Search Results
184 results found with an empty search
- SES Encrypts and Audits Global Client Data | GSA
< Case Studies SES Encrypts and Audits Global Client Data Decad es of experience helping Asia-Pacific customers have established Generic Systems Australia as our region’s local experts in secure managed file transfer. In this case study, we share how global experts in operational resilience – SES – take advantage of GoAnywhere MFT , the world’s leading MFT solution , to manage the transfer of more than 2,000 files daily. Software escrow agreements are becoming increasingly common for organisations worldwide. Medium and large enterprises, especially those in retail, energy, and financing, rely on these agreements to provide coverage for the unique source code, files, and other software assets critical to a company’s intellectual property. To prevent loss of this information during sudden downtime, a data breach, or natural disaster, organisations create a software escrow agreement with a third-party vendor to protect and back up their data. The third party then takes the data, creates an inventory of everything that’s to be escrowed, and puts the source code and other assets into a vault for maximum protection. SES is a third-party vendor that provides software escrow agreements, intellectual property protection, and cybersecurity risk management globally. Based in Manchester, UK, SES has more than twenty years of experience providing security to more than 2,500 professionals in 40+ countries. "Dealing with software escrow agreements is our bread and butter," said Tom Sweet, Information Security and Systems Manager at SES. It’s an area of constant growth and adjusting to keep clients happy and source code regularly updated. We are continually developing and innovating.” Often, SES does this with tools such as GoAnywhere MFT. For SES, GoAnywhere Managed File Transfer (MFT) has been a well-used and finely-tuned addition to its cybersecurity solutions. With the software in place, it performs on average nearly 2,000 uploads for clients per day — a mix of small and large files — as well as help monthly and quarterly businesses with their source code deposits. Switched from Manual File Transfers to Managed File Transfer Before GoAnywhere came into the picture, SES used a web gateway, an AWS-backed instance, to receive source code for its clients. It also occasionally used old-fashioned file transfer methods: physical disks and SD cards that were tracked, signed for, and had a direct chain of custody which could be followed. While this mixed process — AWS-backed instance and physical mail — worked at the time, it still lacked the ability to track user and file transfer activity. Having an audit trail was important to the business. When auditing also became a client requirement, SES looked for a way to streamline, structure, encrypt, and audit the exchange of data. SES handled a high volume of file transfers and needed robust security practices for the data it processed and stored every week. So the it was time to find a centralised solution which could do all of this and meet its trading partners’ needs. The tracked-and-signed file transfer processes SES used led to an evaluation of GoAnywhere MFT, a robust and fast-growing product which used similar techniques (tracking, signing, and a clear chain of custody) for sensitive file transfers. GoAnywhere was a hit. It took Tom Sweet mere days to learn the product. He attended two webinars, then jumped in and followed his intuition. The turnaround had to be quick, but the learning curve was straightforward. SES implemented GoAnywhere across its Linux systems and has depended on it ever since for day-to-day file transfers, streamlined encryption, and consistent auditing. Benefit#1: File Encryption and Security With GoAnywhere fully implemented, SES has been able to ensure all file transfers sent by its clients are encrypted in transit and sent to the right place. SES has also ensured that encryption keys are held separately. These are just two of the strict requirements SES needs to follow for its clients in order to stand out in a sea of escrow and backup service platforms. "It’s risk versus security," Tom said. "With HR and payroll data, the risk is high, so the security needs to be high as well."nearly 2,000 uploads for clients per day — a mix of small and large files — as well as help monthly and quarterly businesses with their source code deposits. Benefit#2: Fast File Transfer & Trading Partner Setup New trading partners and file transfer users can be set up in minutes. "Less than that if I’m rushed," Tom said. "The quickest ones we’ve had people test: I’ve sent the email saying here’s your username, sent the password out over SMS, and people test the log-in within 10 minutes." Sweet uses private and public keys to ensure the encryption and validity of the new transfers he