Search Results
172 results found with an empty search
- GoAnywhere: the Swiss Army Knife of Systems Connectivity | GSA
< News GoAnywhere: the Swiss Army Knife of Systems Connectivity 29 July 2025 When all the buzzwords are said and done, the single biggest advantage of using information technology is enhanced efficiency through automation and connectivity . It’s in precisely these areas where GoAnywhere MFT shines. While GoAnywhere is a Managed File Transfer solution, its usefulness is far broader. It’s a “Swiss Army Knife” for automatically moving files between an organisation’s systems, suppliers and customers. Whether you’re moving data between your ERP , CRM , HRM , SCM , CMS , BI , BPM and ITSM systems, GoAnywhere helps you seamlessly interconnect their outputs and inputs, amplifying IT’s overall speed and efficiency benefits across your business. GoAnywhere not only monitors your various solutions for new output, it also translates that output into the new formats required by your other systems before routing the translated files to their destinations. Automatically. Comprehensive Extract Transfer Load features enable data values to be mapped, formatted and modified between source and target files. Automating with MFT Automation is where GoAnywhere really shines vs less capable Managed File Transfer solutions. It manages recurring and high-volume file transfers and eliminates the need for manual data processing. Surprisingly, there are still some organisations which continue to be dependent on tedious manual file transfer processes, complicated system configurations and manual batches. The reason they remain reliant on such risky approaches is often lost to the past - there’s simply no-one left on staff who was around at the time their systems were initially installed. “However it works … it does work” seems to be the thinking. “If it ain’t broke … don’t fix it” can be seductive when there’s lots else demanding your attention. However, failing to understand file transfer dependencies, and disregarding the need to make them resilient, is a dangerous way to run a business. Small changes in file formats and security protocols, or the unforeseen consequences of a software version update, can cause havoc. Background legacy scripts, homegrown processes, and outdated PC tools are prone to fail for the simplest of reasons. That means systems downtime, lost revenue, distrustful suppliers and unhappy customers. Minor Investment, Major Gain Making the relatively minor investment of time and expense to automate file transfers simplifies and streamlines critical everyday tasks, eliminates human error, saves time and cuts costs. GoAnywhere is more than just a file moving tool. It can monitor folders both on-premises or in the cloud, send you emails and SMS alerts when triggered events occur, and test and debug your automatic file transfer workflows. And, should you ever need to trace the movement of your data – say, for auditing or compliances purposes - GoAnywhere’s comprehensive logging tools and centralised dashboard make this easy. How It Works With GoAnywhere installed, a simple drag-and-drop interface defines how files will be securely and reliably moved between internal systems, supply chain partners and customers. It’s much easier than writing manual scripts, and no programming skills are required. GoAnywhere’s automation enables systems to execute each step of a business process one after the next without human intervention. File movements are monitored and controlled, including sending, retrieving and delivering data. You can schedule when files should be sent or retrieved between systems, users, trading partners, applications, and the cloud. Your business processes are made significantly more efficient. Here to Help At Generic Systems Australia , we’re Australia and New Zealand’s experts in helping business take advantage of every one of GoAnywhere’s many capabilities. We’ve assisted dozens of organisations to make their file transfers resilient, secure and reliable, boosting their efficiency. If you’d like to discuss how we can deliver these advantages to your organisation, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how easily we can transition you from your current approach to a new world of productivity. At Generic Systems Australia, we’re your local experts in data transfer. Previous Next
- WTH is MFT…? | GSA
