Search Results
164 results found with an empty search
- Understanding your organisation’s obligations for protecting Personal Identifiable Information | GSA
< News Understanding your organisation’s obligations for protecting Personal Identifiable Information 19 Nov 2024 With the Australian Government’s imminent introduction of new cyber security legislation, it’s becoming more important than ever to understand your organisation’s legal responsibilities for protecting Personal Identifiable Information (PII). What is PII? The Australian Signals Directorate (ASD) – Australia’s top government cyber security agency – says that personal data includes a broad range of information that could identify an individual. That may include an individual’s: Name Date of birth Address Medical records Racial/ethnic origin Political opinion Religious beliefs Gender Sexual orientation or practices Criminal record Payment details Email address Password License Photo Video Phone number Passport Employment information Biometrics, such as voice prints and facial recognition The Office of the Australian Information Commissioner (OAIC) extends that definition even further, saying it can include: Signatures Credit information IP addresses Trade union membership and associations Genetic information The OAIC cautions that sensitive information has a higher level of privacy protection than other personal information. It includes in that definition race and ethnicity, political opinions and associations, religious and philosophical beliefs, trade union membership and associations, sexual orientation and practices, criminal record, health or genetic information and some aspects of biometric information. Importantly, personal data is often greater than the sum of its parts. When seemingly innocuous data is aggregated or combined, it can be used to form a more complete picture about an individual. What Existing Laws Require The Privacy Act 1988 sets out how organisations must handle personal information, and applies to organisations with an annual turnover of more than $3 million, unless they’re a small business operator, registered political party, state or territory authority or a prescribed instrumentality of a state. Some small business operators do have obligations under the Act. These include: private sector health service providers businesses that sell or purchase personal information credit reporting bodies, contracted service providers for the Australian Government employee associations businesses accredited under the Consumer Data Right System businesses that have opted-in to the Privacy Act businesses related to a business covered by the Privacy Act businesses prescribed by the Privacy Regulation 2013 . New Obligations Incoming In October 2024, The Australian Government introduced to parliament the Cyber Security Act 2024, Australia’s first standalone cyber security legislation. If passed as expected, this new Act will impose new compliance and reporting requirements on Australian businesses. The Act is designed to address seven initiatives within the 2023-2030 Australian Cyber Security Strategy , including: • Mandating minimum cyber security standards for smart devices • Mandatory ransomware reporting for certain businesses to report ransom payments • A ‘limited use’ obligation for the National Cyber Security Coordinator and the Australian Signals Directorate • Establishment of a Cyber Incident Review Board. The legislation will also progress and implement reforms under the Security of Critical Infrastructure Act 2018 (SOCI Act) : • Clarifying existing obligations in relation to systems holding business critical data • Simplifying information sharing across industry and Government • Introducing Government powers to direct entities to address serious deficiencies within their risk management programs • Moving regulation for the security of telecommunications into the SOCI Act . Legal firm A&O Shearman cautioned that the new Cyber Bill will introduce several new critical areas of compliance and reporting. It advised businesses to take heed of these new obligations, and ensure they put in place robust cyber security measures. • Ransomware Reporting Obligations: Entities impacted by cyber security incidents and making ransomware payments must report these payments within 72 hours. • Security Standards for Smart Devices: The Cyber Bill mandates that manufacturers and suppliers of smart devices comply with specified security standards. • Protected or Limited Use of Incident Information: The Cyber Bill includes provisions to ensure that information provided about cyber security incidents is used or disclosed only for permitted purposes, with strict limitations on using this information for civil or regulatory actions against the reporting entity. • Cyber Incident Review Board: The new Board will review certain cyber security incidents and make recommendations. It will have the authority to require documents. A&O Shearman said organisations should make sure they implement security standards in compliance with the specified