Search Results
195 results found with an empty search
- Get Your Files Managed At First Sight | GSA
< News Get Your Files Managed At First Sight 6 Feb 2026 It’s a story older than MAFS’s 13 seasons… Two enterprise systems from vastly different backgrounds, complete strangers to each other’s ways, thrust into shared company and seeking common ground. Thankfully, unlike MAFS’s “relationship experts”, GoAnywhere – the world’s premier Managed File Transfer solution – is adept at making awkward file pairings simply work . Love at First Byte Your files are contestants. One is from Finance. The other is from HR… or Marketing… or that legacy system nobody admits to owning (but which everyone suspects is critical to keeping your business running). They have vastly different formats. And whoever built the legacy system thought CSV was cutting‑edge. But GoAnywhere is an expert matchmaker. Using automated file translation, with full encryption and auditability, it exchanges your data efficiently and - in marked contrast to a MAFS commitment ceremony - without drama. The Honeymoon Once GoAnywhere pairs two systems together, the honeymoon begins. It creates structure, boundaries, and predictable behaviour. Trust is earned and duly rewarded. GoAnywhere keeps everything secure, logged, and delivered on time. It’s the polar opposite of Married at First Sight , where someone is crying in a kitchen, someone else is storming out of a dinner party, and at least one groom is discovering that “I’m brutally honest” is less of a personality trait and more of a red flag. By the time the season finale rolls around, the couples have either planned a fairytale life together, settled into an “are we there yet” level of mutual tolerance, or begun sharing passive‑aggressive Instagram stories about their ex. Happily Ever After Your files, though? They’re living their best lives. They’ve found their perfect match, they’re moving smoothly through workflows, no longer traumatised by the chaotic manual processes GoAnywhere replaced. If MAFS is a “social experiment”, GoAnywhere MFT is the polar opposite: a tried-and-tested, robustly engineered system that ensures every file pairing - no matter how unlikely - simply works. The AfterMAFS Come to think of it: if MAFS “experts” were as reliable as GoAnywhere, the contestants would be happily married by episode three. It wouldn’t rate well, but it’d be the kind of non -drama welcomed by IT departments the world over! If your IT systems could benefit from the relationship counselling GoAnywhere delivers, then feel welcome to get in touch with me . My Generic Systems Australia team have the decades of local experience that will get your file transfers managed at first sight. 😉 Previous Next
- Australian Govt’s “Horizon 2” Comes Into View | GSA
< News Australian Govt’s “Horizon 2” Comes Into View 5 Aug 2025 The Australian Government has invited input on the key policy and program outcomes the nation needs to achieve under the 2023 – 2030 Australian Cyber Security Strategy. Building on the momentum of the recently introduced Cyber Security Act 2024 , Minister for Cyber Security, Tony Burke MP, has released the Horizon 2 Policy Discussion Paper. It seeks feedback and input on key policies designed to enable Australia to: · Embed cyber messaging, cyber standards, capability and efforts. · Empower Australian businesses and citizens to protect themselves and become more resilient to cyber incidents. · Enhance cyber frameworks, workforce, and business ecosystem to drive further cyber security uplift. Consultation on the Discussion Paper is open to all levels of government, industry, educational institutions, community groups, and the Australian public. Submissions to can be made through the Department’s consultation webpage until 29 August 2025. Further industry co-design and Town Halls will also be held during the consultation process. Releasing the Discussion Paper, the Minister said: “We have made historic progress on cyber security but there is always more to do when confronting this evolving threat. Our government believes that all Australians have the right to be safe and feel safe, and cyber security is a critical part of that effort. “We’ve laid excellent foundations with Horizon 1 of the strategy and the passage of the Cyber Security Act – Horizon 2 will continue our progress towards our rightful place as a world leader on cyber security.” Submissions can be made through the Department’s consultation webpage until 29 August 2025. Previous Next
- Asia-Pacific orgs are on Cybercrime Frontline | GSA
< News Asia-Pacific orgs are on Cybercrime Frontline 12 July 2024 The Asia-Pacific region is the frontline in the fight against cybercriminals. A survey conducted by security firm Kiteworks has found that 72% of organisations in our region experienced four or more cybersecurity incidents in the past year - 20% more than the global average. Data also shows that Asia-Pacific organisations also exchange sensitive content with the highest number of third parties. This could be contributing to the higher-than-average cyberattacks. One of your best defences against hackers is to centrally control the flow of data into and out of your organisation. Managed File Transfer (MFT) software does that for you. At Generic Systems Australia , we’re the Asia-Pacific’s experts on the world’s #1 MFT, GoAnywhere . Let me know if you’d like an obligation-free discussion about how we could help you keep your organisation safe from the cyber crimewave. #MFT #managedfiletransfer #securefiletransfer #sft #cybersecurity #cybercrime Previous Next
