top of page

Search Results

184 results found with an empty search

  • The Hardest Question About Your Organisation’s Cybersecurity | GSA

    < News The Hardest Question About Your Organisation’s Cybersecurity 18 June 2024 It’s the question every IT manager dreads. “How did you let this happen?!” And the worst time to be asked it is after your organisation has become the latest victim of a cybercrime. Here’s how to avoid it ever being asked… Anxiety Rising Boardroom anxiety about the protection of customer data has been growing across the country. High profile incidents such as the ransomware attacks on Optus and Medibank Private have sensitised the senior leaders to both the risks and costs of negligence. CEOs and CIOs are being quizzed: “Is our organisation doing enough to avoid becoming the next negative headline?” Incidents Rising The most recent report by the Australian Signals Directorate (ASD) showed that cyber attacks are happening far more frequently. On average, a new report is received every six minutes - a 23% increase year on year. One in 5 critical vulnerabilities was exploited within a mere 48 hours. The ASD warned that cybercriminals are constantly evolving their operations against Australian organisations, fuelled by a global industry of access brokers and extortionists. Thousands of businesses failed to fulfil their obligation to protect sensitive customer data, and millions of Australians had their information leaked on the dark web. Costs Rising Also troubling the C-suite is that the costs to businesses of “cyber negligence” are escalating rapidly. The ASD says the cost of cybercrime to businesses has increased by 14% compared to the previous financial year. However, direct financial losses are just one part of the broader costs of “cyber negligence”. For example, Medibank Private’s share price plunged more than 20% in the weeks following its loss of the personal information of 9.7m Australians. The company is facing class actions by both shareholders and consumers alleging breaches of the company’s duty of care to protect consumer information, manage risks and make timely disclosures to shareholders. Optus Communications saw its customer growth halved after its systems were breached. A class action by Slater and Gordon alleges that “Optus failed to protect, or take reasonable steps to protect, the personal information of its current and former customers”. In response to rising consumer concerns, Australia’s Attorney-General, Mark Dreyfus, has flagged “better laws to regulate how companies manage the huge amount of data they collect, and bigger penalties to incentivise better behaviour”. Reflecting the growing risks and costs of cybercrime, cyber insurance premiums are also rising. Email: the Critical Vulnerability According to the Australian Signals Directorate, Business Email Compromise (BEC) remains a key vector for conducting cybercrime. A form of email fraud, cybercriminals target organisations and scam them out of money or goods by tricking employees into revealing important business information, often by impersonating trusted senders. BEC can also involve a cybercriminal gaining access to a business email address and then sending out spear phishing emails to clients and customers for information or payment. IT Managers Stepping Up Responding to these trends, responsible IT Managers are increasingly focussed on preventing their organisations from becoming the next headline victim of cybercrime. In a survey conducted recently by Tenable, IT leaders said that, while the ability to respond to and recover from cyber incidents remained essential, they’re now focusing more on preventing such incidents altogether. The Best Answer to the Hard Question A proactive and layered strategy for storing, transferring and securing data is essential for keeping cyberthieves at bay. Secure managed file transfer, secure content engines, secure digital rights management, and employee education combine to create the optimal way to prevent data theft and cyber breaches. At Generic Systems Australia , we recommend the class-leading secure managed file transfer solution, GoAnywhere MFT , to keep data safe - at rest, and in transit. Coupled with our Advanced Threat Protection Bundle , we enable organisations to safely collaborate without exposing their systems to the risk of malware gaining a foothold within their IT systems. Seamless integration between GoAnywhere MFT and the Clearswift Secure ICAP Gateway provides anti-virus and malware protection, deep inspection of the content inspection, adaptive data loss prevention, and media type protection. Together, they provide three key defences. 1. Prevents file containing malware from being shared. GoAnywhere provides easy anti-virus protection through the Secure ICAP Gateway to scan all inbound file transfers. It can also detect and automatically strip out active content like embedded malware, triggered executables, scripts, or macros used to extract or hold sensitive data hostage. Advanced Threat Protection “sanitises” files and emails without delaying delivery, guarding against today's leading malware and ransomware (e.g. CryptoLocker, CryptoWall, TorrentLocker, Dridex Dyre, BlackEnergy, etc.) and tomorrow's even more sophisticated threat variants. 2. Blocks sensitive data from being shared. Files with Personal Identifiable Information or other sensitive data can be prevented from being transferred. GoAnywhere Threat Protection can inspect file contents, then stop and block files from being shared, based on policies you define. 3. Redacts sensitive information from files before transfer. Advanced Threat Protection can ensure sensitive data is neither transmitted nor received, detecting and/or removing geotags, document properties, email addresses, and other metadata from documents, and replacing sensitive text with asterisks. Using Optical Character Recognition, it can even remove text contained in scanned images. No question: 'Prevention' is Better than 'Cure' Cyber attacks are inevitable . However, falling victim to them is optional . If you’d like to learn more, and be able to comprehensively reassure your Board about the steps you’ve taken to protect your business’s data, reputation and bottom line, please feel welcome to get in touch with me, Bradley Copson ( mailto:bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, and even offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your Local Experts in Secure Managed File Transfer. Previous Next

