top of page

Search Results

172 results found with an empty search

  • How GoAnywhere integrates with your Hybrid Cloud | GSA

    < News How GoAnywhere integrates with your Hybrid Cloud 2 Oct 2025 ! Widget Didn’t Load Check your internet and refresh this page. If that doesn’t work, contact us. Previous Next

  • SES Encrypts and Audits Global Client Data | GSA

    < Case Studies SES Encrypts and Audits Global Client Data Decad es of experience helping Asia-Pacific customers have established Generic Systems Australia as our region’s local experts in secure managed file transfer. In this case study, we share how global experts in operational resilience – SES – take advantage of GoAnywhere MFT , the world’s leading MFT solution , to manage the transfer of more than 2,000 files daily. Software escrow agreements are becoming increasingly common for organisations worldwide. Medium and large enterprises, especially those in retail, energy, and financing, rely on these agreements to provide coverage for the unique source code, files, and other software assets critical to a company’s intellectual property. To prevent loss of this information during sudden downtime, a data breach, or natural disaster, organisations create a software escrow agreement with a third-party vendor to protect and back up their data. The third party then takes the data, creates an inventory of everything that’s to be escrowed, and puts the source code and other assets into a vault for maximum protection. SES is a third-party vendor that provides software escrow agreements, intellectual property protection, and cybersecurity risk management globally. Based in Manchester, UK, SES has more than twenty years of experience providing security to more than 2,500 professionals in 40+ countries. "Dealing with software escrow agreements is our bread and butter," said Tom Sweet, Information Security and Systems Manager at SES. It’s an area of constant growth and adjusting to keep clients happy and source code regularly updated. We are continually developing and innovating.” Often, SES does this with tools such as GoAnywhere MFT. For SES, GoAnywhere Managed File Transfer (MFT) has been a well-used and finely-tuned addition to its cybersecurity solutions. With the software in place, it performs on average nearly 2,000 uploads for clients per day — a mix of small and large files — as well as help monthly and quarterly businesses with their source code deposits. Switched from Manual File Transfers to Managed File Transfer Before GoAnywhere came into the picture, SES used a web gateway, an AWS-backed instance, to receive source code for its clients. It also occasionally used old-fashioned file transfer methods: physical disks and SD cards that were tracked, signed for, and had a direct chain of custody which could be followed. While this mixed process — AWS-backed instance and physical mail — worked at the time, it still lacked the ability to track user and file transfer activity. Having an audit trail was important to the business. When auditing also became a client requirement, SES looked for a way to streamline, structure, encrypt, and audit the exchange of data. SES handled a high volume of file transfers and needed robust security practices for the data it processed and stored every week. So the it was time to find a centralised solution which could do all of this and meet its trading partners’ needs. The tracked-and-signed file transfer processes SES used led to an evaluation of GoAnywhere MFT, a robust and fast-growing product which used similar techniques (tracking, signing, and a clear chain of custody) for sensitive file transfers. GoAnywhere was a hit. It took Tom Sweet mere days to learn the product. He attended two webinars, then jumped in and followed his intuition. The turnaround had to be quick, but the learning curve was straightforward. SES implemented GoAnywhere across its Linux systems and has depended on it ever since for day-to-day file transfers, streamlined encryption, and consistent auditing. Benefit#1: File Encryption and Security With GoAnywhere fully implemented, SES has been able to ensure all file transfers sent by its clients are encrypted in transit and sent to the right place. SES has also ensured that encryption keys are held separately. These are just two of the strict requirements SES needs to follow for its clients in order to stand out in a sea of escrow and backup service platforms. "It’s risk versus security," Tom said. "With HR and payroll data, the risk is high, so the security needs to be high as well."nearly 2,000 uploads for clients per day — a mix of small and large files — as well as help monthly and quarterly businesses with their source code deposits. Benefit#2: Fast File Transfer & Trading Partner Setup New trading partners and file transfer users can be set up in minutes. "Less than that if I’m rushed," Tom said. "The quickest ones we’ve had people test: I’ve sent the email saying here’s your username, sent the password out over SMS, and people test the log-in within 10 minutes." Sweet uses private and public keys to ensure the encryption and validity of the new transfers he creates. When the file transfers are executed, most run, start to finish, in less