- New Cyber Laws Impose New Business Obligations | GSA
< News New Cyber Laws Impose New Business Obligations 16 Oct 2024 Australia’s federal government last week introduced much-anticipated legislation to parliament which will revolutionise Australia’s cyber security preparedness. If passed as expected, the new laws will impose new compliance and reporting requirements on local businesses. Govt Intent Designed to protect businesses and consumers from the growing scourge of cyber crime, the Cyber Security Act 2024 is Australia’s first standalone cyber security legislation. Introducing the Act, Minister for Cyber Security, Tony Burke, said that – like IT systems themselves - legislation needed to be hardened to protect national security and economic stability. He described the package as providing a clear legislative framework for contemporary, whole-of-economy issues which would identify and respond to new and emerging cyber threats. Seven Initiatives There are seven initiatives under the 2023-2030 Australian Cyber Security Strategy which collectively address gaps in current legislation to: Mandate minimum cyber security standards for smart devices; Introduce mandatory ransomware reporting for certain businesses to report ransom payments; Introduce a ‘limited use’ obligation for the National Cyber Security Coordinator and the Australian Signals Directorate; and Establish a Cyber Incident Review Board. SOCI Reforms The legislation will also progress and implement reforms under the Security of Critical Infrastructure Act 2018 (SOCI Act): Clarifying existing obligations in relation to systems holding business critical data; Simplifying information sharing across industry and Government; Introducing Government powers to direct entities to address serious deficiencies within their risk management programs; and Moving regulation for the security of telecommunications into the SOCI Act. The SOCI Act reforms will also expand current Government assistance measures to ensure Government can step in as a last resort to manage the consequences of significant incidents. Govt Empowered Changes to government assistance measures will empower the Government to gather information or direct entities to take or refrain from certain actions, on authorisation from the Minister for Home Affairs, in response to a serious incident. Characterising the legislation as a significant step towards his government’s vision of becoming a world leader in cyber security by 2030, Tony Burke said: “We know government has to lead the way on cyber, but we also know we can’t do it alone. This is why these new laws have been consulted extensively with business. “To achieve Australia’s vision of being a world leader in cyber security by 2030, we need the unified effort of government, industry and the community.” New Business Obligations Legal firm A&O Shearman cautioned that the new Cyber Bill will introduce several new critical areas of compliance and reporting. It said businesses must take heed of these new obligations, and ensure they put in place robust cyber security measures. • Ransomware Reporting Obligations : Entities impacted by cyber security incidents and making ransomware payments must report these payments within 72 hours. The aim of this obligation is to improve the detection and response to ransomware incidents, thereby reducing their impact. Failure to report can result in civil penalties. • Security Standards for Smart Devices : The Cyber Bill mandates that manufacturers and suppliers of smart devices comply with specified security standards. This is crucial for businesses involved in the production or distribution of smart devices. Non-compliance can result in compliance notices, stop notices, and recall notices. These measures are designed to ensure that smart devices are secure and do not pose a risk to users. • Protected or Limited Use of Incident Information : The Cyber Bill includes provisions to ensure that information provided about cyber security incidents is used or disclosed only for permitted purposes, with strict limitations on using this information for civil or regulatory actions against the reporting entity. • Cyber Incident Review Board : The Cyber Bill establishes a Cyber Incident Review Board tasked with reviewing certain cyber security incidents and making recommendations. The Board has the authority to request and require documents from entities. Non-compliance may result in civil penalties. A&O Shearman said organisations should make sure they implement security standards in compliance with the specified security measures currently provided for