  • GoAnywhere declared "Best MFT" | GSA

    < News GoAnywhere declared "Best MFT" 6 Nov 2023 GoAnywhere judged to be Best Managed File Transfer Solution Transferring data is the lifeblood of a modern organisation. Securely sharing critical information between employees, suppliers and customers is essential to efficient operations. Last year, respected tech analysts Info-Tech evaluated the most popular MFT software and vendors. Their analysis, which took into account vendor experience and capabilities, product features and customer satisfaction, found GoAnywhere to be the top MFT solution. So, what led Info-Tech’s judges to recommend GoAnywhere for businesses seeking a secure and efficient file transfer solution…? Unmatched Versatility: GoAnywhere MFT offers an all-encompassing platform for secure file transfers, automation, and seamless cloud integration. Some competitive offerings don’t support Cloud Deployment. GoAnywhere’s versatility and extensive feature set impressed Info-Tech's evaluators, leading them to conclude it was the ideal choice for businesses with diverse transfer needs. User-Friendly Efficiency : User-friendliness is key element of efficient in business operations, and Info-Tech found that GoAnywhere MFT really delivers on this front. From IT specialists to non-technical professionals, the platform's intuitive design streamlines file transfers, task scheduling, and security management. Fortified Security: In this era of increased data breach risk, GoAnywhere’s robust encryption and access controls keep sensitive data protected. Stellar Customer Reviews : 93% of GoAnywhere reviewers said they would likely recommend the solution. The solution’s composite review score was 8.9 out of 10. Budget-Conscious Investment : Info-Tech found GoAnywhere MFT to be a supremely cost-effective solution, with attractive pricing strategies. Responsive Support and Ongoing Updates : Info-Tech applauded GoAnywhere for its responsive customer support and regular updates, ensuring business continuity. Market Leader – for a reason GoAnywhere MFT's combination of versatility, security, ease of use, and budget-friendliness has propelled it to the top of the MFT market, as recognised by Info-Tech. For businesses on the quest for a comprehensive and reliable file transfer solution, GoAnywhere MFT is the smart and strategic choice. Want to Learn More? Generic Systems Australia is the Asia-Pacific region’s leading provider of secure MFT solutions. If you’d like to explore how your organisations’ efficiency and bottom line could be boosted through MFT technology, please feel free to contact our Business Manager , Bradley Copson , for an obligation-free discussion, or read more on our website . Previous Next

  • Protect Your Business from Phishy QR Codes | GSA

    < News Protect Your Business from Phishy QR Codes 29 Aug 2025 It’s National Scams Awareness Week . But it’s always a good time to guard against one of the most common forms of phishing. Research by the Anti-Phishing Working Group (APWG) shows that scam QR Codes are becoming the attack vector of choice for cyber criminals attempting to infiltrate your organisation. Each day, millions of emails are sent containing QR Codes that link employees and consumers to bogus websites. Code for Criminals QR code attacks occur when a cyber thief creates a bogus QR code which “socially engineers” their intended victim to a phishing website. There they’re tricked into disclosing system credentials, making a false payment or purchase, or downloading malware. QR codes are an increasingly popular phishing tactic due to their crim-friendly features. Free QR Code generators make it inexpensive for cyber criminals to attempt phishing attacks. Free QR Code tend to have few resources dedicated to takedowns of legitimate service abuse and other malicious activity.   QR codes can be combined with URL shorteners to mask the true destination of URLs. Stop the Scams Our SFT Threat Protection Bundle enables your organisation’s email system to automatically detect and prevent phishing links and other malware from entering your organisation. Combining the layered strengths of GoAnywhere MFT and Clearswift, it means your team can receive and share information securely, without impairing their productivity. Seamlessly integrating managed file transfer with advanced threat protection and adaptive data loss prevention, SFT Threat Protection not only prevents malware from entering your organisation, but it also prevents employees from losing or mishandling data. For example, if an employee knowingly –– or unknowingly –– attempts to share any files containing malware, those files are sanitised by having the malicious elements automatically removed. It can also automatically detect and –– if you configure it to do so –– prevent employees from sharing sensitive information. Local Help on Hand Generic Systems Australia has decades of experience helping Australian and New Zealand organisations protect themselves against phishing and other cyber attacks by leveraging the power of the world’s leading MFT solution. Our Migration Service makes the transition even easier for organisations who prefer to use their resources building their businesses rather than improving their IT plumbing. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch with us. At Generic Systems Australia, we’re your local experts in Secure Managed File Transfer. Previous Next