security measures currently provided for in the Cyber Bill, and make sure they can comply with the ransomware reporting obligations, including the timelines foreseen in the Cyber Bill. ASD Advice on Data Security Practices ASD says that, for businesses to be confident they’re employing appropriate data security practices, they should consider implementing these measures: Create a register of personal data Limit personal data collected Delete unused personal data Consolidate personal data repositories Control access to personal data Encrypt personal data Back up personal data Log and monitor access to personal data Implement secure Bring Your Own Device practices Report a data breach involving personal data ASD warned that “businesses cannot afford to forgo investing in their security, and risk compromising the security of their customers’ personal data. The prevalence of data breaches and ransomware attacks underscores the importance of sound security practices. Businesses cannot afford to assume that they will not be targeted. Investing in security proactively can be far more cost effective than having to manage the repercussions and costs of a major data breach”. Solutions to Help Meet PII Obligations Cyber criminals succeed when organisations don’t adequately protect their data transfers and systems access. Keeping the thieves at bay requires a multi-layered strategy, including robust data transfer protection, multifactor authentication and employee training. Managed File Transfer (MFT) solutions such as the class-leading GoAnywhere MFT encrypt data at rest and in transit, complying with the highest data security standards. MFT manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols such as SFTP, FTPS, and AS2 to send files securely, and encryption standards such as Open PGP and AES to protect data in transit and at rest. GoAnywhere MFT also provides audit reports, which will help organisations meet the new reporting and compliance needs. All file transfer and administrator activity is stored and easily searchable. To help organisations report on file transfer activity and remain compliant with the new legislation, these audit logs can be automatically generated and provided as PDFs. Advanced Threat Protection adds a further layer of defence. SFT Threat Protection enables safe collaboration with external parties, preventing malware from entering an organisation, and reducing the risk of employees losing or mishandling sensitive data. Local Experts Here to Help Generic Systems Australia are your local experts in Managed File Transfer solutions. We’ve assisted dozens of organisations across the Asia-Pacific region to secure their data and keep cybercriminals at bay. If you’d like to discuss improving your cybersecurity, please feel welcome to contact me, Bradley Copson . I’m always happy to have an obligation-free discussion, explain how simply we can transition you to the latest software and approaches, and even offer you a zero-cost Proof of Concept. Previous Next
- Local Businesses most at risk of Phishing Attacks: study | GSA
< News Local Businesses most at risk of Phishing Attacks: study 9 Apr 2024 A new study has found that employees in the Asia-Pacific region are more likely than any others worldwide to unwittingly expose their organisation to cybercrime. Fortra's newly-released study found 10% of employees worldwide will open a ‘phishing’ email sent to them. In Asia-Pacific, that number climbs to 14.9% – worse than any other region. Even more concerningly, 61% of those who fall for a bogus email will go on to disclose their password. The results of the experiment demonstrate the serious ongoing threat to local organisations posed by employees who are either uneducated on cybersecurity threats, or unmotivated to mitigate those risks. If you would like a copy of Fortra's report on the study, including helpful advice on how to address your cybersecurity challenges, please let me know – I’ll be happy to send you a copy. #mft #managedfiletransfer #sft #securefiletransfer #cybersecurity Previous Next
- error | GSA
Awkward... This page isn’t available. Go Home
- error | GSA
Awkward... This page isn’t available. Go Home
- error | GSA
Awkward... This page isn’t available. Go Home
- error | GSA
Awkward... This page isn’t available. Go Home
- error | GSA
Awkward... This page isn’t available. Go Home
- Don’t Let Your Data Be Lost in Cyber Space | GSA