< News WTH is MFT…? 31 Mar 2025 In an industry overrun by acronyms, you may be wondering “WTH is MFT?” FWIW, here’s a brief overview. “MFT” is the abbreviation of Managed File Transfer - a powerful technology which comprehensively addresses the risks and challenges of moving information both within an organisation, and externally, to suppliers, partners and customers. MFT simplifies the complexities of data transfer by providing centralised control, encryption, and auditing capabilities. Unlike traditional approaches such as FTP, MFT offers enhanced security protocols, ensuring data privacy during transmission and storage. The best MFT solutions do all this via a user-friendly interface, which is easy to use for even non-technical employees. WHY MFT? The reasons organisations initially adopt MFT solutions are many and varied. However, every organisation which employs the technology soon realises its many and varied benefits. Security MFT employs robust encryption algorithms, reducing the risk of data breaches during transit. Features like Access Control, and Multi-factor Authentication, safeguard sensitive information from unauthorised access. Efficiency MFT automates repetitive tasks. This not only reduces human error, it saves significant staff time. Through scheduling of file transfers, monitoring of progress, and automatic error-handling, it enables a significant boost to operational efficiency. Compliance In industries with strict regulatory requirements, MFT helps companies meet compliance standards (e.g. HIPAA and GDPR) by automatically maintaining detailed logs and audit trails. Scalability Through its ability to handle large file transfers and an ever-growing number of users, MFT is able to grow in sync with an organisation's needs, while maintaining superior performance. Collaboration In addition to improving business processes within an organisation, MFT facilitates seamless collaboration with external partners, suppliers, and customers, fostering strong relationships built on shared trust and reliability. W2 MFT? If all that’s TMI, then the TL;DR is: MFT provides organisations a secure and efficient way to transfer their data. And if you’d like to know more about MFT, then LMK and we can jump OTP. B4N! 😉 Previous Next
- Email Overload Creating Cyber Complacency in Australia | GSA
< News Email Overload Creating Cyber Complacency in Australia 23 Oct 2024 Australians send and receive 8.1 billion emails each day. That makes us the 10th most prolific emailers in the world. And that’s a problem . It’s not just the inbox clutter we’re experiencing (or perhaps, contributing to). It’s the cyber security complacency it’s creating. You see, email continues to represent the single biggest threat to your organisation’s cyber security. The more emails we receive, the greater the risk that a cybercriminal will gain access to your organisation’s data and secrets. Proven Danger Real world tests have proven that the threat posed by Australians’ “email encumbrance” is real. Proofpoint conducted 183 million phishing simulations earlier this year. They observed that almost one in six recipients of a suspicious phishing email failed to protect their organisation’s valuable data. Recipients variously clicked malicious links, succumbed to a bogus password reset, or downloaded ransomware. What leads employees to fall for phishing and malware…? It’s “breach fatigue” – employees who have become complacent and careless about cybersecurity. Cyber Complacency Professor Sanjay Jha, UNSW Lead of the Cybersecurity Cooperative Research Centre, said: “It’s human nature that you start to just get used to certain things. (But) phishing attacks continue. In fact they are getting ever more innovative.” He urged companies to do more to keep personal data safe from hackers. “The problem is that ICT systems are very complex and every day new applications are deployed, and new information is stored and exchanged.” Whole-of-Enterprise Email Protection With escalating email volumes creating a high and persistent risk of cyber incursion, organisations need a systematic way for employees to securely and reliably exchange files and emails with external third parties. Thankfully, there are technical safeguards you can put in place to prevent your employees from accidentally - or negligently, or maliciously - allowing cyber criminals in. Not only will they help protect your organisation from cyber criminals, as a bonus, they’ll also improve your employees’ efficiency. Our SFT Threat Protection Bundle enables your organisation’s email system to automatically detect and prevent phishing links and other malware from entering your organisation. Better still, it can also automatically detect and prevent employees from sharing malware or sensitive information. Active Threat Protection If an employee - knowingly or unknowingly - attempts to share a file containing malware, the files are intercepted and “sanitised”. That is to say: their malicious elements are automatically removed. The SFT Threat Protection Bundle can also go a step further and automatically detect and prevent employees from sharing sensitive information. For example, let’s say a folder has Word or PDF documents, or Jpeg images, which contain Personally Identifiable Information. If an employee attempts to transmit any of these files, a secure ICAP gateway will automatically inspect and block the transfer. Or if you prefer, the gateway can be configured to automatically redact (i.e. mask out) sensitive information from documents and image files while still permitting the remainder of the file to be shared. Free Demonstration If you’d like to see first-hand how our SFT Threat Protection Bundle can help keep your organisation’s data safe, and help beleaguered employees keep their guards up, why not get in touch and have an obligation-free chat with me? At Generic Systems Australia , we’re your local experts in secure managed file transfer. PS: In the three minutes it took you to read this article, almost a billion new emails were sent around the world - many of them to and from Australians! Previous Next