  • SES Encrypts and Audits Global Client Data | GSA

    < Case Studies SES Encrypts and Audits Global Client Data Decad es of experience helping Asia-Pacific customers have established Generic Systems Australia as our region’s local experts in secure managed file transfer. In this case study, we share how global experts in operational resilience – SES – take advantage of GoAnywhere MFT , the world’s leading MFT solution , to manage the transfer of more than 2,000 files daily. Software escrow agreements are becoming increasingly common for organisations worldwide. Medium and large enterprises, especially those in retail, energy, and financing, rely on these agreements to provide coverage for the unique source code, files, and other software assets critical to a company’s intellectual property. To prevent loss of this information during sudden downtime, a data breach, or natural disaster, organisations create a software escrow agreement with a third-party vendor to protect and back up their data. The third party then takes the data, creates an inventory of everything that’s to be escrowed, and puts the source code and other assets into a vault for maximum protection. SES is a third-party vendor that provides software escrow agreements, intellectual property protection, and cybersecurity risk management globally. Based in Manchester, UK, SES has more than twenty years of experience providing security to more than 2,500 professionals in 40+ countries. "Dealing with software escrow agreements is our bread and butter," said Tom Sweet, Information Security and Systems Manager at SES. It’s an area of constant growth and adjusting to keep clients happy and source code regularly updated. We are continually developing and innovating.” Often, SES does this with tools such as GoAnywhere MFT. For SES, GoAnywhere Managed File Transfer (MFT) has been a well-used and finely-tuned addition to its cybersecurity solutions. With the software in place, it performs on average nearly 2,000 uploads for clients per day — a mix of small and large files — as well as help monthly and quarterly businesses with their source code deposits. Switched from Manual File Transfers to Managed File Transfer Before GoAnywhere came into the picture, SES used a web gateway, an AWS-backed instance, to receive source code for its clients. It also occasionally used old-fashioned file transfer methods: physical disks and SD cards that were tracked, signed for, and had a direct chain of custody which could be followed. While this mixed process — AWS-backed instance and physical mail — worked at the time, it still lacked the ability to track user and file transfer activity. Having an audit trail was important to the business. When auditing also became a client requirement, SES looked for a way to streamline, structure, encrypt, and audit the exchange of data. SES handled a high volume of file transfers and needed robust security practices for the data it processed and stored every week. So the it was time to find a centralised solution which could do all of this and meet its trading partners’ needs. The tracked-and-signed file transfer processes SES used led to an evaluation of GoAnywhere MFT, a robust and fast-growing product which used similar techniques (tracking, signing, and a clear chain of custody) for sensitive file transfers. GoAnywhere was a hit. It took Tom Sweet mere days to learn the product. He attended two webinars, then jumped in and followed his intuition. The turnaround had to be quick, but the learning curve was straightforward. SES implemented GoAnywhere across its Linux systems and has depended on it ever since for day-to-day file transfers, streamlined encryption, and consistent auditing. Benefit#1: File Encryption and Security With GoAnywhere fully implemented, SES has been able to ensure all file transfers sent by its clients are encrypted in transit and sent to the right place. SES has also ensured that encryption keys are held separately. These are just two of the strict requirements SES needs to follow for its clients in order to stand out in a sea of escrow and backup service platforms. "It’s risk versus security," Tom said. "With HR and payroll data, the risk is high, so the security needs to be high as well."nearly 2,000 uploads for clients per day — a mix of small and large files — as well as help monthly and quarterly businesses with their source code deposits. Benefit#2: Fast File Transfer & Trading Partner Setup New trading partners and file transfer users can be set up in minutes. "Less than that if I’m rushed," Tom said. "The quickest ones we’ve had people test: I’ve sent the email saying here’s your username, sent the password out over SMS, and people test the log-in within 10 minutes." Sweet uses private and public keys to ensure the encryption and validity of the new transfers he creates. When the file transfers are executed, most run, start to finish, in less than 30 minutes. Benefit #3: Ease of Use & Automation "The main thing we use GoAnywhere for is managing users, auditing the logs, and giving users a secure