A survey conducted by security firm Kiteworks has found that 72% of organisations in our region experienced four or more cybersecurity incidents in the past year - 20% more than the global average. Data also shows that Asia-Pacific organisations also exchange sensitive content with the highest number of third parties. This could be contributing to the higher-than-average cyberattacks. One of your best defences against hackers is to centrally control the flow of data into and out of your organisation. Managed File Transfer (MFT) software does that for you. At Generic Systems Australia , we’re the Asia-Pacific’s experts on the world’s #1 MFT, GoAnywhere . Let me know if you’d like an obligation-free discussion about how we could help you keep your organisation safe from the cyber crimewave. #MFT #managedfiletransfer #securefiletransfer #sft #cybersecurity #cybercrime Previous Next

  • Sound Advice on Choosing a New MFT | GSA

    < News Sound Advice on Choosing a New MFT 7 May 2024 Tech Wire Asia , an independent tech news website that covers enterprise and technology across the Asia-Pacific region, offers sound advice to help companies choose a new Managed File Transfer (MFT) solution. The Shadow of Clop Tech Wire Asia issued their advice in the wake of attacks last year by Clop, a notorious ransomware group, on the online file transfer tool MOVEit. PWC’s Australian unit, Prudential Assurance Malaysia Berhad and Prudential BSN Takaful Berhad in Malaysia were among APAC region victims of Clop’s attacks. While Tech Wire Asia said it did not “insinuate an everlasting vulnerability in MOVEit or imply that its usage should be permanently discontinued”, it noted that it had received “a wave of enquiries from current and prospective customers about the continued safety of using MOVEit” in the wake of the attack. In response, the website offered this advice for those wishing to move on from MOVEit . Crucial Considerations Tech Wire Asia said the crucial consideration in choosing the best file transfer software is finding an MFT solution that is simple, capable of encrypting sensitive data, can automate transfers, meets compliance regulations, and operates seamlessly across various platforms. It noted that there are many aspects and features to consider while choosing MFT software, including: Average daily file transfer volume; Regulatory obligations; Industry-specific needs; and Budget. Other vital features could include: Advanced auditing and tracking abilities; Clustering functionality; Cloud integrations; Capability to translate EDI files; and Availability of remote agents. The website recommended that selecting the appropriate MFT solution should be driven by a company’s specific requirements. GoAnywhere MFT highly-regarded In its review of contenders to replace MOVEit, Tech Wire Asia described GoAnywhere MFT as “a sophisticated enterprise solution for transfers and file management”, saying that the product “excels at securing file transfers across multiple platforms, protocols, and encryption standards”. The website noted that GoAnywhere is designed for SMEs and Enterprises, and is deployable on-premise, in the cloud, or hybrid environments, enabling secure data exchange between organisations, employees, customers, and trading partners. In the capacity of enterprise-secure file transfer software, GoAnywhere shields data, ensuring compliance with regulations and standards. Its integration prowess also extends to applications like Salesforce and SharePoint. Try Before You Buy In conclusion, Tech Wire Asia “highly recommended” that customers moving on from MOVEit take advantage of a free trial of new MFT software. Previous Next