- The GoAnywhere Customer Who Didn’t Panic | GSA
< News The GoAnywhere Customer Who Didn’t Panic 20 Aug 2025 In Douglas Adams’ much-loved work of science-fiction whimsy, The Hitchhiker’s Guide to the Galaxy, the Babel Fish is a small yellow fish inserted into a person's ear to provide instant translation of any language. Described by The Guide as “probably the oddest thing in the universe”*, the Babel Fish is a neat (if somewhat slimy) solution to the pervasive galactic challenge of interspecies communication. It reminds me how GoAnywhere MFT once solved a customer’s pressing “payslip-up”. “But the plans were on display…”* Our customer, a leading provider of human services who employs thousands, had installed a new payroll system. This system, like the outdated system it was replacing, produced employee payslips as PDF files. These were subsequently distributed to employees via a separate Human Resources system. Installation, testing and initialisation of the new payroll system had all gone according to plan. Until, that is, the first pay run was performed. “Have you any idea what these strange symbols are?”* In what The Hitchhiker’s Guide may well have cited as “a practical demonstration of the principles of infinite improbability” employees didn’t receive their payslips. It was soon realised that the problem had occurred because the PDF payslips produced by the new payroll system were formatted differently to the PDFs previously produced by the old one. (The old system had output the PDFs as individual PDF files for each employee, compressed into a zip file. The new system output one PDF file for each employee and, further complicating the situation, the new payslips varied in number of pages.) These PDF formatting changes rendered the output from the new payroll system unreadable by the Human Resources system - a problem which had somehow been overlooked during testing. “The consequences of not knowing any of this stuff are particularly terrible”* This failure of inter-systems communication wasn’t just a problem for the employees, who had understandably grown accustomed to keeping tabs on their earnings, but it created a looming compliance problem for the business. Australia’s Fair Work Act is vexingly inflexible when it comes to the timing of providing employees with payslips. (This is in marked contrast to the famously flexible relationship with time enjoyed by The Guide’s author Douglas Adams, particularly as relates to deadlines). Failure to fix the problem quickly would expose the business to financial penalties, legal consequences and potential union action. “Don’t Panic!”* Heeding the single most important piece of advice in The Hitchhiker’s Guide to the Galaxy , our customer didn’t panic. Instead, they called me to ask whether Generic Systems Australia could help solve their predicament. And - thanks to their installed GoAnywhere Managed File Transfer solution – we could! The Babel Fish* Faster than a Vogon invited to a poetry recital**, our Solutions Architect revised the customer’s GoAnywhere automated file transfer process. GoAnywhere was already collecting the PGP-encrypted PDF from the new payroll system via SFTP, decrypting it, and transferring it to the customer’s Human Resources system. He added to that automated transfer process new logic which split the PDF pages, correctly formatting the output and allowing for payslips of varying page lengths. GoAnywhere was, in effect, performing the role of a computerised Babel Fish. And, thanks to GoAnywhere’s easy to use drag-and-drop interface, it took our Solutions Architect less than half a day to set up the workflows. He didn’t even need a towel***. “If you ever need help again…”* There’s no need to go to the ends of the universe**** to get expert help on file transfers and translations. At Generic Systems Australia , we’re Australia and New Zealand’s experts in helping business take advantage of every one of GoAnywhere’s many capabilities. We’ve assisted hundreds of organisations to automate their data flows, making their file transfers resilient, secure and reliable, and boosting their efficiency. If you’d like to discuss how we can boost your organisation’s efficiency, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how easily we can transition you from your current approach to a galaxy-leading level of productivity. At Generic