in the Cyber Bill, and make sure they can comply with the ransomware reporting obligations, including the timelines foreseen in the Cyber Bill. Meeting New Requirements Criminal syndicates target organisations which haven’t adequately protected their data transfers and systems access. Defending against them requires a multi-layered strategy which includes robust data transfer protection, multifactor authentication and employee training. Managed File Transfer (MFT) solutions such as the class-leading GoAnywhere MFT encrypt data at rest and in transit, complying with the highest data security standards - including the US’s and Europe’s stringent HIPAA, HITECH, PCI DSS, SOX, and GDPR. MFT manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols such as SFTP, FTPS, and AS2 to send files securely, and encryption standards such as Open PGP and AES to protect data in transit and at rest. GoAnywhere MFT also provides audit reports, which will help organisations meet new reporting and compliance needs. All file transfer and administrator activity is stored and easily searchable. To help organisations report on file transfer activity and remain compliant with the new legislation, these audit logs can be automatically generated and provided as PDFs. Advanced Threat Protection and Adaptive Loss Prevention add a further layer of defence. SFT Threat Protection enables safe collaboration with external parties, preventing malware from entering an organisation, and reducing the risk of employees losing or mishandling sensitive data. Local Expertise on Hand Generic Systems Australia are your local experts in Managed File Transfer solutions. We’ve assisted dozens of organisations across the Asia-Pacific region to secure their data and keep cybercriminals at bay. If you’d like to discuss improving your cybersecurity, please feel welcome to contact me , Bradley Copson. I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. Previous Next
- Users Declare GoAnywhere “Best MFT” | GSA
< News Users Declare GoAnywhere “Best MFT” 23 Feb 2026 Software buyers on G2 - the world’s largest and most trusted software marketplace – have declared GoAnywhere MFT to be the best Managed File Transfer software in the IT Infrastructure category. Reviewers lauded GoAnywhere’s “seamless and secure file transfers”, saying its automation capabilities made it “perfect for enterprises” and “effortless”. See the full list of infrastructure category winners here and get in touch if you’d like to tap into the deep experience and expertise we provide on GoAnywhere to Australian and New Zealand businesses. Previous Next
- MFT Popularity Set to Soar in 2025 | GSA
< News MFT Popularity Set to Soar in 2025 3 Feb 2025 Managed File Transfer (MFT) software continues to be a popular addition to corporate IT systems, based on the last global market research. Washington-based Market Research Intellect (MRI) valued the MFT software and services market at US$12.6B in 2024, and now projects CAGR of 9.97% to a value of US$22.3B by 2031. It attributes this growth to “the increasing need for secure, efficient, and compliant data transfers across enterprises as organisations handle larger volumes of sensitive data”. MFT solutions provide secure mechanisms for exchanging files internally and externally while ensuring regulatory compliance. The rising adoption of cloud technologies, and the integration of automation and real-time monitoring, have further propelled uptake of MFT solutions, offering greater flexibility and scalability to businesses. MRI said that industries such as finance, healthcare, and manufacturing, where data security and integrity are paramount, are increasingly relying on MFT software to mitigate risks associated with traditional file transfer methods. Additionally, the growing trend of hybrid and remote workforces is fuelling the demand for cloud-based MFT solutions. According to MRI, the MFT software and service market is being shaped by “the increasing complexity of data security requirements and the need for compliance with industry regulations. “MFT facilitates secure, automated, and efficient file transfers, addressing critical pain points such as data breaches and downtime,” they said. Notwithstanding the popularity and growth of MFT solutions, perceived challenges such as integration with legacy systems, and the usual concerns about the scalability of new solutions in large organisations, might cause some to delay their adoption of MFT technologies. That’s why, at Generic Systems Australia, we use and recommend GoAnywhere MFT , the world’s leading MFT solution. It’s renowned for its easy implementation, robust performance and extensive enterprise systems integrations. MRI categorises MFT software as “a key solution for secure file management”. So if you’d like to explore further how MFT can help protect your data and make your organisation more efficient, please feel welcome to contact me for an obligation-free chat. At Generic Systems Australia , we’re your local experts in MFT. Previous Next
- GoAnywhere: the Swiss Army Knife of Systems Connectivity | GSA