creates. When the file transfers are executed, most run, start to finish, in less than 30 minutes. Benefit #3: Ease of Use & Automation "The main thing we use GoAnywhere for is managing users, auditing the logs, and giving users a secure gateway into our systems that would normally be firewalled," Tom, said. All of this is simple with GoAnywhere, and he believes the product’s biggest strength is its ease of use. Whether he needs to streamline, update, or re-deploy the product across systems and users, the process has been painless. Automation is another huge benefit of GoAnywhere. SES use GoAnywhere to do the heavy lifting for SaaS-based clients. These clients transfer large amounts of source code end data that are pushed into a SaaS escrow and captured in real time. "We help these clients configure a script that connects over SFTP to a GoAnywhere service," Tom said. "GoAnywhere then audits those transfers." The product securely transfers and audits at the same time, all automatically for nearly 60 clients who need their source code updated on a daily or monthly frequency. This enables SES to automate on Windows and Linux to meet the security requirements of each client. GoAnywhere’s granular security controls enabled Sweet to make GoAnywhere as safe and security-driven as possible against internal risks and user errors. "I stripped it back to who can do what," he said. Previously shared passwords were locked down. Web users were restricted to only the areas of the product they needed, and file storage was controlled — files could only be stored in the right areas of the network. "If someone in a company wanted access to the transfers, or to the systems, they could break the loop to that cycle. So that’s why we vault [client data] and back it up in an encrypted format. We make sure the file transfers are encrypted; that’s key too." Benefit#4: Regulation Compliance Many SES clients have compliance requirements which SES must meet. To achieve these needs, SES has applied ISO 27001 compliance across all clients to ensure all information sent between SES and other companies is secure. "ISO 27001 mandates that we create policies, processes, and procedures which we can prove using evidence-based systems," Tom said. "This says, ‘Okay, by default, you [the client] get all of this [security]. All files will be encrypted, and all second factor messages will be sent out-of-band so they aren’t sent over the same method of communication, and so on." Meanwhile, while encryption is the same and applied for everyone, clients can choose if they want to use multi-factor authentication (MFA) with passwords or SSH keys for an extra layer of security. GoAnywhere offers multi-factor authentication methods, including keys and certificates, for increased file protection. SES also uses GoAnywhere to encrypt every backup of escrow data that is then kept in offline vaults. "This ensures there’s 99.9% availability," Tom said. "No one thinks escrow is important until it’s too late," he added, so SES provides these offline backups with GoAnywhere’s help to give organisations peace of mind. Benefit#5: Auditing and Administration One of the biggest justifications for purchasing GoAnywhere was its auditing functionality. Tom and his team uses these audit logs to see who is connecting to their SFTP servers, what they’re doing on those servers, and how much they’ve done. This level of detail is critical, especially when dealing with sensitive escrow documents, software assets, and source code. "The log-in and auditing process in GoAnywhere is important for our information security standards. We audit the transfers not just to be able to take them securely, but also to prove who has been on and transferred what and when. The audit trail is important." If Sweet needs to change something, GoAnywhere makes it easy. Admins can make modifications or adjustments to their processes to keep constant with security requirements. "We can do this with GoAnywhere very easily," he said. "Then we just send out a new host key to our clients." What’s Next: Remote Agents and Advanced Workflows Right now, SES retrieves files from clients. But in the near future, it hopes to roll out GoAnywhere Remote Agents and GoAnywhere Advanced Workflows for customers who want zero involvement in the file transfer process. With these features enabled, Sweet and his team will be able to pull data from each client when needed without requiring manual work or engagement on their end. "Remote agents and advanced workflows will enable us to go out, talk to, and pull the requests for daily, weekly, or monthly file transfers," Tom explained. One Admin, One Product Tom Sweet has used GoAnywhere for four years. As the main product administrator, he’s always looking for new ways to implement the software, integrate it with other web and cloud services, roll it out as part of security-client processes, and improve the success of GoAnywhere at SES. "I want to get as much out of the product as I can," Tom said, reflecting on being the singular admin for GoAnywhere. "The more I push it out, the more we get a better return from our customer experience." And for any organisation — SES included — customer satisfaction is top priority. GoAnywhere’s encryption, automation, and ease of use help make that happen. Previous Next