gateway into our systems that would normally be firewalled," Tom, said. All of this is simple with GoAnywhere, and he believes the product’s biggest strength is its ease of use. Whether he needs to streamline, update, or re-deploy the product across systems and users, the process has been painless. Automation is another huge benefit of GoAnywhere. SES use GoAnywhere to do the heavy lifting for SaaS-based clients. These clients transfer large amounts of source code end data that are pushed into a SaaS escrow and captured in real time. "We help these clients configure a script that connects over SFTP to a GoAnywhere service," Tom said. "GoAnywhere then audits those transfers." The product securely transfers and audits at the same time, all automatically for nearly 60 clients who need their source code updated on a daily or monthly frequency. This enables SES to automate on Windows and Linux to meet the security requirements of each client. GoAnywhere’s granular security controls enabled Sweet to make GoAnywhere as safe and security-driven as possible against internal risks and user errors. "I stripped it back to who can do what," he said. Previously shared passwords were locked down. Web users were restricted to only the areas of the product they needed, and file storage was controlled — files could only be stored in the right areas of the network. "If someone in a company wanted access to the transfers, or to the systems, they could break the loop to that cycle. So that’s why we vault [client data] and back it up in an encrypted format. We make sure the file transfers are encrypted; that’s key too." Benefit#4: Regulation Compliance Many SES clients have compliance requirements which SES must meet. To achieve these needs, SES has applied ISO 27001 compliance across all clients to ensure all information sent between SES and other companies is secure. "ISO 27001 mandates that we create policies, processes, and procedures which we can prove using evidence-based systems," Tom said. "This says, ‘Okay, by default, you [the client] get all of this [security]. All files will be encrypted, and all second factor messages will be sent out-of-band so they aren’t sent over the same method of communication, and so on." Meanwhile, while encryption is the same and applied for everyone, clients can choose if they want to use multi-factor authentication (MFA) with passwords or SSH keys for an extra layer of security. GoAnywhere offers multi-factor authentication methods, including keys and certificates, for increased file protection. SES also uses GoAnywhere to encrypt every backup of escrow data that is then kept in offline vaults. "This ensures there’s 99.9% availability," Tom said. "No one thinks escrow is important until it’s too late," he added, so SES provides these offline backups with GoAnywhere’s help to give organisations peace of mind. Benefit#5: Auditing and Administration One of the biggest justifications for purchasing GoAnywhere was its auditing functionality. Tom and his team uses these audit logs to see who is connecting to their SFTP servers, what they’re doing on those servers, and how much they’ve done. This level of detail is critical, especially when dealing with sensitive escrow documents, software assets, and source code. "The log-in and auditing process in GoAnywhere is important for our information security standards. We audit the transfers not just to be able to take them securely, but also to prove who has been on and transferred what and when. The audit trail is important." If Sweet needs to change something, GoAnywhere makes it easy. Admins can make modifications or adjustments to their processes to keep constant with security requirements. "We can do this with GoAnywhere very easily," he said. "Then we just send out a new host key to our clients." What’s Next: Remote Agents and Advanced Workflows Right now, SES retrieves files from clients. But in the near future, it hopes to roll out GoAnywhere Remote Agents and GoAnywhere Advanced Workflows for customers who want zero involvement in the file transfer process. With these features enabled, Sweet and his team will be able to pull data from each client when needed without requiring manual work or engagement on their end. "Remote agents and advanced workflows will enable us to go out, talk to, and pull the requests for daily, weekly, or monthly file transfers," Tom explained. One Admin, One Product Tom Sweet has used GoAnywhere for four years. As the main product administrator, he’s always looking for new ways to implement the software, integrate it with other web and cloud services, roll it out as part of security-client processes, and improve the success of GoAnywhere at SES. "I want to get as much out of the product as I can," Tom said, reflecting on being the singular admin for GoAnywhere. "The more I push it out, the more we get a better return from our customer experience." And for any organisation — SES included — customer satisfaction is top priority. GoAnywhere’s encryption, automation, and ease of use help make that happen. Previous Next