< News GoAnywhere: the Swiss Army Knife of Systems Connectivity 29 July 2025 When all the buzzwords are said and done, the single biggest advantage of using information technology is enhanced efficiency through automation and connectivity . It’s in precisely these areas where GoAnywhere MFT shines. While GoAnywhere is a Managed File Transfer solution, its usefulness is far broader. It’s a “Swiss Army Knife” for automatically moving files between an organisation’s systems, suppliers and customers. Whether you’re moving data between your ERP , CRM , HRM , SCM , CMS , BI , BPM and ITSM systems, GoAnywhere helps you seamlessly interconnect their outputs and inputs, amplifying IT’s overall speed and efficiency benefits across your business. GoAnywhere not only monitors your various solutions for new output, it also translates that output into the new formats required by your other systems before routing the translated files to their destinations. Automatically. Comprehensive Extract Transfer Load features enable data values to be mapped, formatted and modified between source and target files. Automating with MFT Automation is where GoAnywhere really shines vs less capable Managed File Transfer solutions. It manages recurring and high-volume file transfers and eliminates the need for manual data processing. Surprisingly, there are still some organisations which continue to be dependent on tedious manual file transfer processes, complicated system configurations and manual batches. The reason they remain reliant on such risky approaches is often lost to the past - there’s simply no-one left on staff who was around at the time their systems were initially installed. “However it works … it does work” seems to be the thinking. “If it ain’t broke … don’t fix it” can be seductive when there’s lots else demanding your attention. However, failing to understand file transfer dependencies, and disregarding the need to make them resilient, is a dangerous way to run a business. Small changes in file formats and security protocols, or the unforeseen consequences of a software version update, can cause havoc. Background legacy scripts, homegrown processes, and outdated PC tools are prone to fail for the simplest of reasons. That means systems downtime, lost revenue, distrustful suppliers and unhappy customers. Minor Investment, Major Gain Making the relatively minor investment of time and expense to automate file transfers simplifies and streamlines critical everyday tasks, eliminates human error, saves time and cuts costs. GoAnywhere is more than just a file moving tool. It can monitor folders both on-premises or in the cloud, send you emails and SMS alerts when triggered events occur, and test and debug your automatic file transfer workflows. And, should you ever need to trace the movement of your data – say, for auditing or compliances purposes - GoAnywhere’s comprehensive logging tools and centralised dashboard make this easy. How It Works With GoAnywhere installed, a simple drag-and-drop interface defines how files will be securely and reliably moved between internal systems, supply chain partners and customers. It’s much easier than writing manual scripts, and no programming skills are required. GoAnywhere’s automation enables systems to execute each step of a business process one after the next without human intervention. File movements are monitored and controlled, including sending, retrieving and delivering data. You can schedule when files should be sent or retrieved between systems, users, trading partners, applications, and the cloud. Your business processes are made significantly more efficient. Here to Help At Generic Systems Australia , we’re Australia and New Zealand’s experts in helping business take advantage of every one of GoAnywhere’s many capabilities. We’ve assisted dozens of organisations to make their file transfers resilient, secure and reliable, boosting their efficiency. If you’d like to discuss how we can deliver these advantages to your organisation, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how easily we can transition you from your current approach to a new world of productivity. At Generic Systems Australia, we’re your local experts in data transfer. Previous Next
- 5 Signs You Need a Managed File Transfer Solution | GSA
< News 5 Signs You Need a Managed File Transfer Solution 14 Nov 2023 5 Signs You Need a Managed File Transfer Solution Does your organisation rely on transferring sensitive data between employees, customers and trading partners? Most do. And that means just one wrong move by an employee – for example, failing to encrypt a sensitive file – could land you with a huge fine, and lose you customers. So it’s worth spending a moment considering how your team is performing the regular, essential task of moving data around. And, to ask the key question: “Is it time I installed a better, safer and more efficient way to transfer data?” Here are some of the key signs that your business is ready for a Managed File Transfer solution. Sign 1: Still Using Outdated Ways to Send Data A surprising number of organisations