- Email Overload Creating Cyber Complacency in Australia | GSA
< News Email Overload Creating Cyber Complacency in Australia 23 Oct 2024 Australians send and receive 8.1 billion emails each day. That makes us the 10th most prolific emailers in the world. And that’s a problem . It’s not just the inbox clutter we’re experiencing (or perhaps, contributing to). It’s the cyber security complacency it’s creating. You see, email continues to represent the single biggest threat to your organisation’s cyber security. The more emails we receive, the greater the risk that a cybercriminal will gain access to your organisation’s data and secrets. Proven Danger Real world tests have proven that the threat posed by Australians’ “email encumbrance” is real. Proofpoint conducted 183 million phishing simulations earlier this year. They observed that almost one in six recipients of a suspicious phishing email failed to protect their organisation’s valuable data. Recipients variously clicked malicious links, succumbed to a bogus password reset, or downloaded ransomware. What leads employees to fall for phishing and malware…? It’s “breach fatigue” – employees who have become complacent and careless about cybersecurity. Cyber Complacency Professor Sanjay Jha, UNSW Lead of the Cybersecurity Cooperative Research Centre, said: “It’s human nature that you start to just get used to certain things. (But) phishing attacks continue. In fact they are getting ever more innovative.” He urged companies to do more to keep personal data safe from hackers. “The problem is that ICT systems are very complex and every day new applications are deployed, and new information is stored and exchanged.” Whole-of-Enterprise Email Protection With escalating email volumes creating a high and persistent risk of cyber incursion, organisations need a systematic way for employees to securely and reliably exchange files and emails with external third parties. Thankfully, there are technical safeguards you can put in place to prevent your employees from accidentally - or negligently, or maliciously - allowing cyber criminals in. Not only will they help protect your organisation from cyber criminals, as a bonus, they’ll also improve your employees’ efficiency. Our SFT Threat Protection Bundle enables your organisation’s email system to automatically detect and prevent phishing links and other malware from entering your organisation. Better still, it can also automatically detect and prevent employees from sharing malware or sensitive information. Active Threat Protection If an employee - knowingly or unknowingly - attempts to share a file containing malware, the files are intercepted and “sanitised”. That is to say: their malicious elements are automatically removed. The SFT Threat Protection Bundle can also go a step further and automatically detect and prevent employees from sharing sensitive information. For example, let’s say a folder has Word or PDF documents, or Jpeg images, which contain Personally Identifiable Information. If an employee attempts to transmit any of these files, a secure ICAP gateway will automatically inspect and block the transfer. Or if you prefer, the gateway can be configured to automatically redact (i.e. mask out) sensitive information from documents and image files while still permitting the remainder of the file to be shared. Free Demonstration If you’d like to see first-hand how our SFT Threat Protection Bundle can help keep your organisation’s data safe, and help beleaguered employees keep their guards up, why not get in touch and have an obligation-free chat with me? At Generic Systems Australia , we’re your local experts in secure managed file transfer. PS: In the three minutes it took you to read this article, almost a billion new emails were sent around the world - many of them to and from Australians! Previous Next
- How We Became Mr Fixit to Solve a Customer’s ERP Problem | GSA