  • Email Overload Creating Cyber Complacency in Australia | GSA

    < News Email Overload Creating Cyber Complacency in Australia 23 Oct 2024 Australians send and receive 8.1 billion emails each day. That makes us the 10th most prolific emailers in the world. And that’s a problem . It’s not just the inbox clutter we’re experiencing (or perhaps, contributing to). It’s the cyber security complacency it’s creating. You see, email continues to represent the single biggest threat to your organisation’s cyber security. The more emails we receive, the greater the risk that a cybercriminal will gain access to your organisation’s data and secrets. Proven Danger Real world tests have proven that the threat posed by Australians’ “email encumbrance” is real. Proofpoint conducted 183 million phishing simulations earlier this year. They observed that almost one in six recipients of a suspicious phishing email failed to protect their organisation’s valuable data. Recipients variously clicked malicious links, succumbed to a bogus password reset, or downloaded ransomware. What leads employees to fall for phishing and malware…? It’s “breach fatigue” – employees who have become complacent and careless about cybersecurity. Cyber Complacency Professor Sanjay Jha, UNSW Lead of the Cybersecurity Cooperative Research Centre, said: “It’s human nature that you start to just get used to certain things. (But) phishing attacks continue. In fact they are getting ever more innovative.” He urged companies to do more to keep personal data safe from hackers. “The problem is that ICT systems are very complex and every day new applications are deployed, and new information is stored and exchanged.” Whole-of-Enterprise Email Protection With escalating email volumes creating a high and persistent risk of cyber incursion, organisations need a systematic way for employees to securely and reliably exchange files and emails with external third parties. Thankfully, there are technical safeguards you can put in place to prevent your employees from accidentally - or negligently, or maliciously - allowing cyber criminals in. Not only will they help protect your organisation from cyber criminals, as a bonus, they’ll also improve your employees’ efficiency. Our SFT Threat Protection Bundle enables your organisation’s email system to automatically detect and prevent phishing links and other malware from entering your organisation. Better still, it can also automatically detect and prevent employees from sharing malware or sensitive information. Active Threat Protection If an employee - knowingly or unknowingly - attempts to share a file containing malware, the files are intercepted and “sanitised”. That is to say: their malicious elements are automatically removed. The SFT Threat Protection Bundle can also go a step further and automatically detect and prevent employees from sharing sensitive information. For example, let’s say a folder has Word or PDF documents, or Jpeg images, which contain Personally Identifiable Information. If an employee attempts to transmit any of these files, a secure ICAP gateway will automatically inspect and block the transfer. Or if you prefer, the gateway can be configured to automatically redact (i.e. mask out) sensitive information from documents and image files while still permitting the remainder of the file to be shared. Free Demonstration If you’d like to see first-hand how our SFT Threat Protection Bundle can help keep your organisation’s data safe, and help beleaguered employees keep their guards up, why not get in touch and have an obligation-free chat with me? At Generic Systems Australia , we’re your local experts in secure managed file transfer. PS: In the three minutes it took you to read this article, almost a billion new emails were sent around the world - many of them to and from Australians! Previous Next