than 30 minutes. Benefit #3: Ease of Use & Automation "The main thing we use GoAnywhere for is managing users, auditing the logs, and giving users a secure gateway into our systems that would normally be firewalled," Tom, said. All of this is simple with GoAnywhere, and he believes the product’s biggest strength is its ease of use. Whether he needs to streamline, update, or re-deploy the product across systems and users, the process has been painless. Automation is another huge benefit of GoAnywhere. SES use GoAnywhere to do the heavy lifting for SaaS-based clients. These clients transfer large amounts of source code end data that are pushed into a SaaS escrow and captured in real time. "We help these clients configure a script that connects over SFTP to a GoAnywhere service," Tom said. "GoAnywhere then audits those transfers." The product securely transfers and audits at the same time, all automatically for nearly 60 clients who need their source code updated on a daily or monthly frequency. This enables SES to automate on Windows and Linux to meet the security requirements of each client. GoAnywhere’s granular security controls enabled Sweet to make GoAnywhere as safe and security-driven as possible against internal risks and user errors. "I stripped it back to who can do what," he said. Previously shared passwords were locked down. Web users were restricted to only the areas of the product they needed, and file storage was controlled — files could only be stored in the right areas of the network. "If someone in a company wanted access to the transfers, or to the systems, they could break the loop to that cycle. So that’s why we vault [client data] and back it up in an encrypted format. We make sure the file transfers are encrypted; that’s key too." Benefit#4: Regulation Compliance Many SES clients have compliance requirements which SES must meet. To achieve these needs, SES has applied ISO 27001 compliance across all clients to ensure all information sent between SES and other companies is secure. "ISO 27001 mandates that we create policies, processes, and procedures which we can prove using evidence-based systems," Tom said. "This says, ‘Okay, by default, you [the client] get all of this [security]. All files will be encrypted, and all second factor messages will be sent out-of-band so they aren’t sent over the same method of communication, and so on." Meanwhile, while encryption is the same and applied for everyone, clients can choose if they want to use multi-factor authentication (MFA) with passwords or SSH keys for an extra layer of security. GoAnywhere offers multi-factor authentication methods, including keys and certificates, for increased file protection. SES also uses GoAnywhere to encrypt every backup of escrow data that is then kept in offline vaults. "This ensures there’s 99.9% availability," Tom said. "No one thinks escrow is important until it’s too late," he added, so SES provides these offline backups with GoAnywhere’s help to give organisations peace of mind. Benefit#5: Auditing and Administration One of the biggest justifications for purchasing GoAnywhere was its auditing functionality. Tom and his team uses these audit logs to see who is connecting to their SFTP servers, what they’re doing on those servers, and how much they’ve done. This level of detail is critical, especially when dealing with sensitive escrow documents, software assets, and source code. "The log-in and auditing process in GoAnywhere is important for our information security standards. We audit the transfers not just to be able to take them securely, but also to prove who has been on and transferred what and when. The audit trail is important." If Sweet needs to change something, GoAnywhere makes it easy. Admins can make modifications or adjustments to their processes to keep constant with security requirements. "We can do this with GoAnywhere very easily," he said. "Then we just send out a new host key to our clients." What’s Next: Remote Agents and Advanced Workflows Right now, SES retrieves files from clients. But in the near future, it hopes to roll out GoAnywhere Remote Agents and GoAnywhere Advanced Workflows for customers who want zero involvement in the file transfer process. With these features enabled, Sweet and his team will be able to pull data from each client when needed without requiring manual work or engagement on their end. "Remote agents and advanced workflows will enable us to go out, talk to, and pull the requests for daily, weekly, or monthly file transfers," Tom explained. One Admin, One Product Tom Sweet has used GoAnywhere for four years. As the main product administrator, he’s always looking for new ways to implement the software, integrate it with other web and cloud services, roll it out as part of security-client processes, and improve the success of GoAnywhere at SES. "I want to get as much out of the product as I can," Tom said, reflecting on being the singular admin for GoAnywhere. "The more I push it out, the more we get a better return from our customer experience." And for any organisation — SES included — customer satisfaction is top priority. GoAnywhere’s encryption, automation, and ease of use help make that happen. Previous Next