  • How to Protect Your Customers’ Personal Identifiable Information | GSA

    < News How to Protect Your Customers’ Personal Identifiable Information 8 Nov 2024 Protecting customers’ Personal Identifiable Information (PII) has fast become a critical duty of care for every organisation. What is PII, and why is it valuable? PII includes information such as Tax File Numbers, Medicare numbers and other health records, credit card details, student addresses and more. Cybercriminals attempt to access PII for financial gain, either directly – by selling it to data brokers on the dark web – or indirectly, by identity theft. Stolen PII can be used by hackers to open bogus credit card and bank accounts, and to socially engineer attacks using methods such as phishing and ransomware. Organisations need to zealously protect the PII provided to them by customers – not only for the sake of maintaining trust, but also to guard against heavy sanctions for non-compliance by regulators such as ASIC and the ACCC. And those compliance requirements are ramping up. Just last month, Australia’s federal government introduced legislation to parliament which will revolutionise Australia’s cyber security preparedness by imposing new protection standards and reporting requirements on local businesses. International Obligations However, compliance requirements for the protection of PII don’t stop at our national borders. For example, businesses with customers in Europe need to comply with the EU’s General Data Protection Regulation. Local businesses trading in the US need to comply with America’s Health Insurance Portability and Accountability Act, Federal Information Security Management Act, Payment Card Industry Data Security Standard, Gramm-Leach Bliley Act and California Consumer Privacy Act. Rising Risks and Impacts Recent statistics demonstrate the growing risk and significant impact of PII data breaches. Verizon’s Data Breach Investigation Report for 2024 shows that some 60% of data breaches involve some form of personal information. And IBM’s 2024 Cost of a Data Breach Report revealed the global average cost of a data breach now exceeds A$7 million. Protecting PII Stepping up to the needs of PII guardianship requires both technology solutions and sound business practices. Layered defences, with integrated solutions that address encryption, threat protection, and data loss prevention, enable safe collaboration without risking malware, mishandled data, breaches and non-compliance. Given most breaches involve a human element, technology solutions need to be automated and easy for employees to use. Software needs to be able to manage: How access to data is granted; How access is authenticated; How access is tracked and controlled; and How access be speedily revoked, when needed. Layered Protection A standalone managed file transfer (MFT) solution – such as GoAnywhere MFT - is a great first layer of defence. It provides security for files at rest and in-transit. However, integrating Threat Protection as an additional layer enables you to take appropriate action when there’s PII in the data moving in and out of your organisation. Based on rules you predefine, our Advanced Threat Protection Bundle can mask, remove, or permit PII to be moved within your organisation and beyond, via a Secure ICAP Gateway. Medical Case Study A medical enterprise needed to transfer attachments between employees and trading partners containing detailed billing information. They had long used a managed file transfer solution to exchange patient records within and outside the organisation. However, they realised they needed to further safeguard patients’ PII via deep content inspection. The organisation integrated GoAnywhere MFT with Secure ICAP Gateway, adding anti-virus protection as well as structural “sanitisation” of files being transferred. Their combined MFT/Advanced Threat Protection now works to: Inspect for malware and viruses; Intercept content based on threat protection and data loss prevention requirements; Run rule sets such as renaming, script removal, keyword searches to control if content is allowed in or is blocked; and Sanitise PII content to permit ongoing transfer (or block it, if content cannot be adequately sanitised). Thanks to layered protection, the organisation can now exchange patient records free from viruses and malware, while only disclosing a use-appropriate level of PII. Controlling PII Disclosure Adding granular rules-based controls to data handling is the “killer feature” of Advanced Threat Protection. For example: You can permit some specified individuals to transmit PII, but not everyone. You can apply role-based access to PII. You can audit who is sending what information. GoAnywhere MFT’s encryption can be enhanced by limiting who can transfer PII data and what that data contains. The automatic detection and sanitisation of files removes some of the human factor risks so that employees can focus on their work instead of fussing with manual interventions. Augmenting technical solutions with employee training further reduces human factor risks. Here to Help Generic Systems Australia are the Asia-Pacific region’s experts in deploying Managed File Transfer and Advanced Threat Protection. We’ve assisted dozens of organisations to protect their PII and secure their file transfers, while keeping their businesses running smoothly. If you’d like to discuss how we can help you, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how simply we can transition you from outdated protocols and approaches. I can even arrange a simple, zero-cost Proof of Concept. Previous Next