  • How We Became Mr Fixit to Solve a Customer’s ERP Problem | GSA

    < News How We Became Mr Fixit to Solve a Customer’s ERP Problem 10 Sept 2025 While GoAnywhere is at core a Managed File Transfer solution, its many advanced features make it useful in lots of other ways. Take, for example, the way we were able to use it to help one of our customers wrestling with deficiencies in their ERP system. FMCG Fix This customer — a well-regarded manufacturer of perishable fast moving consumer goods — is critically dependant on legacy ERP software to accept, analyse and prepare invoices for incoming customer orders. Their ERP system aggregates these orders and alerts suppliers to the quantities of ingredients necessary for the business to fulfil each day’s orders. It also invoices customers for the orders they’ve placed. However, our customer was experiencing an increasingly prevalent problem. Their ERP software was mishandling orders and invoices where customers had changed their mind and amended their order after they’d already been invoiced. Every time the ERP system mishandled one of these amended orders, our customer’s dispatch staff would need to have an IT department colleague manually fix the problem. This was taking 20 minutes each time. And as their business continued to grow, what had once been a minor inconvenience was turning into a major time sink and drain on efficiency. Worse, not only were the manual order corrections wasting more and more valuable employee time, but sometimes, suppliers found themselves unable to provide the additional quantities of ingredients requested too late in the day. Overseas vendor – underdone service Of course, our customer’s first call was to their global ERP software vendor. However, that vendor wouldn’t commit to fixing the deficiency in their software until a future version release, many months away. Our customer needed a workaround until then. GoAnywhere to the Rescue Our customer called us to see whether we could help. And, being locally available and committed to providing excellent customer support, we found a way to do so — quickly! Our expert technician was able to cleverly leverage GoAnywhere’s advanced flexibility in an unexpected way. His solution lay in a novel use of GoAnywhere’s “Secure Forms” functionality. Secure Forms Briefly, GoAnywhere’s Secure Forms enable a business to collect sensitive data and files through customisable, web-based forms, securely transmitted via HTTPS. These forms can be tailored with specific input fields, labels, and file upload components. When submitted, these Forms trigger a GoAnywhere Project — an automated workflow which processes the input, handles file transfers, and returns output files or confirmation messages to users. They streamline data intake, reduce reliance on email or fax, and ensure secure, standardised submissions easily usable by other IT systems. Our technician was able to utilise GoAnywhere’s Secure Forms because they use JDBC (Java Data Base Connectivity) to transfer data from a variety of IT systems to SQL databases. That’s a commonly used kind of database, and unsurprisingly, was the kind of database used by our customer’s legacy ERP system. We were able to leverage GoAnywhere’s functionality to automatically update pricing and order quantities and recalculate totals, enabling invoices to be correctly amended and re-processed. It took us just a few days to design, test and implement this fix. And our happy customer was able to get on with what they were best at: growing their business and creating ever more happy customers of their own! Here to Help At Generic Systems Australia we’re on the ground in your time zone and ready to help your Australian or NZ organisation take advantage of GoAnywhere MFT’s incredibly flexible capabilities. As experts in Managed File Transfer solutions, we’ve assisted businesses of all sizes to protect their customer data and secure their file transfers, keeping their operations running smoothly. If you’d like to discuss how we can help you, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how simply we can help you. Previous Next

  • Accidental Accomplices…? | GSA

    < News Accidental Accomplices…? 21 May 2024 Are your employees your organisation’s biggest cybersecurity threat…? A recent experiment has found that many employees are still prone to leaving sensitive information vulnerable to cyberattacks - even when dealing with emails from an unknown sender. Testing the responses of employees around the world, Fortra found that 10.4% clicked a bogus message’s phishing link - up 3.4% over a similar test in the previous year. Global Worst Practice Alarmingly, the problem is worse in our region than anywhere else in the world, with 14.9% of Asia-Pacific employees succumbing to the phishing attempt. Also shocking was the number of bogus link clickers who then disclosed their passwords. 6 out of every 10 end users who clicked on the phishing email links failed to recognise the phishing website and exposed their organisation to cybertheft by sharing their password. The results of the experiment demonstrate the serious ongoing threat to local organisations posed by employees who are either uneducated on cybersecurity threats, or unmotivated to mitigate those risks. Protecting Your Organisation from Accidental Accomplices Clearly, ongoing employee education must be part of your defensive posture. But there are also key technical safeguards you can put in place to prevent your employees from becoming accidental accomplices to cybercriminals. Our SFT Threat Protection Bundle enables your organisation’s email system to automatically detect and prevent phishing links and other malware from entering your organisation. Combining the layered strengths of GoAnywhere MFT and Clearswift, it enables your team to receive and share information securely, without impairing their productivity. How It Works The SFT Threat Protection Bundle seamlessly integrates managed file transfer with advanced threat protection and adaptive data loss prevention to keep your sensitive data secure. It not only prevents malware from entering your organisation, it also prevents employees from losing or mishandling data. For example, if an employee knowingly (or unknowingly) attempts to share any files containing malware, those files are sanitised by having the malicious elements automatically removed. The SFT Threat Protection Bundle can also automatically detect and –– if you configure it to do so –– prevent employees from sharing sensitive information. For Example Let’s say a folder contains Word or PDF documents or Jpeg image files which contain Personally Identifiable Information (PII). If an employee starts to load any of these files into the Secure File Transfer web client, the Clearswift secure ICAP gateway will automatically inspect and block the file. If you prefer, the gateway can automatically redact (i.e. mask out) sensitive PII information from documents and image files, while still enabling the remainder of the file to be shared. Free Demo If you’d like to see first-hand how the SFT Threat Protection Bundle can help keep your organisation’s data safe, get in touch with me, Bradley Copson, and my technical team at Generic Systems Australia. We’re your local experts in secure managed file transfer. And if you’d like a copy of Fortra's Phishing Study Report, including broader advice on how to address your cybersecurity challenges – I’ll be more than happy to send you a copy. #mft #managedfiletransfer #sft #securefiletransfer #cybersecurity Previous Next