  • A Missing Piece in Your Cyber Security Strategy? | GSA

    < News A Missing Piece in Your Cyber Security Strategy? 26 Mar 2024 Is Secure Managed File Transfer a “missing piece” in your company’s Cybersecurity Strategy? The Australian Federal Government has set its sights on making Australia a world leader in cybersecurity by 2030 and is currently drafting upgraded cybersecurity regulations. In the industry consultation period just ended, they flagged new cybersecurity legislation and amendments to the Security of Critical Infrastructure Act which would include: Secure-by-design standards for the Internet of Things; Mandatory ransomware reporting; and Upgraded protection for and risk management of critical corporate infrastructure. The new legislation reflects comments made by Attorney-General, Mark Dreyfus, in the aftermath of the 2022 Optus hack. He said “We need better laws to regulate how companies manage the huge amount of data they collect, and bigger penalties to incentivise better behaviour. (E)xisting safeguards are inadequate. It’s not enough for a penalty for a major data breach to be seen as the cost of doing business.” With new legislation — and much bigger fines — imminent, now is the time to plug any potential gaps in your organisation’s cybersecurity strategy. Protect Your Data, Not Just Your Network Increasingly frequent cyber incidents prove that cybersecurity is not keeping pace with cyber threats. According to Forbes, “Companies keep pouring tons of money into protecting their network… but the real crown jewels are in the data that sits behind the network walls. That data is often not protected." It’s not enough to lock the door. An organisation’s crown jewels should also be kept in a vault. This ensures that, even if a hacker gets inside, they won’t be able to exploit the data they find. The vault is encryption. And the security guard that puts the jewels in the vault is Managed File Transfer (MFT). How MFT Secures Your Data To be truly secure, data must be protected not only when it’s stored, but also while it’s enroute to and from storage . MFT solutions such as the class-leading GoAnywhere MFT encrypt data at rest and in transit, complying with the highest data security standards across the US and Europe (e.g. HIPAA, HITECH, PCI DSS, SOX, and the GDPR). MFT manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols such as SFTP, FTPS, and AS2 to send files securely, and encryption standards such as Open PGP and AES to protect data in transit and at rest. The "Managed" in MFT MFT software automates and streamlines the exchange of data for you, reducing manual processes and eliminating the need for any legacy tools and scripts you might currently be using. Data (including documents, images, videos, and other files) can also be exchanged via MFT across your private networks, systems, applications, partners, and cloud environments from a single point of administration. More than Transfers MFT software isn’t only for sending files between users and systems. It can also automate business processes, ensure secure connections, track file transfer activity, and more… File Encryption GoAnywhere MFT employs integrated encryption technologies to secure sensitive data. It also includes a key manager which enables you to create, import, export, and manage your keys and certificates within the product. Automation User errors and manual processes can also cause data breaches. By automating the encryption and exchange of sensitive files, processes and workflows can run without user intervention — especially useful when dealing with a high volume of file transfers. Email Enhancement GoAnywhere MFT offers a secure email module which allows users to send one-off file transfers securely, through a HTTPS connection. Cloud Connections MFT can help you build better connections between your network and web/cloud applications. GoAnywhere MFT offers built-in cloud integrations with applications such as Dropbox, SharePoint, and JIRA, and popular cloud services including Amazon, Google and Azure. Auditing & Reporting GoAnywhere MFT provide audit reports to meet compliance needs. All file transfer and administrator activity is stored and easily searchable. For organisations that need to report on file transfer activity to remain compliant with regulations and laws, the audit logs can be automatically generated and distributed as PDF reports. These are just some of the many MFT features which can help you protect your files. Plugging in the Missing Piece With the Federal Government soon to unveil its new cybersecurity legislation, now is the time to get ahead of requirements and explore how MFT can enhance your data’s security at rest and in motion. Arrange a free MFT trial and see how it works in your organisation. The benefits are almost immediate, from file transfer automation to solid data encryption. A data breach need not be a given for your organisation. By adding the missing MFT piece to your Cybersecurity Strategy, your valuable data can remain out of reach of cyberthieves. If you’d like to discuss how MFT can complete your organisation’s Cybersecurity Strategy, please feel welcome to contact us . We’re always happy to have an obligation-free discussion, explain how quickly and easily we can transition your organisation to the class-leading MFT solution, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , We’re Your Local Experts in Secure Managed File Transfer! Previous Next