  • New Security Standards for NZ Government Agencies | GSA

    < News New Security Standards for NZ Government Agencies 24 June 2025 New Zealand's National Cyber Security Centre (NCSC) has drafted Cyber Security Standards which government agencies will be required to adopt and implement later this year. The new standards outline the minimum cybersecurity practices that agencies must adopt for their business-critical and external-facing systems. In general terms, they require that cyber security policies, capabilities, controls, and practices must be well-formed and repeatable. The Standards 10 draft Standards are currently being discussed with agencies and industry partners as part of pre-implementation consultation and feedback gathering. They are: 1. Security Awareness 2. Risk Management 3. Assets and their Importance 4. Secure Software Configuration 5. Patching 6. Multi-factor Authentication 7. Detect Unusual Behaviour 8. Least Privilege 9. Data Recovery 10. Response Planning Maturity Model The draft Standards feature a built-in Capability Maturity Model (CMM) to help agencies standardise how they measure, track and improve their cyber risk management over time. CMM1 “Informal”: Security capability may be ad-hoc, unmanaged or unpredictable. Success may rely on individuals rather than institutional capability. CMM2 “Planned and Tracked”: Security capability is well formed in designated business units. The security policies, capabilities, control and practices are in place and repeatable. They are designed to meet the organisation’s core security requirements. CMM3 “Standardised”: Security capability is standardised, integrated, understood and followed consistently across the enterprise. Security is well-governed and managed at an enterprise level. CMM4 “Quantitatively Controlled”: Security capability and performance is measured, monitored and objectively and quantitively controlled. Security measures are hardened in response to performance alerts. Security is a strategic focus for the organisation. CMM5 “Optimising”: Security capability adapts to a dynamic, high risk operating environment. Practices are generally recognised as world-leading and have near real-time measurement and response mechanisms. Agencies will be required to meet at least Capability Maturity Model level two (CMM2) for their business-critical and external-facing systems. Consultation Phase underway The NCSC began consulting with affected agencies and industry partners on 16 June. Discussions will continue until 4 July 2025, with final Standards planned for publication in October 2025. Agencies will be required to report on their implementation of the standards as part of Protective Security Requirements reporting process (a framework for managing security within NZ government organisations) in April 2026. The initial draft of the NCSC’s Minimum Cyber Security Standards are available for download from the NCSC website . MFT as a Baseline Protection Tactic NZ organisations seeking to step up to the new minimum standards should carefully consider installing a Managed File Transfer (MFT) solution as an initial step. This relatively simple enhancement to IT systems puts organisations miles ahead of businesses still using risky and outdated FTP (File Transfer Protocol) or email to transfer files. MFT centralises data transfer and - more importantly - applies policies to data to protect it from threats such as inbound malware and employees sending files via ad hoc platforms outside the defensive perimeter (e.g. Google Drive and Dropbox). MFT has the built-in advantage of “forcing” the application of policies designed to better protect data such as encryption, monitoring, and auditing. Expertise Close at Hand No-one better understands local MFT needs and best practices than Generic Systems Australia. Our team has decades of experience helping organisations implement the world’s leading MFT solution. Our Migration Service makes the transition even easier for busy agencies who would rather focus on their core mission than their IT systems. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch. At Generic Systems Australia, we’re your local experts in Secure Managed File Transfer. Previous Next

  • Survey finds IT leaders increasingly focussed on PROACTIVE cybersecurity | GSA

    < News Survey finds IT leaders increasingly focussed on PROACTIVE cybersecurity 12 June 2024 Australian IT leaders are increasingly focusing on proactive cybersecurity, according to a new survey released today. In a survey conducted by Tenable, IT leaders said that, while the ability to respond to and recover from cyber incidents remained essential, they are now focusing more on preventing such incidents altogether. Preventative measures they are investing in include: access controls and monitoring (64%) regular software updates and patch management (64%), and regular employee training and education on cybersecurity best practices (60%). Dark Tide Rising The most recent Australian Signals Directorate Report shows that cybercrime is on the increase for enterprises. On average, a new report is received every six minutes, up 23% year on year. The average cost of cybercrime has also increased by up to 14%. Saving Ransoms, Reputations, Operating Costs Adopting preventative cybersecurity measures isn’t only saving companies from the costs of cybercrime. Companies who take proactive steps say they are also benefiting from lower cyber insurance premiums. 44% of IT leaders experienced reductions ranging from 5% to 15%. Reductions of that magnitude demonstrate that insurers too are recognising the effectiveness of proactive cybersecurity. Proactive, Layered Defence A proactive strategy for storing, transferring and securing data is essential for keeping cyberthieves at bay. A layered approach - secure file transfer, secure content engines, secure digital rights management, and employee education – is the optimal way to prevent data breaches. At Generic Systems Australia , we recommend the class-leading secure managed file transfer solution, GoAnywhere MFT , to keep data safe - at rest, and in transit. Coupled with our Advanced Threat Protection Bundle , we enable organisations to safely collaborate without exposing systems to the risks of malware gaining a foothold within their IT systems. About The Survey Tenable partnered with Pure Profile to collect data from more than 200 IT and cybersecurity leaders across the insurance, banking, education, healthcare and transport industries in Australia. If you’d like to join the growing number of IT managers taking strong preventative measures to avoid cybercrime, please get in touch with me, Bradley Copson ( mail to :bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. Previous Next