Systems Australia, we’re your local experts in data transfer. _______________________________________________________________________________________ * A direct quote from The Hitchhiker's Guide to the Galaxy . ** In The Guide , Vogon poetry is described as the third worst in the universe, surpassed only by the poetry of the Azgoths of Kria and the late Paula Nancy Millstone Jennings. It's so bad, it's often used as a form of torture, causing physical pain to the listener. *** The Guide describes a towel as the most massively useful thing an interstellar hitchhiker can have - not just useful for practical purposes like warmth, sunbathing, or even as a weapon, but also with significant psychological value. A hitchhiker who knows where their towel is is seen as someone together and capable, as it implies they also possess other essential items. **** The Guide describes Milliways, the Restaurant at the End of the Universe, as being enclosed in a time bubble and offering a unique floorshow featuring the end of the universe. Previous Next
- Secret Ransomware Payments Rife: Survey | GSA
< News Secret Ransomware Payments Rife: Survey 19 Aug 2024 Pervasive cyberattacks are leading most companies to pay ransoms and break their “Do Not Pay” policies, according to recent research. A poll of IT and security decision-makers conducted by Cohesity found that that most companies have paid a ransom in the last two years. In fact, 79% of respondents said their company had been the victim of a ransomware attack during the second half of 2023. The breadth of an organisation’s “attack surfaces” depends on the size and scope of its data environments. However, 78% of respondents said their data security risk had increased faster than the growth in the data they manage. They also said their organisation’s cyber resilience and data security strategies had not kept pace with emerging threats – only 21% had full confidence in their company’s cyber resilience strategy. Slow Recovery, Lack of Testing Cyber resilience is a critical element of business continuity, and encompasses a company’s ability to recover their data and restore business processes when they suffer a cyberattack or IT outage. Key insights from the survey on this point included: All respondents said they need more than 24 hours to recover data and restore business processes. Only 7% said their company could recover data and restore business processes within 1-3 days. 35% said they could recover and restore in 4 to 6 days, while 34% need 1-2 weeks, and 23% need more than 3 weeks. Only 12% of those surveyed said their company had stress-tested their data security, data management, and data recovery processes or solutions in the six months prior to being surveyed. 46% hadn’t tested in more than 12 months. Secret Ransom Payments While 84% had a “do not pay” policy, Cohesity reported that 94% of respondents divulged that their company would pay a ransom to recover data and restore business processes. 5% said “maybe, depending on the ransom amount”. Two thirds said their company would be willing to pay over US$3M to recover data and restore business processes, and a third said their company would be willing to pay over $5M. Don’t Pay: Prevent! The volume, frequency, and sophistication of ransomware attacks will only increase. And paying ransoms only encourages cyberthieves to escalate their efforts. Worse, if ransoms are seen as “easy money”, new miscreants will be tempted to acquire ransomware tools from the dark web and join the cyber crimewave. Rather than investing in ransoms, organisations need to invest in their cyber resilience. That starts with keeping thieves at bay - protecting valuable data where it is stored, and when it is transferred – and building organisational capability in rapidly responding to and recovering from cyberattacks. Building cyber resilience need not be a drag on an organisation’s efficiency. Automation can ensure data is protected at rest and in motion, requiring little to no manual management. For example, Managed File Transfer (MFT) solutions such as the class-leading GoAnywhere MFT encrypt data at rest and in transit, complying with the highest data security standards (including the US’s and Europe’s HIPAA, HITECH, PCI DSS, SOX, and GDPR). MFT manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols such as SFTP, FTPS, and AS2 to send files securely, and encryption standards such as Open PGP and AES to protect data in transit and at rest. Advanced Threat Protection and Adaptive Loss Prevention add a further layer of defence. SFT Threat Protection enables safe collaboration with external parties, preventing malware from entering your organisation, and reducing opportunities for employees to lose or mishandle sensitive data. Local Expertise Ready to Help Generic Systems Australia are your local experts in Managed File Transfer and Advanced Threat Protection. We’ve assisted hundreds of organisations across the Asia-Pacific