  • Phishing Surges on the Back of QR Codes | GSA

    < News Phishing Surges on the Back of QR Codes 17 July 2025 New research published by the Anti-Phishing Working Group (APWG) shows that phishing attempts have surged to levels not seen since late 2023. QR codes are increasingly the attack vector of choice. Each day, millions of emails are sent containing QR codes that lead consumers to phishing sites and malware. Q1 Lowlights · APWG observed a total of 1,003,924 phishing attacks in the first quarter of 2025 - the largest number of attacks per quarter since late 2023. · Attacks against the online payment and financial sectors grew in Q1 2025, comprising 30.9% of all attacks. · The total number of wire transfer Business Email Compromise (BEC) attacks increased by 33% in Q1 2025 compared to the previous quarter. Most Targeted Industries The SaaS/Webmail sector was the most targeted industry by cyber attackers in Q1 2025, making up almost 18% of the total attack volume. The financial industry also continues to be a highly attractive sector for cyber threat attackers, with Payment, Banking, and Crypto contributing to approximately 33% of all phishing attacks in Q1 2025. QR Codes Popular QR code attacks occur when an adversary leverages QR codes to social engineer a user, such as redirecting a victim to a phishing website or to download a malicious attachment. QR codes are becoming an increasingly popular phishing tactic due to the various features they offer. Cyber attackers have been observed taking advantage of QR code features in the following ways: · The availability of free QR code generators facilitates phishing attacks due to decreased financial costs of infrastructure, and free services tend to have less resources dedicated to takedowns of legitimate service abuse and other malicious activity. · Attackers can combine QR codes with URL shorteners to obscure the true destination of the URL and thereby direct victims to malicious sites. Certain industries tend to be more prone to QR code attacks, such as Retail & Wholesale, as consumers have adapted to relying on QR codes to access these services. Burgeoning BEC APWG member Fortra tracks the identity theft technique known as “business e-mail compromise” (BEC). BEC was responsible for A$4.3B in losses in 2024 according to the IC3. In a BEC attack, a threat actor impersonates an employee, vendor, or other trusted party in an email communication and attempts to trick an employee into sending money, privileged information, or some other asset. · During the first quarter of 2025, gift card scams were once again the most popular scam type, making up more than half the total number of attacks. · The total number of wire transfer BEC attacks observed by Fortra in Q1 2025 increased by 33% compared to the previous quarter. · The average amount requested in wire transfer BEC attacks in Q1 2025 was A$65,000. · 72% of BEC attacks in Q1 2025 were launched using a free webmail domain. · Remcos RAT was the most common malware payload Fortra observed in Q1 2025. Protection Against Phishing Our SFT Threat Protection Bundle enables your organisation’s email system to automatically detect and prevent phishing links and other malware from entering your organisation. Combining the layered strengths of GoAnywhere MFT and Clearswift, it means your team can receive and share information securely, without impairing their productivity. Seamlessly integrating managed file transfer with advanced threat protection and adaptive data loss prevention, SFT Threat Protection not only prevents malware from entering your organisation, but it also prevents employees from losing or mishandling data. For example, if an employee knowingly –– or unknowingly –– attempts to share any files containing malware, those files are sanitised by having the malicious elements automatically removed. It can also automatically detect and –– if you configure it to do so –– prevent employees from sharing sensitive information. Local Help on Hand Generic Systems Australia has decades of experience helping Australian and New Zealand organisations protect themselves against phishing and other cyber attacks by leveraging the power of the world’s leading MFT solution. Our Migration Service makes the transition even easier for organisations who prefer to use their resources building their businesses rather than improving their IT plumbing. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch with us. At Generic Systems Australia, we’re your local experts in Secure Managed File Transfer. Previous Next