< News Don’t Let Your Data Be Lost in Cyber Space 2 Sept 2025 In this digital age, our businesses depend on the seamless movement of files to operate efficiently. From financial reports and customer data to product designs and legal documents, files are the lifeblood of a modern organisation. However, despite sophisticated networks and cloud-based tools, files still vanish into cyberspace, leading to business disruption, unhappy customers and confused suppliers. The reasons files go missing are often quite mundane. Perhaps they were intercepted, having been sent via unsecured email. Perhaps their transfer failed silently and unknown, due to a network glitch. Maybe an employee uploaded the document to the wrong folder, or worse, to the wrong server. Legacy systems, manual processes, and ad hoc workarounds compound the problem. Without proper oversight, files can be lost, duplicated, corrupted, or exposed—leading to compliance violations, reputational damage, and costly delays. Avoid Data Danger, Will Robinson! This is where Managed File Transfer (MFT) technology steps in—not as a patchwork fix, but as a strategic upgrade. MFT provides a secure, automated framework for transferring files across internal systems, external partners, and cloud environments. It replaces risky methods like FTP, email attachments, and consumer-grade sharing apps with encrypted, policy-driven workflows. Security and Reliability MFT platforms use robust encryption protocols (like SFTP, FTPS, HTTPS) to protect data in transit. Authentication mechanisms ensure only authorised users can initiate or receive transfers. Files are tracked from origin to destination, with detailed logs and alerts for failures or anomalies. This means no more blind spots—every movement is visible, verifiable, and recoverable. Compliance and Control For industries bound by regulations (finance, healthcare, government), MFT offers built-in compliance features. Audit trails, role-based access, and data retention policies help meet demanding standards like GDPR, HIPAA, and ISO 27001. Administrators can monitor activity in real time, enforce file naming conventions, and prevent unauthorised access or data leakage. Automation and Integration Beyond security, MFT streamlines operations. It integrates with ERP systems, cloud storage, and APIs to automate recurring transfers—like nightly batch jobs or supplier updates. This reduces human error and frees up IT teams to focus on higher-value tasks. Some platforms even support conditional logic, retry mechanisms, and load balancing to ensure mission-critical transfers never fail silently. Scalability and Visibility As organisations grow, so does the complexity of their data flows. MFT scales effortlessly, handling thousands of transfers per day across geographies and departments. Dashboards provide a centralised view of all activity, making it easy to spot bottlenecks, troubleshoot issues, and optimise performance. In short, Managed File Transfer transforms chaotic, error-prone file sharing into a disciplined, auditable process. It’s not just a tool—it’s a safeguard against digital entropy. For organisations juggling sensitive data across borders and platforms, MFT ensures that files don’t just travel—they arrive, intact and accounted for. From “Lost in Space” to “Found, Locally” At Generic Systems Australia we’re Australia’s and NZ’s experts in deploying Managed File Transfer solutions. We’ve assisted businesses of all sizes to protect their customer data and secure their file transfers, while keeping their operations running smoothly. If you’d like to discuss how we can help you, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how simply we can help you maintain your customers’ trust. Previous Next
- Rate Rise Should Spur Rethink | GSA
< News Rate Rise Should Spur Rethink 13 Nov 2023 Following the Reserve Bank’s decision to further hike interest rates, it’s timely for business leaders to explore how they can minimise any negative impacts on their companies. Rowan Tracey, Partner at HLB Mann Judd , Australian businesses would need to “find efficiencies and cut operating costs”. “The Reserve Bank’s decision … will impact business margins, particularly small to medium businesses with high debt and low capital. The natural reflex for businesses is to raise prices to even out the balance sheet, which would be fine in a more buoyant economy. (But) rising fuel prices and cost of living already has many scrambling to find ways of cutting costs, including their current expenditure.” Rowan offers these alternative suggestions to businesses wanting to maintain margins without imposing price hikes: 1. Improve Productivity & Efficiency: Review processes and output and look at ways to improve or streamline your operations, such as automation of processes including business software. 2. Strategically Cut Costs: Review your current service providers and contracts and compare to the current market. 3. Revisit Your Banking & Financial Products: Look beyond the short-term and make sure the interest rate on your business loans is competitive. 4. Develop a Pricing Strategy : Look at ways to leverage or bundle existing goods and services. 5. Reconsider Your Supply Chain : Consider reducing risks by finding a domestic supplier to slash the costs of freight and storage. 6. Review Workforce Arrangements: Consider offering flexible work arrangements, nine-day fortnights, and training and development opportunities - particularly those subsidised by government. One way to address Item #1 (“Improve Productivity and Efficiency”) is to reconsider how your business transfers data. Moving data – between employees, with customers, and with your supply chain partners – is now a “core process” for every modern business. That makes it a target for improving efficiency and productivity. A Managed File Transfer solution, such as GoAnywhere MFT, is more cost-effective and efficient than having your staff waste time on old-fashioned and risky manual approaches. In fact, a study by Aberdeen Group found that businesses which invested a little in a professional Managed File Transfer solution had a median return of almost 500 times their investment! Generic Systems Australia are your local experts in file transfer technologies. Contact me if you’d like an obligation-free discussion , no cost trial, or Proof of Concept showing how GoAnywhere could boost your business’s productivity. Previous Next