region to secure their data, keep cybercriminals at bay… and keep ransomware off the books. If you’d like to discuss improving your cybersecurity, please feel welcome to contact me , Bradley Copson. I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. About the survey: Cohesity’s findings are based on a survey of 902 IT and Security decision-makers (split as close to 50:50 as possible) commissioned by Cohesity and conducted by Censuswide. Survey respondents were polled from businesses in Australia, the United Kingdom, and the United States. The top five industries selected by respondents as best representing the industry their company operates in were: IT & Telecommunications, Finance, Healthcare, Finance, HR, and Manufacturing & Utilities. Previous Next
- The Value of 3rd-Party Reviews | GSA
< News The Value of 3rd-Party Reviews 7 May 2025 Third-party review sites can be a valuable source of insight for IT teams tasked with selecting the best software solution for their organisation. Reputable and long-established sites such as PeerSpot , SoftwareReviews , G2 , and Capterra can help identify which solutions are most widely used and highest rated within your industry. This can in turn help you proceed quickly to a decision on which solution(s) to trial. Reliable Reviewers Whether you’re looking for Managed File Transfer (MFT) solutions or other software, it’s best to prioritise reviews on sites which have established themselves as trustworthy over the test of time and thousands of peer reviews. These sites capture the opinions of real product users sharing their real-life experiences – positive and negative. In fact, Gartner’s 2024 annual study of 2,499 software decision makers found that customer reviews and ratings were the most used information source by buyers, above personalised product demos, user guides, and case studies. More than a third of software buyers described reviews as “extremely important” to their purchase. Are Reviews Trustworthy? It’s illegal in Australia and New Zealand for businesses to create fake or misleading reviews or arrange for others do so. The Australian Competition and Consumer Commission suggests the following red flags may indicate that a review is fake: · a spike in highly positive or negative reviews over a short period of time; · many reviews written from the same email or IP address; · similar reviewers’ names; · generic reviews without specific detail about the business or product; and · reviews written in similar language as other reviews for the same business or product. Thankfully, the trusted third-party sites I listed above have processes in place to weed out dubious software reviews. They also publish the measures they take to assure the validity of the reviews they receive. Other Sources of Insight Beyond peer reviews, here are some other useful resources to consult when selecting the right software solution for your business. · Case studies : Demonstrate how businesses are using the solution; · Product videos : Illustrate solutions’ features and benefits; · Webinars : Subject matter experts demonstrate the configuration and use of the solutions; and · Written Resources : Provide a variety of reader-friendly explanations and examples Local Advice and Guidance At Generic Systems Australia, we have decades of experience installing and supporting the world’s premier MFT , GoAnywhere, across Australia and New Zealand. Founded in 1993, we’re proud to count among our clients some of the region’s most iconic brands. Leveraging our unique skills and readily available local support, they rely on us to make their IT systems more secure and efficient, in turn, making their teams more productive. A long-term partner of Fortra (formerly Help Systems, and Linoma Software, the original authors of GoAnywhere MFT), our in depth understanding of GoAnywhere’s capabilities - including Advanced Workflows, data translation, auditing and compliance, automation and security - enables us to devise optimal deployment solutions, provide rapid Proofs of Concept, and move ahead quickly with implementation. In fact, we have exclusively managed GoAnywhere deployments for some of the region’s largest multinational corporations and Government departments, as well as small- to medium-sized businesses. Our Australia-based technical experts provide clients with the reassurance that local help will always be on-hand. If you’re exploring how to boost your efficiency and bottom line by leveraging Secure Managed File Transfer technology, please feel welcome to contact me for an obligation-free discussion. Or, if you’d prefer to read more, you can check out the many resources on our Generic Systems Australia website, including our exclusive Local MFT Buyer’s Guide . At Generic Systems Australia, we’re your local experts in MFT. Previous Next
- Cybercrime Incident Costs Triple for Australian Enterprises | GSA