  • Rate Rise Should Spur Rethink | GSA

    < News Rate Rise Should Spur Rethink 13 Nov 2023 Following the Reserve Bank’s decision to further hike interest rates, it’s timely for business leaders to explore how they can minimise any negative impacts on their companies. Rowan Tracey, Partner at HLB Mann Judd , Australian businesses would need to “find efficiencies and cut operating costs”. “The Reserve Bank’s decision … will impact business margins, particularly small to medium businesses with high debt and low capital. The natural reflex for businesses is to raise prices to even out the balance sheet, which would be fine in a more buoyant economy. (But) rising fuel prices and cost of living already has many scrambling to find ways of cutting costs, including their current expenditure.” Rowan offers these alternative suggestions to businesses wanting to maintain margins without imposing price hikes: 1. Improve Productivity & Efficiency: Review processes and output and look at ways to improve or streamline your operations, such as automation of processes including business software. 2. Strategically Cut Costs: Review your current service providers and contracts and compare to the current market. 3. Revisit Your Banking & Financial Products: Look beyond the short-term and make sure the interest rate on your business loans is competitive. 4. Develop a Pricing Strategy : Look at ways to leverage or bundle existing goods and services. 5. Reconsider Your Supply Chain : Consider reducing risks by finding a domestic supplier to slash the costs of freight and storage. 6. Review Workforce Arrangements: Consider offering flexible work arrangements, nine-day fortnights, and training and development opportunities - particularly those subsidised by government. One way to address Item #1 (“Improve Productivity and Efficiency”) is to reconsider how your business transfers data. Moving data – between employees, with customers, and with your supply chain partners – is now a “core process” for every modern business. That makes it a target for improving efficiency and productivity. A Managed File Transfer solution, such as GoAnywhere MFT, is more cost-effective and efficient than having your staff waste time on old-fashioned and risky manual approaches. In fact, a study by Aberdeen Group found that businesses which invested a little in a professional Managed File Transfer solution had a median return of almost 500 times their investment! Generic Systems Australia are your local experts in file transfer technologies. Contact me if you’d like an obligation-free discussion , no cost trial, or Proof of Concept showing how GoAnywhere could boost your business’s productivity. Previous Next

  • Cyber Security and The Illusion of Invisibility | GSA

    < News Cyber Security and The Illusion of Invisibility 18 Aug 2025 When it comes to cyber theft, the bigger the firm, the bigger the headline. Optus, Medibank, Qantas, Latitude Financial, and the ANU… all of these high-profile Australian organisations have endured unwelcome time in the spotlight after mishandling their customers’ data. Widespread public familiarity with their brands, as well as their large customer bases, made them more prone to negative media attention when their cyber security lapsed. Smaller businesses – equally big targets The media’s focus on the cyber travails of large organisation can inadvertently create a false sense of security among medium and smaller organisations. That is, because there’s barely any media coverage of cyber theft from less well-known organisations, medium and small companies can be lulled into dangerous complacency about just how vulnerable and targeted they are. The reality is that medium and smaller organisations are prime targets for hackers. Illusion of Invisibility Because they’re not in the headlines, many medium and smaller businesses assume they’re “flying under the radar” as targets for cyber criminals. However, that’s exactly what makes them appealing targets. Hackers reason that medium and smaller firms likely lack the hardened defences of larger organisations – while still harbouring significant and attractive amounts of sensitive customer data. Stats tell Story Statistics from the most recent Annual Cyber Threat Report from the Australian Signal Directorate (ASD) add further perspective to the comparative threat. Last year, more medium-sized businesses reported “Extensive Compromise” cyber attacks than large businesses. The same was true in the next lower category of cyber severity, “Isolated Compromise”. Tellingly, large organisations reported more than three times the rate of success in repelling low-level malicious attacks vs medium-sized organisations. A further alarming insight is that the average financial loss incurred by medium-sized organisations due to cybercrime was almost identical to the average financial loss for large organisations. Smaller Size, Larger Vulnerability The 2024 Sophos Threat Report found that the sophistication of cyberthreats faced by small to medium organisations is often on par with those used to attack large enterprises. In forums on the dark web where cyber criminals trade tips, it’s been said that the spoils from breaching a larger number of medium-sized organisations more than offsets the returns from less frequently successful attacks on large organisations. Sophos found that organisations with fewer than 500 employees were more vulnerable to cyber criminals. Underinvestment in cybersecurity, generally smaller information technology budgets and sometimes, less-experienced IT staff or outsourced providers, all contributed to this heightened vulnerability. Sophisticated Threat Landscape The cybercriminal ecosystem has evolved rapidly to become ruthlessly efficient. Mirroring the legitimate economy, it now features specialised roles and skillsets, intermediaries and brokers, and sophisticated black market networks to facilitate transactions. Ransomware-as-a-service (RaaS) groups lease their code to affiliates, and Business Email Compromise (BEC) schemes exploit social engineering techniques to bypass technical protections. Infostealers quietly exfiltrate login data, payment card info, and browser-stored credentials before victims even realise that anything’s awry. Stepping Up Safeguards Businesses need to similarly evolve their safeguards. Spam filters and firewalls are no longer enough. The key to successfully defending against encroaching cyber threats is to use a multi-layered strategy which includes robust data transfer protection, phishing campaign detection, prevention of credential harvesting, employee training, and mitigation against BEC attack by analysing behavioural anomalies and sender authenticity in real time. A Secure Managed File Transfer solution such as the class-leading GoAnywhere MFT addresses the many risks of ad hoc techniques through a holistic approach to security, including: Automatic authentication, encryption and decryption User access controls Auditing and Reporting Continuous updates on the evolving threat landscape, and Industry standards compliance. A further defensive layer - our Advanced Threat Protection Bundle - can mask, remove, or permit Personally Identifiable Information to be moved within your organisation and beyond, via a Secure ICAP Gateway. Invisibility Isn’t Security Just because smaller firms aren’t in the headlines, don’t assume they’re not falling prey to cybercrime. The seductive illusion of “flying under the radar” is exactly what makes smaller organisations appealing targets. And, because they often lack the hardened defences of larger organisation - while still handling sensitive data - they’re more vulnerable to the threats. Here to Help At Generic Systems Australia , we’re Australia and New Zealand’s local experts in helping businesses add the protective layers of Managed File Transfer and Adanced Threat Protection to their cyber defences. If you’d like to discuss how we can help your organisation, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how easily we can step up your cyber security. At Generic Systems Australia, we’re your local experts in Managed File Transfer. Previous Next