- MFT as your Middleware! | GSA
< News MFT as your Middleware! 4 Nov 2025 Modern enterprises are constantly navigating the flow of information between intricate internal systems and external cloud services. Regardless of whether that flow is inside or outside of the corporate firewall, the need for secure and efficient data transfer remains paramount. Traditional solutions like Extract Transfer Load (ETL) systems help process and store data within a central warehouse, while Enterprise Service Buses (ESBs) serve as hubs that manage and monitor data and service flows across various applications. Yet, despite their strengths, these tools fall short when it comes to security—especially when third-party interactions are involved. This gap between integration and security has left organisations searching for a more unified approach. More than MFT Enter GoAnywhere MFT , a solution which redefines what managed file transfer can be. Unlike conventional MFT platforms, GoAnywhere functions as a lightweight ETL, a capable ESB, and a robust MFT tool—all rolled into one. What truly distinguishes GoAnywhere is its unwavering focus on security, making it one of the few platforms that can meet the growing demand for secure and seamless data exchanges both within and beyond enterprise boundaries. GoAnywhere offers the same automation and integration capabilities found in ETL, ESB, and Enterprise Application Integration solutions. It enables organisations to connect internal systems with cloud-based resources and external partners, including banks, credit card providers, financial data services, foreign exchange markets, and retirement or pension systems. When needed, GoAnywhere can also act as middleware, integrating with existing ETL setups while managing system connections, securing communications, and streamlining integration processes. Even for enterprises already equipped with ETL tools, GoAnywhere enhances data transfer security by introducing multiple layers of protection. Its architecture includes a multi-tier setup featuring the GoAnywhere Gateway, which operates as a reverse proxy in the DMZ to shield data from internet threats. Additionally, organisations can deploy a Secure ICAP Gateway—a deep content inspection engine that blocks malicious content from infiltrating through third-party interfaces. Security is further reinforced through integration with Fortra Threat Brain, a comprehensive threat intelligence database that proactively identifies and blocks suspicious IP addresses before they can breach the network. On-Prem, Off-Prem... Anywhere Another standout feature of GoAnywhere is its ability to bridge the divide between on-premises systems and cloud-based applications. Unlike typical SaaS middleware platforms, which often struggle to accommodate legacy systems, segmented networks, and hybrid environments, GoAnywhere centralises and secures file transfers across all these domains. It’s not limited to one environment, making it a truly versatile solution for enterprises with complex infrastructures. For organisations aiming to enhance operational efficiency, GoAnywhere offers a high-performance middleware platform that supports secure and high speed data transfers. It interfaces with a wide array of systems, applications, and cloud services, protects files from malware, enforces zero trust principles regardless of file destination, and ensures data remains outside the DMZ. Recognised globally as a leading MFT solution, GoAnywhere is celebrated for its security, adaptability, and ability to operate wherever and however enterprises need it. It’s increasingly becoming the connective tissue between disparate systems and workflows. Local Help On Hand At Generic Systems Australia , we bring years of experience helping IT teams across Australia and New Zealand optimise their file transfers and safeguard their data using GoAnywhere MFT. From assessing legacy systems to offering zero-cost Proof of Concepts and seamless Migration Services, we ensure businesses can transition to more secure practices without disruption. If you’re interested in exploring how GoAnywhere can benefit your organisation, feel free to reach out for an obligation-free conversation. At Generic Systems Australia, we’re proud to be Australia’s and New Zealand’s experts in Managed File Transfer. Previous Next