< News Cybercrime Incident Costs Triple for Australian Enterprises 21 Oct 2025 The latest Annual Cyber Threat Report from the Australian Cyber Security Centre (ACSC) revealed that the average cost of a cybercrime incident to large Australian businesses has more than tripled year on year. This alarming surge reflects not just the growing sophistication of cybercriminals, but also the expanding attack surface of enterprise systems and the rising stakes of data breaches in an increasingly digitised economy. Why Average Costs are Skyrocketing Several converging factors explain the dramatic escalation in financial impact. High-Value Assets : Large businesses hold vast troves of sensitive data — customer records, intellectual property, financial systems. These are prime targets for ransomware and data exfiltration. Cybercriminals are increasingly tailoring attacks to exploit these assets, demanding higher ransoms and causing deeper operational disruption. Supply Chain Vulnerabilities: Enterprises often rely on complex ecosystems of vendors, partners, and third-party platforms. A breach in one node can cascade across the network, amplifying the damage and complicating response efforts. Regulatory Penalties and Legal Exposure: Stricter data protection laws mean that businesses can incur hefty fines and legal liabilities for a breach. The reputational fallout can also erode customer trust and shareholder value. Extended Downtime and Recovery Costs : Cyber incidents often cripple critical infrastructure, leading to prolonged outages, lost productivity, and expensive recovery operations. For large businesses, even a few hours of downtime can translate into millions in losses. According to the ACSC, the average cost per incident for large organisations has surged from to over AUD $202,000 in just one year. It’s a stark reminder that reactive security is no longer sufficient. MFT: A Strategic Shield One of the most overlooked yet powerful tools in the cybersecurity arsenal is Managed File Transfer (MFT). Unlike ad hoc file sharing methods such as email attachments, cloud drives, or FTP, MFT provides a secure, auditable, and policy-driven framework for exchanging sensitive data. Here’s how MFT — such as the class leading GoAnywhere MFT — helps businesses reduce cybercrime exposure. End-to-End Encryption : MFT platforms encrypt data both in transit and at rest, ensuring that even if intercepted, the contents remain unreadable to unauthorised persons. Access Control and Authentication : Granular permissions, multi-factor authentication, and role-based access prevent unauthorised users from accessing or manipulating files. Automated Workflows and Monitoring : MFT systems can automate file transfers with built-in logging and alerts, reducing human error and enabling rapid detection of anomalies. Compliance and Audit Trails : MFT solutions often include detailed audit logs and compliance reporting features, helping organisations meet regulatory requirements and demonstrate due diligence in the event of an incident. Reduced Shadow IT : By centralising file transfers within a secure platform, MFT reduces the risk of employees using unapproved tools that bypass corporate security controls. From Reactive to Resilient As cyber threats grow in scale and complexity, large businesses need to shift from reactive defence to proactive resilience. This makes investing in secure infrastructure like Managed File Transfer more than a mere technical upgrade. GoAnywhere enables further resilience by providing High Availability and Failover through active-active clustering, enabling multiple GoAnywhere installations to work together in a distributed environment. This way, if one node fails or is compromised, other nodes seamlessly continue processing file transfers and workflows, minimising downtime and maintaining service continuity. The tripling of cybercrime costs is a wake-up call. By securing the channels through which data flows, organisations can close critical gaps, reduce breach likelihood, and contain the “blast radius” when incidents occur. In a landscape where every file could be a vector and every transfer a risk, MFT offers the control, visibility, and security that modern enterprises need. Standing By to Help At Generic Systems Australia , we’re Australia and New Zealand’s experts in helping business take advantage of GoAnywhere’s many capabilities. We’ve assisted dozens of organisations to make their file transfers resilient, secure and reliable — boosting their efficiency in the process. If you’d like to discuss how we can deliver these advantages to your organisation, please feel welcome to get in touch with me. I’m always happy to have an obligation-free chat and explain how easily we can transition you from your current approach to a new world of cyber security and productivity. At Generic Systems Australia, we’re your local experts in data transfer. Previous Next
- Survey finds IT leaders increasingly focussed on PROACTIVE cybersecurity | GSA