  • Increased 3rd Party Data Sharing Increases Data Theft Risk | GSA

    < News Increased 3rd Party Data Sharing Increases Data Theft Risk 29 July 2024 The inability to track, control and report sensitive content shared with external contacts is a substantial risk for modern enterprises. And that risk appears to be rapidly escalating, as two-thirds of organisations each exchange sensitive data with more than a thousand third parties. These are some of the key findings from a survey conducted recently by Kiteworks, a US-based data security firm. Sensitive Content Kiteworks defines “sensitive content” as the wide variety of content commonly targeted by cyberthieves. It’s content which poses a significant threat to an organisation once bad actors get their hands on it. Sensitive content includes the data of customers and employees — personally identifiable information (PII), protected health information (PHI), and payment card industry (PCI) data. It also includes an organisation’s intellectual property (IP), legal communications and documents, financials, mergers and acquisitions data, and other types of private and confidential information. Kiteworks says that the key problem with sensitive content is how it does not stay in one place. During daily operations, it is shared not only among employees, but also with partners, suppliers, contractors, legal counsel, accountants, auditors, and more. More Comms Channels = More Risk Efficient organisations are always searching for more “frictionless” ways to move their data. However, as their number of communication channels with external parties grows, so too does the potential opportunity for bad actors to intercept and steal the data. That escalating risk is borne out by Kiteworks’ analysis. They found that organisations with more than seven communication tools experience ten plus data breaches, which is 3.5 times higher than the aggregate of those experiencing one to ten breaches. File Size Limits Exacerbate Risks The file size limits imposed by many content communication tools are a key contributor to the risks of moving data. Frustrated employees simply trying to do their jobs will sometimes use insecure and unauthorised consumer-grade file sharing services to bypass organisational limitations. Even for those employees who always follow the rules, the resulting workarounds can trigger significant waste of staff time. More than 30% of organisations surveyed by Kiteworks needed to implement workarounds due to file size limits for email, file sharing, and managed file transfers over 50 times per month. Around 10% said they must do so over 100 times per month. IT Teams Stepping Up Switched-on IT teams are increasingly focused on addressing their organisation’s need to protect sensitive content. A popular solution is to unify communication tools and channels to secure sensitive content communications. Their primary drivers for change may vary – from protecting intellectual property and corporate secrets to mitigating litigation, avoiding regulatory violations and protecting their brand reputation – but the way they are addressing these risks is similar… Control Through Consolidation Consolidating communication tools onto a single platform needs to be a foundational element of an organisation’s cyber defences. By reducing the number of disparate tools used for content communication, they can significantly lower the risk of data breaches and improve operational efficiency. Kiteworks’ survey shows that organisations with fewer communication tools experience fewer breaches. Tool consolidation significantly enhances security. MFT Consolidates, Automates, Improves Efficiency Managed File Transfer (MFT) software is a powerful technology which comprehensively addresses the risks and challenges of moving information within an organisation, and with external suppliers, partners and customers. MFT simplifies the complexities of data transfer by offering centralised control, encryption, and auditing capabilities. A significant advance on traditional approaches, MFT provides enhanced security protocols, ensuring data privacy during transmission and storage. And it does so via a user-friendly interface, which is easy to use for even non-technical employees. In addition to consolidating the plethora of disparate data exchange channels employees create during an organisation’s evolution, MFT technology provides an array of organisation advantages: Security: MFT employs robust encryption algorithms, reducing the risk of data breaches during transit. Features like Access Controls, and Multi-factor Authentication, safeguard sensitive information from unauthorised access. No Size Limit Straitjacket: The best MFT solutions enable organisations to set file size limits appropriate to their teams’ needs. They also offer “persistence protocols” which ensure large files are fully transmitted to their intended destinations. Efficiency: MFT automates repetitive tasks. This not only reduces human error, it saves significant staff time. Through scheduling of file transfers, monitoring of progress, and automatic error-handling, it enables a significant boost to operational efficiency. Compliance: In industries with strict regulatory requirements, MFT helps companies meet compliance standards (e.g. HIPAA and GDPR) by automatically maintaining detailed logs and audit trails. Scalability: Through its ability to handle large file transfers and an ever-growing number of users, MFT is able to grow in sync with an organisation's needs, while maintaining superior performance. Collaboration: In addition to improving business processes within an organisation, MFT facilitates seamless collaboration with external partners, suppliers, and customers, fostering strong relationships built on shared trust and reliability. The Best MFT At Generic Systems Australia, we recommend the industry’s class-leading MFT solution, GoAnywhere MFT . GoAnywhere is consistently declared by independent experts to be the best-in-class MFT solution. Besides achieving the highest overall score in the MFT category, GoAnywhere is also ranked highest for Vendor Capability Satisfaction, including the key dimensions of: • Business Value Created • Breadth of Features • Quality of Features • Product Strategy and Rate of Improvement • Useability and Intuitiveness • Vendor Support • Ease of Data Integration • Ease of Customisation • Availability and Quality of Training, and • Ease of Implementation GoAnywhere MFT's combination of versatility, security, ease of use, and budget-friendliness has propelled it to the top of the MFT market. Gain Expert Local Advice At Generic Systems Australia , we’re Australia’s and the Asia-Pacific region’s experts on MFT in general, and GoAnywhere in particular. If you’d like an obligation-free discussion about how we could help you keep your organisation’s sensitive content safe, please feel welcome to get in touch . We’re always happy to have an obligation-free discussion, and even offer a free Proof of Concept. Previous Next