still rely on outdated protocols and clunky scripts to move precious data around. However, as I explained in a recent article, these legacy methods increase the risk of human error, take time away from more critical tasks, and are difficult to maintain. A Managed File Transfer (MFT) solution like GoAnywhere MFT is easy to use, easy to audit, requires little maintenance, and removes manual tasks from your stretched IT team’s To Do list. Sign 2: Targeted by Cybercriminals Ask your IT team how much growth they’re seeing in attempted cybercrime incursions. Frightening, isn’t it!? With hackers escalating their efforts to extort your business and customers, it’s more essential than ever to secure your data and maintain a ‘circle of trust’ with your supply chain partners. A leading MFT, such as GoAnywhere MFT, employs the latest encryption algorithms to reduce the risk of data breaches during transit. Features like Access Controls, and Multi-factor Authentication, safeguard sensitive information from unauthorised access. Sign 3: Need to Comply with Government & Industry Regulations In response to escalating cybercrime, governments and industry regulators are imposing ever greater requirements on business to ensure they protect consumers’ personal data. From health data (hospital records, test results), to banking data (debit and credit card numbers, bank account details), to identity data (home address, government id), businesses that fail to take responsible measures to protect sensitive data face growing sanctions. Even worse, a breach may not only cost your organisation time and money to remediate, it may ruin your reputation. A leading MFT, such as GoAnywhere MFT, helps ensure your file transfers comply with regulatory requirements such as PCI DSS, HIPAA, HITECH, and GDPR. Features like auditing, reporting, role-based access, secure protocols, centralised security controls, encryption, and key management protect employee and consumer data from harmful security mishaps. Sign 4: Need to Exchange Data in the Cloud Many organisations are moving business processes to the cloud, and now need to exchange files with trading partners in the cloud. But how can transfers to and from the cloud, over public telecommunications networks, be protected? From streamlining and automating cloud file transfers to platforms like Amazon Web Services, and Microsoft Azure, to integrating with popular web and cloud services like SharePoint and Google Drive, working with a partner in the cloud using an MFT is a smooth, reliable and safe process. Sign 5: Need to Adapt to Changing Network Conditions Research by Rand Group found that a single hour of system downtime can cost a medium-sized business a six figure sum. As organisations and trading partners become increasingly integrated, it’s critical that file transfers are performed without delay or disruption. Whereas a document containing a batch of important transactions may once have been delivered over several hours, today’s fast pace of business requires it to take mere seconds. An enterprise-calibre file transfer solution should have a high availability plan in place. The right solution will provide active-passive and active-active (i.e. clustering) methods for organisations who need to keep their processes running no matter the situation at hand. Clustering provides the best high availability by running multiple servers simultaneously. Therefore, if one goes down, file transfers and workflows will continue to run on other servers so communication with your trading partners won’t be interrupted. Seen the Signs…? If you’ve observed any of the above warning signs in your business, it may be time to consider upgrading to a secure MFT such as GoAnywhere. The acknowledged leading Managed File Transfer offering, GoAnywhere is an all-in-one solution, automating and encrypting file transfers from a centralised dashboard. It not only simplifies the completion of critical business initiatives, but also reduces the time spent on manual file transfers and in-house processes. GoAnywhere saves businesses time, money, and reputation. If you’d like to learn more about how GoAnywhere MFT could add to your organisation’s bottom line, please feel free to contact me ( bradley@gensys.com.au ), or read more at the Generic Systems Australia website. I’d be happy to offer you an obligation-free discussion, no cost trial, or Proof of Concept. Bradley Copson, Business Manager, Generic Systems Australia “Local Experts in Secure Managed File Transfer” Previous Next
- Make Email Attachments Safe | GSA