< News Survey finds IT leaders increasingly focussed on PROACTIVE cybersecurity 12 June 2024 Australian IT leaders are increasingly focusing on proactive cybersecurity, according to a new survey released today. In a survey conducted by Tenable, IT leaders said that, while the ability to respond to and recover from cyber incidents remained essential, they are now focusing more on preventing such incidents altogether. Preventative measures they are investing in include: access controls and monitoring (64%) regular software updates and patch management (64%), and regular employee training and education on cybersecurity best practices (60%). Dark Tide Rising The most recent Australian Signals Directorate Report shows that cybercrime is on the increase for enterprises. On average, a new report is received every six minutes, up 23% year on year. The average cost of cybercrime has also increased by up to 14%. Saving Ransoms, Reputations, Operating Costs Adopting preventative cybersecurity measures isn’t only saving companies from the costs of cybercrime. Companies who take proactive steps say they are also benefiting from lower cyber insurance premiums. 44% of IT leaders experienced reductions ranging from 5% to 15%. Reductions of that magnitude demonstrate that insurers too are recognising the effectiveness of proactive cybersecurity. Proactive, Layered Defence A proactive strategy for storing, transferring and securing data is essential for keeping cyberthieves at bay. A layered approach - secure file transfer, secure content engines, secure digital rights management, and employee education – is the optimal way to prevent data breaches. At Generic Systems Australia , we recommend the class-leading secure managed file transfer solution, GoAnywhere MFT , to keep data safe - at rest, and in transit. Coupled with our Advanced Threat Protection Bundle , we enable organisations to safely collaborate without exposing systems to the risks of malware gaining a foothold within their IT systems. About The Survey Tenable partnered with Pure Profile to collect data from more than 200 IT and cybersecurity leaders across the insurance, banking, education, healthcare and transport industries in Australia. If you’d like to join the growing number of IT managers taking strong preventative measures to avoid cybercrime, please get in touch with me, Bradley Copson ( mail to :bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. Previous Next
- Ad-Hoc Filesharing Services Add Risk | GSA
< News Ad-Hoc Filesharing Services Add Risk 27 May 2025 Make no mistake - unintentional errors by employees and supply chain partners are a leading cause of data breaches. The uncontrolled use of ad-hoc file sharing services (e.g. WeTransfer, Dropbox, Google Workspace, Cerberus FTP Server, and ShareFile) significantly increases the risk of employees making mistakes and for those mistakes to go unnoticed. Here then are seven reasons why organisations should reconsider their use of ad-hoc cloud file sharing services. 1. They may not enforce automatic file encryption. A key means of preventing your data falling into the wrong hands is to ensure it’s always encrypted, both in transit, as well as when it’s being stored. A secure Managed File Transfer (MFT) solution can automatically encrypt your data. 2. Dubious key and certificate management. Beyond encryption of the file being transferred, some cloud applications leave files open to malicious intent by failing to maintain strong keys and certificates. 3. They may create compliance gaps. Not all cloud platforms meet regulatory requirements around file transfers, leaving your organisation liable for financial, legal, and reputational damages. 4. Limited data control. Unsupervised file sharing and collaboration can lead to files being sent to or accessed by unauthorised individuals. With many cloud-based solutions, once files are transferred, there’s no ongoing control over their use. A secure MFT provides ongoing safeguards with tight controls on who can access, edit, and transfer files, and for how long. 5. No workflow automation. MFT solutions such as GoAnywhere MFT simplify and automate file transfer processes, with multi-step workflows to execute repetitive, manual tasks. "Projects" can be easily created by dragging and dropping modules which define business processes to seamlessly transfer files, eliminating the need for complicated scripting or programming. For example: a Project can be created to retrieve encrypted data from a server, decrypt it, read file contents and submit them to a downstream internal application. The file can also be altered, added to, re-encrypted, and then sent to another external SFTP server. 6. Lack of centralised user management. Cloud file sharing solutions may not provide a comprehensive and easy to use dashboard for administrators to control access, authentication, and encryption of sensitive files. The more tools and applications that must be coordinated, the greater the risk of human or systems error. A robust MFT solution manages all types of file-send situations, including ad-hoc emails, large files, and batch files. 