  • Employee Error Lets Hackers Clean Up at Clorox | GSA

    < News Employee Error Lets Hackers Clean Up at Clorox 25 July 2025 The Clorox Company’s $574M lawsuit against IT services provider Cognizant Technology Solutions is a stark reminder of the cyber threat posed by unwitting or uncaring employees. Clorox alleges that help desk agents managed by Cognizant provided hackers with access to Clorox’s IT network in August 2023. They say that Cognizant agents repeatedly reset passwords and multi-factor authentication (MFA) tokens for hackers posing as Clorox employees without asking a single security question. One partial call transcript filed with the court shows a Cognizant agent volunteering “Let me provide the password to you” after a hacker said he couldn’t log in. Hackers used the credentials provided to paralyse manufacturing lines, which led to product shortages costing Clorox hundreds of millions in lost sales. Clorox says it had provided Cognizant with strict credential-reset protocols such as verifying a manager’s name and sending confirmation emails, but that these protocols weren’t followed. Human Error Common Clorox’s unfortunate experience is consistent with studies which have found human error a leading cause of most cyber security incursions. In a 2024 experiment by Fortra, 14.9% of employees across the Asia-Pacific region succumbed to hackers’ attempts to have them provide network access. 60% of the employees who clicked on that phishing link went on to further expose their organisation by sharing their password. Guarding Against Employee Error Employee education is a great start to protecting your organisation. But as Clorox’s experience shows, it’s not enough. Technical safeguards are needed, too. Generic Systems Australia’s Advanced Threat Protection Bundle enables your organisation’s email system to automatically detect and prevent phishing links and other malware from entering your organisation. Combining the layered strengths of GoAnywhere MFT and Clearswift, it enables your employees to receive and share information securely without impairing their productivity. How It Works Our Advanced Threat Protection Bundle seamlessly integrates managed file transfer with advanced threat protection and adaptive data loss prevention to keep your sensitive data secure. It not only prevents malware from entering your organisation, but it also prevents employees from losing or mishandling data. For example, if an employee knowingly (or unknowingly) attempts to share any files containing malware, those files are sanitised by having the malicious elements automatically removed. The Advanced Threat Protection Bundle can also automatically detect and –– if you configure it to do so –– prevent employees from sharing sensitive information. Local Support If you’d like to see first-hand how the Advanced Threat Protection Bundle can help keep your organisation’s data safe, please feel welcome to get in touch with me. My technical team at Generic Systems Australia are local experts in the field. Previous Next