< News Make Email Attachments Safe 3 July 2024 Email attachments continue to be the single biggest threat to your organisation’s cyber security. In 183 million phishing simulations conducted by Proofpoint customers this year, almost one in six recipients of a suspicious phishing email failed to protect their organisation’s valuable data. Employees either clicked a malicious link, performed a bogus password reset, or downloaded malware or ransomware. With such a high and persistent risk of cyber incursion, organisations increasingly require more from their file transfers than standard email attachments can provide. They need a smarter, more reliable way to send files, stay secure, and meet the needs of their clients, compliance mandates, and industry regulations. Managed File Transfer (MFT) future-proofs an organisation’s ability to send and receive files quickly, breaking free of the constraints of email attachments, and maintaining cyber security. Problem: Size Caps Most email applications cap the size of email attachments to 25 MB. That may have been “big enough” a couple of decades ago… but no longer. Now, a single high-resolution image can easily exceed 25Mb. Sending an entire folder typically requires zipping it to condense its contents. However, splitting ZIP files into chunks less than 25Mb is a time-consuming hassle. Problem: Insecure Even when successfully sent, email attachments pose ongoing security risks. They can be forwarded to unintended users. Worse, a single recipient with an infected device can infect the attachment with malware and spread it to others. On top of that, there’s always a possibility that an employee could send an email to the wrong person, or mistakenly send sensitive information outside of their network, causing compliance issues for your organisation. Problem: Indiscriminate If an attachment message originates internally, the protocol to keep sensitive data safe (or how to determine what sensitive data is) is often not widely disseminated or used. Encrypting attachments, one effective mechanism, can be tricky for casual users and implemented inconsistently, undermining its reliability as a whole-of-organisation solution. Problem: Degraded Performance Too many attachments can clog your inbox archive and slow backup processes. Some file types such as DLLs, JARs, and SOs may be completely blocked by email systems, disrupting business processes. Unpacking endless ZIP files also depletes available server resources. GoAnywhere MFT to the Rescue Email attachments have their place. But too often they’re a far from ideal way to move data, failing to provide the efficiency, agility, speed, and protection companies need when sending the files that underpin their business. That’s where GoAnywhere MFT can help. Solution: No Size Limits Providing a secure alternative to emailing files, the Secure Mail module in GoAnywhere MFT enables employees and other authorised users to easily send files. It’s much more secure than traditional email, and doesn’t limit file sizes or types. GoAnywhere not only frees your organisation from file size constraints, it also includes accelerated file transfer technologies which speed files to their destinations. Patented UDP file transfer technology enables even the largest files to be sent without incident from anywhere in the world. GoAnywhere’s MFT agent also helps ensure large batch files get to their destination with auto-resume and integrity checks, ensuring all of your message gets there in one piece, despite any network connectivity issues along the way. And if a network connectivity issue prevents the file being successfully transferred, GoAnywhere’s comprehensive alerts ensure you’ll know immediately. Solution: Secure Encrypted Sends Encryption is built into GoAnywhere. Any files sent are automatically encrypted end-to-end using one of a range of encryption protocols, including Open PGP, SFTP, FTPS, AS2 or AS4, and ZIP with AES. GoAnywhere also enables password protection for the attached downloads in case they are sent to the wrong recipient. Additionally, Secure Folders provide a place where your team can safely collaborate. Solution: Bottleneck Buster Lag, inefficiencies and other performance inhibitors are nullified GoAnywhere’s load balancing . Managed transfers help maximise uptime, and clustering functionality distributes files across your network, so they get there in the fastest time and with the least amount of disruption. Solution: Seamless Integration with Inbound Protection By combining GoAnywhere MFT with Clearswift in our Threat Protection Bundle , organisations can create layered cyber defences which enable their teams to receive and share information securely without impairing their productivity. It seamlessly integrates MFT with advanced threat protection and adaptive data loss prevention to keep your sensitive data secure. Not only does it prevent malware from entering your organisation, it also prevents employees from losing or mishandling data. For example, if an employee knowingly (or unknowingly) attempts to share any files containing malware, those files are sanitised by having the malicious elements automatically removed. The SFT Threat Protection Bundle can also automatically detect and - if you configure it to do so - prevent employees from sharing sensitive information. If you’d like to discuss how your organisation’s file transfers can be made more secure and efficient, please feel welcome to contact me, Bradley Copson (mail to:bradley@gensys.com.au). I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfe r. Previous Next
- Cyber Target Paris Prepares | GSA