  • Ransomware payments no guarantee | GSA

    < News Ransomware payments no guarantee 3 Oct 2025 Paying a ransomware demand is no guarantee that your precious business data will be restored. Research by Veeam found that fewer and fewer companies are actually getting their data back after a ransomware attack. For them, paying the ransom merely makes the full cost of business recovery even greater. Veeam found that only about a third of businesses who paid up recovered their data, down from around half in the prior year. The number of organisations who were able to recover their data without paying up in the same time period was just under a third. Ransomware accounts for 11% of cyber attacks reported to the Australian Signals Directorate (ASD). As of 30 May this year, Australian businesses with an annual turnover of more than $3M must report any ransomware or cyber extortion payments to the government within 72 hours of making the payment or becoming aware of it. At Generic Systems Australia we have decades of experience helping local businesses keep cyber thieves at bay through deployment of the world’s best MFT, GoAnywhere . If you’d like a no-cost, no-obligation discussion about how we could help you, please feel welcome to get in touch with me. Previous Next

  • What is ‘MFT’ ... and why should you care | GSA

    < News What is ‘MFT’ ... and why should you care 19 Oct 2023 What is ‘MFT’ - and why should you care about it? In today's data-driven world, the seamless and secure exchange of information is key to business efficiency. Managed File Transfer (MFT) is a powerful technology that comprehensively addresses the risks and challenges of moving information, both within an organisation, and with external suppliers, partners and customers. At its core, Managed File Transfer simplifies the complexities of data transfer by offering centralised control, encryption, and auditing capabilities. Unlike traditional approaches, such as FTP, MFT provides enhanced security protocols, ensuring data privacy during transmission and storage. And it does so via a user-friendly interface, which is easy to use for even non-technical employees. Organisations adopt MFT technology for the many benefits it provides. Security: MFT employs robust encryption algorithms, reducing the risk of data breaches during transit. Features like Access Controls, and Multi-factor Authentication, safeguard sensitive information from unauthorised access. Efficiency: MFT automates repetitive tasks. This not only reduces human error, it saves significant staff time. Through scheduling of file transfers, monitoring of progress, and automatic error-handling, it enables a significant boost to operational efficiency. Compliance: In industries with strict regulatory requirements, MFT helps companies meet compliance standards (e.g. HIPAA and GDPR) by automatically maintaining detailed logs and audit trails. Scalability: Through its ability to handle large file transfers and an ever-growing number of users, MFT is able to grow in sync with an organisation's needs, while maintaining superior performance. Collaboration: In addition to improving business processes within an organisation, MFT facilitates seamless collaboration with external partners, suppliers, and customers, fostering strong relationships built on shared trust and reliability. Managed File Transfer technology offers organisations a secure, efficient, and scalable solution for their data transfer needs. By leveraging MFT, businesses can not only streamline their operations but also gain a competitive edge, while ensuring the integrity and confidentiality of their data in today's interconnected digital landscape. Generic Systems Australia is the Asia-Pacific region’s leading provider of secure MFT solutions. If you’d like to explore how your organisations’ efficiency and bottom line could be boosted through MFT technology, please feel free to contact our Business Manager, Bradley Copson, ( bradley@gensys.com.au ) for an obligation-free discussion. Previous Next

bottom of page