  • Australian Govt’s “Horizon 2” Comes Into View | GSA

    < News Australian Govt’s “Horizon 2” Comes Into View 5 Aug 2025 The Australian Government has invited input on the key policy and program outcomes the nation needs to achieve under the 2023 – 2030 Australian Cyber Security Strategy. Building on the momentum of the recently introduced Cyber Security Act 2024 , Minister for Cyber Security, Tony Burke MP, has released the Horizon 2 Policy Discussion Paper. It seeks feedback and input on key policies designed to enable Australia to: · Embed cyber messaging, cyber standards, capability and efforts. · Empower Australian businesses and citizens to protect themselves and become more resilient to cyber incidents. · Enhance cyber frameworks, workforce, and business ecosystem to drive further cyber security uplift. Consultation on the Discussion Paper is open to all levels of government, industry, educational institutions, community groups, and the Australian public. Submissions to can be made through the Department’s consultation webpage until 29 August 2025. Further industry co-design and Town Halls will also be held during the consultation process. Releasing the Discussion Paper, the Minister said: “We have made historic progress on cyber security but there is always more to do when confronting this evolving threat. Our government believes that all Australians have the right to be safe and feel safe, and cyber security is a critical part of that effort. “We’ve laid excellent foundations with Horizon 1 of the strategy and the passage of the Cyber Security Act – Horizon 2 will continue our progress towards our rightful place as a world leader on cyber security.” Submissions can be made through the Department’s consultation webpage until 29 August 2025. Previous Next

  • Data Breach Costs Escalate in 2024 | GSA

    < News Data Breach Costs Escalate in 2024 14 Aug 2024 $4.26M! That’s the average cost of a data breach in Australia in 2024, according to new research released by IBM. The figure – a record high – represents a whopping 27% increase since 2020. However, while the average cost of a data breach continues to escalate, the types of cyber breaches experienced by Australian organisations continue to be the usual suspects. Under Attack IBM’s research found that Phishing continues to be the most common type of attack vector , with 22% of breaches starting this way. Stolen or compromised credentials were the second most common, accounting for 17% of breaches. Malicious insiders were responsible for the most costly attacks, at 8% of incidents. It took Australian companies on average 266 days to identify/contain cyber incidents. This lengthy period contributed to high detection and escalation costs , which remain the most expensive aspect of a breach, with post-breach response and lost business the second most costly. Almost a third of data breaches involved data stored across multiple environments : public cloud, private cloud, and on-premises systems. Breaches across multiple environments took 13% longer to identify and contain. Organisations with too few cybersecurity staff paid the heaviest price, with an average cost per breach $2.7M higher than organisations with less exposure. However, involving law enforcement saved some ransomware victims as much as $1.5M in costs. Automated Defences Help Companies which didn’t use security AI and automation experienced significantly higher breach costs ($5.21M) than those which did, and it also took them an additional 99 days to identify and contain breaches. The research found that 65% of surveyed Australian organisations leveraged these technologies. However, attackers too are exploiting new opportunities presented by AI. For example, increasingly convincing deepfakes are enabling ever more effective social engineering attacks. Avoiding Costly Cyber Breaches To protect an organisation’s valuable data, it must be protected when it’s stored and while it’s “in motion”. As the research found, automation can ensure this takes place with the entirety of an organisation’s data transfers. Managed File Transfer (MFT) solutions such as the class-leading GoAnywhere MFT encrypt data at rest and in transit, complying with the highest data security standards (including the US’s and Europe’s HIPAA, HITECH, PCI DSS, SOX, and GDPR). MFT manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols such as SFTP, FTPS, and AS2 to send files securely, and encryption standards such as Open PGP and AES to protect data in transit and at rest. Advanced Threat Protection and Adaptive Loss Prevention add a further layer of defence. SFT Threat Protection enables safe collaboration with external parties, preventing malware from entering your organisation, and reducing opportunities for employees to lose or mishandle sensitive data. Local Expertise Ready to Help Generic Systems Australia are your local experts in Managed File Transfer and Advanced Threat Protection. We’ve assisted hundreds of organisations across the Asia-Pacific region to secure their data and keep cybercriminals at bay. If you’d like to discuss improving your cybersecurity, please feel welcome to contact me , Bradley Copson. I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. Previous Next

  • Summer Software Sales | GSA

    < News Summer Software Sales 10 Dec 2024 It's December, and the thoughts of many in business will no doubt be turning to closing out the year ahead of well-deserved holidays. But did you know this can also be a great time to negotiate a sweet summer deal on enterprise software…? Much of the world's enterprise software is sold by US-based companies, who follow a calendar accounting year. December is the final month for them to achieve their full-year sales targets, stretch bonuses, etc. So: strike while the iron - and season - is hot! Use your negotiating advantage to squeeze a special deal on that new software solution you've been eyeing. Of course, if that solution happens to be GoAnywhere MFT - the world's leading Managed File Transfer solution - then reach out to me, and we can apply the summer squeeze together! 😉 #MFT #SFTP #managedfiletransfer #goanywhere #enterprisesolution Previous Next

bottom of page