< News Cyber Target Paris Prepares 23 July 2024 As the attention of sports fans turns to Paris this week, so too are the nefarious attentions of the world’s cyber criminals. So: how will the world’s largest sporting event keep its data and systems secure…? Read on to learn more from those charged with defending the Summer Olympics’ IT systems. Miscreant Magnet Vincent Strubel, head of France’s national cybersecurity agency (ANSSI), warned that this year’s summer Olympics was facing an unprecedented level of cyber threats. Said Strubel: “There will be cyberattacks during the Games and the Paralympics... Some won’t be serious. Some will be serious, but won’t have an impact on the Games. And perhaps there will be some that are serious and liable to have an impact on the Games.” Franz Regul, head of the cyber team responsible for Paris 2024, said he expects the number of security events this year to be “multiplied by 10 compared to Tokyo”. There is a need to keep an exceptionally tight attack surface and tie up any loose ends like SSL misconfigurations, open ports, and privacy issues such as cookie consent violations. French anti-cybercrime units have classified the cyber threats in five categories: 1. Amateur Hackers As the “as-a-service” cybercrime economy develops, it’s become easier than ever for novice threat actors to launch more sophisticated attacks than their limited skillsets would otherwise have allowed. This lowered bar for entry will lead to a higher overall number of attacks. 2. Thrill-Seekers The sheer size and popularity of the Olympic Games will tempt those broadly inclined to create nuisance or show off their “cyber chops” to their peers. They’ll likely seek to exploit any security weaknesses in the websites or booking sites purposed for the event, including those of media organisations and sponsors. Common website security attacks such as cross-site scripting, SQL injection, and DDoS attacks will be their primary threat vector. 3. Hacktivists Activists passionate for their cause of choice are likely to attempt to hijack the world’s largest stage. 4. Black Hat Thieves The immense cashflow around the Paris Olympics makes them a potentially lucrative target for cyber thieves. Phishing attempts – expected to arrive in the form of unsolicited emails about the Games, lodging, tickets, or information followed by “helpful links” – will abound. Those who open the emails and click on the links may find their bank accounts quickly compromised. 5. Nation-State Actors The Olympics have long been a huge world stage on which global powers send political signals to countries, governments, and the world at large. As the Associated Press recently noted, “Among the most threatening cyber-adversaries are countries who might want to embarrass and exact costs on France and the International Olympic Committee.” Defending the Games French cybersecurity authorities are cagey about the significant precautions they’re taking to thwart cyber criminals. Revealing too much would give away a tactical advantage to blog-reading Black Hats. However, here’s what we know so far… 1. Ethical Hackers The ANSSI has hired ethical hackers to test the attack vectors on all Olympic websites. According to Strubel, 500 sites, competition venues and local collectives have all been put under “friendly fire”. 2. AI Artificial Intelligence is being employed to test for multiple threats across IT systems and websites. Regul said that AI was helping differentiate “between a nuisance and a catastrophe”. 3. Physical Security Transportation, supply chains, and surveillance systems are other potential targets for those seeking to compromise the Games. All have been included in the safety perimeter of the Paris 2024 cybersecurity preparations. 4. External Expertise The 2018 Winter Olympic Games were targeted by malware dubbed “Olympic Destroyer”, which aimed to disrupt the opening ceremony. Paris cybersecurity teams have tapped the knowledge and experiences of the consultants who detected and disabled that threat. A Bug Bounty program has also sought to attract the time and skills of independent IT practitioners. 5. Education & War Gaming During the past two years, ANSSI has been “war gaming” cyber incidents with the International Olympic Committees’ IT partners, and deploying cyber defence education programs across the thousands of people responsible for operating the Paris Games’ IT systems. No News will be Good News The final word on Paris’s cyber preparations belongs to Jérémy Couture, who helms the official cybersecurity hub of the Paris Olympic games. Couture said his dream for the Olympics is that technology and cybersecurity won’t be talked about - because that will mean they were a non-issue. Sports fans around the world will be hoping his dreams become reality. Need a Local Expert? If – like the Paris Games - you’d like to tap local expertise keep cyber criminals at bay, please feel welcome to contact me, Bradley Copson ( mailto:bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. #MFT #managedfiletransfer #securefiletransfer #sft #cybersecurity #datatransfer Previous Next