7. Threat detection and management. Protecting your organisation from viruses, malware, ransomware, Advanced Persistent Threats, and banned media types requires constant vigilance. Our Advanced Threat Protection can automatically block these threats and remove the element of human error from your risk profile. Local Expertise Available If you’d like to discuss removing the risk of ad-hoc file sharing applications from your organisation, please feel welcome to contact me . I’m always happy to have an obligation-free discussion, demonstrate the capabilities of the world’s most advanced MFT, and even offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. Previous Next
- How We Became Mr Fixit to Solve a Customer’s ERP Problem | GSA
< News How We Became Mr Fixit to Solve a Customer’s ERP Problem 10 Sept 2025 While GoAnywhere is at core a Managed File Transfer solution, its many advanced features make it useful in lots of other ways. Take, for example, the way we were able to use it to help one of our customers wrestling with deficiencies in their ERP system. FMCG Fix This customer — a well-regarded manufacturer of perishable fast moving consumer goods — is critically dependant on legacy ERP software to accept, analyse and prepare invoices for incoming customer orders. Their ERP system aggregates these orders and alerts suppliers to the quantities of ingredients necessary for the business to fulfil each day’s orders. It also invoices customers for the orders they’ve placed. However, our customer was experiencing an increasingly prevalent problem. Their ERP software was mishandling orders and invoices where customers had changed their mind and amended their order after they’d already been invoiced. Every time the ERP system mishandled one of these amended orders, our customer’s dispatch staff would need to have an IT department colleague manually fix the problem. This was taking 20 minutes each time. And as their business continued to grow, what had once been a minor inconvenience was turning into a major time sink and drain on efficiency. Worse, not only were the manual order corrections wasting more and more valuable employee time, but sometimes, suppliers found themselves unable to provide the additional quantities of ingredients requested too late in the day. Overseas vendor – underdone service Of course, our customer’s first call was to their global ERP software vendor. However, that vendor wouldn’t commit to fixing the deficiency in their software until a future version release, many months away. Our customer needed a workaround until then. GoAnywhere to the Rescue Our customer called us to see whether we could help. And, being locally available and committed to providing excellent customer support, we found a way to do so — quickly! Our expert technician was able to cleverly leverage GoAnywhere’s advanced flexibility in an unexpected way. His solution lay in a novel use of GoAnywhere’s “Secure Forms” functionality. Secure Forms Briefly, GoAnywhere’s Secure Forms enable a business to collect sensitive data and files through customisable, web-based forms, securely transmitted via HTTPS. These forms can be tailored with specific input fields, labels, and file upload components. When submitted, these Forms trigger a GoAnywhere Project — an automated workflow which processes the input, handles file transfers, and returns output files or confirmation messages to users. They streamline data intake, reduce reliance on email or fax, and ensure secure, standardised submissions easily usable by other IT systems. Our technician was able to utilise GoAnywhere’s Secure Forms because they use JDBC (Java Data Base Connectivity) to transfer data from a variety of IT systems to SQL databases. That’s a commonly used kind of database, and unsurprisingly, was the kind of database used by our customer’s legacy ERP system. We were able to leverage GoAnywhere’s functionality to automatically update pricing and order quantities and recalculate totals, enabling invoices to be correctly amended and re-processed. It took us just a few days to design, test and implement this fix. And our happy customer was able to get on with what they were best at: growing their business and creating ever more happy customers of their own! Here to Help At Generic Systems Australia we’re on the ground in your time zone and ready to help your Australian or NZ organisation take advantage of GoAnywhere MFT’s incredibly flexible capabilities. As experts in Managed File Transfer solutions, we’ve assisted businesses of all sizes to protect their customer data and secure their file transfers, keeping their operations running smoothly. If you’d like to discuss how we can help you, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how simply we can help you. Previous Next