  • Tame the File Transfer Time Sink | GSA

    < News Tame the File Transfer Time Sink 23 Oct 2023 When asked “How could you get more done at work?”, most people are quick to respond: “Fewer meetings, please!” However, research has revealed that other hidden time sinks may be an even greater drain on our personal productivity. For example: the amount of time lost while team members manually share files and data between themselves. A recent report found that a typical desk worker now uses 11 different applications to complete their tasks. during the course of their working day. According to research by Productiv , most company departments use between 40 and 60 different applications. Company-wide, that number sprawls to more than 200 apps. IT tools are designed to enhance our collaboration and productivity. But when different parts of a business adopt different tools, with different file formats, it opens up a black hole of time-wasting file translation and transference across the entire organisation. So, how can we help our employees spend more time productively contributing to the organisation, and less time on the drudge work of wrangling files…? Ideally, we can work to rein in the proliferation of apps across our organisations, standardising on a common set of enterprise IT tools. But that can be easier said than done. It takes time – and even some business risk – to wean teams off their familiar tools and train them on new ones. Until then, a Managed File Transfer (MFT) solution can help . With GoAnywhere MFT, data can be translated to and from a variety of widely-used formats without having to write cumbersome scripts or programs. Its comprehensive Extract, Transform, and Load features enable data values to be mapped, formatted and modified between source and target files automatically. Even better, GoAnywhere's secure collaboration features make connecting and sharing between employees easier and faster - even when they’re mobile. Features include an intuitive browser-based web client for performing ad-hoc file transfers, enterprise file sync and sharing using GoDrive, and a handy mobile application for moving files quickly while on-the-go. The benefits of using an advanced MFT like GoAnywhere continue well beyond the point where your team has happily standardised on common enterprise tools. The same flexibility and automations that enabled your team to eliminate their internal productivity time sink are just as useful in improving your interactions with customers and supply chain partners. Time to Tame This Time Sink? If you’d like to discuss how GoAnywhere MFT could help boost your organisation’s productivity and bottom line, please feel free to contact me ( bradley@gensys.com.au ) for an obligation-free discussion, or read more at Generic Systems Australia . Bradley Copson Business Manager Generic Systems Australia Previous Next

  • GoAnywhere V7.7 released – with Fortra Threat Brain protection | GSA

    < News GoAnywhere V7.7 released – with Fortra Threat Brain protection 13 Dec 2024 Great news for our GoAnywhere MFT customers, with your software now able to leverage insights from Fortra Threat Brain to further protect your managed file transfers. Fortra Threat Brain is a comprehensive cyber security information hub, fed by telemetry from the Fortra’s expansive portfolio of products as well as insights from across the dark web, social media, and law enforcement. It brings together a team of threat intelligence analysts and partners, an expansive portfolio of AI-enabled cybersecurity products, and a vast array of intelligence sources, to provide even stronger protection for your valuable data. The up-to-date threat intelligence from Fortra Threat Brain enables GoAnywhere to reject HTTP/S service connections flagged as malicious. That includes connections to GoAnywhere’s Web Client, AS2, AS4, and any other endpoints that run on the HTTPS service. Extended file transfer protection is just one of many enhancements available in GoAnywhere Version 7.7, now released to customers for download. (And if you’d like our help with upgrading, be sure to check out our GSA Annual Upgrade & Health Check Service .) Previous Next

  • Boost Employee Productivity via Managed File Transfer | GSA

    < News Boost Employee Productivity via Managed File Transfer 19 Feb 2025 76% of employees report that they spend 1-3 hours a day simply moving data from one place to another, according to research by Zapier. What if you could give your team that time back, to spend on more value-added tasks? You can - with Managed File Transfer (MFT). When Tools Become Time Sinks IT tools are designed to enhance employee collaboration and productivity. However, as businesses grow, they adopt many different IT tools, often with differing file formats. That opens up a black hole of time-wasting as employees are forced to translate and transfer files every time they want to share data across the organisation or with customers or suppliers. GoAnywhere MFT – the world’s leading MFT – automates this task. It gives employees back precious time to focus on more value-added tasks. GoAnywhere translates files to and from a variety of widely-used formats without cumbersome manual scripts. Its comprehensive ETL (Extract, Transform, and Load) features enable data values to be mapped, formatted and modified between source and target files automatically. Even better, GoAnywhere's secure collaboration features make connecting and sharing between employees easier, faster and more secure – even when they’re mobile. It provides an intuitive browser-based web client for performing ad-hoc file transfers, enterprise file sync and sharing via GoDrive, and a handy mobile application for moving files quickly while on-the-go. Protected Productivity In addition to the productivity and efficiency benefits it offers, GoAnywhere MFT protects your organisation’s valuable data at rest, and in transit. Coupled with an Advanced Threat Protection Bundle , it enables organisations to safely collaborate while repelling the efforts of cybercriminals. This automated defense system protects your data in three important ways: 1. Prevents files containing malware from being shared. 2. Blocks sensitive data from being shared. 3. Redacts sensitive information from files before transfer. Time to Tame the Time Sink? If you’d like to discuss how GoAnywhere MFT could help boost your organisation’s productivity and bottom line, please feel welcome to get in touch with us for an obligation-free discussion. Previous Next

bottom of page