< News How We Became Mr Fixit to Solve a Customer’s ERP Problem 10 Sept 2025 While GoAnywhere is at core a Managed File Transfer solution, its many advanced features make it useful in lots of other ways. Take, for example, the way we were able to use it to help one of our customers wrestling with deficiencies in their ERP system. FMCG Fix This customer — a well-regarded manufacturer of perishable fast moving consumer goods — is critically dependant on legacy ERP software to accept, analyse and prepare invoices for incoming customer orders. Their ERP system aggregates these orders and alerts suppliers to the quantities of ingredients necessary for the business to fulfil each day’s orders. It also invoices customers for the orders they’ve placed. However, our customer was experiencing an increasingly prevalent problem. Their ERP software was mishandling orders and invoices where customers had changed their mind and amended their order after they’d already been invoiced. Every time the ERP system mishandled one of these amended orders, our customer’s dispatch staff would need to have an IT department colleague manually fix the problem. This was taking 20 minutes each time. And as their business continued to grow, what had once been a minor inconvenience was turning into a major time sink and drain on efficiency. Worse, not only were the manual order corrections wasting more and more valuable employee time, but sometimes, suppliers found themselves unable to provide the additional quantities of ingredients requested too late in the day. Overseas vendor – underdone service Of course, our customer’s first call was to their global ERP software vendor. However, that vendor wouldn’t commit to fixing the deficiency in their software until a future version release, many months away. Our customer needed a workaround until then. GoAnywhere to the Rescue Our customer called us to see whether we could help. And, being locally available and committed to providing excellent customer support, we found a way to do so — quickly! Our expert technician was able to cleverly leverage GoAnywhere’s advanced flexibility in an unexpected way. His solution lay in a novel use of GoAnywhere’s “Secure Forms” functionality. Secure Forms Briefly, GoAnywhere’s Secure Forms enable a business to collect sensitive data and files through customisable, web-based forms, securely transmitted via HTTPS. These forms can be tailored with specific input fields, labels, and file upload components. When submitted, these Forms trigger a GoAnywhere Project — an automated workflow which processes the input, handles file transfers, and returns output files or confirmation messages to users. They streamline data intake, reduce reliance on email or fax, and ensure secure, standardised submissions easily usable by other IT systems. Our technician was able to utilise GoAnywhere’s Secure Forms because they use JDBC (Java Data Base Connectivity) to transfer data from a variety of IT systems to SQL databases. That’s a commonly used kind of database, and unsurprisingly, was the kind of database used by our customer’s legacy ERP system. We were able to leverage GoAnywhere’s functionality to automatically update pricing and order quantities and recalculate totals, enabling invoices to be correctly amended and re-processed. It took us just a few days to design, test and implement this fix. And our happy customer was able to get on with what they were best at: growing their business and creating ever more happy customers of their own! Here to Help At Generic Systems Australia we’re on the ground in your time zone and ready to help your Australian or NZ organisation take advantage of GoAnywhere MFT’s incredibly flexible capabilities. As experts in Managed File Transfer solutions, we’ve assisted businesses of all sizes to protect their customer data and secure their file transfers, keeping their operations running smoothly. If you’d like to discuss how we can help you, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how simply we can help you. Previous Next
- Accidental Accomplices…? | GSA
< News Accidental Accomplices…? 21 May 2024 Are your employees your organisation’s biggest cybersecurity threat…? A recent experiment has found that many employees are still prone to leaving sensitive information vulnerable to cyberattacks - even when dealing with emails from an unknown sender. Testing the responses of employees around the world, Fortra found that 10.4% clicked a bogus message’s phishing link - up 3.4% over a similar test in the previous year. Global Worst Practice Alarmingly, the problem is worse in our region than anywhere else in the world, with 14.9% of Asia-Pacific employees succumbing to the phishing attempt. Also shocking was the number of bogus link clickers who then disclosed their passwords. 6 out of every 10 end users who clicked on the phishing email links failed to recognise the phishing website and exposed their organisation to cybertheft by sharing their password. The results of the experiment demonstrate the serious ongoing threat to local organisations posed by employees who are either uneducated on cybersecurity threats, or unmotivated to mitigate those risks. Protecting Your Organisation from Accidental Accomplices Clearly, ongoing employee education must be part of your defensive posture. But there are also key technical safeguards you can put in place to prevent your employees from becoming accidental accomplices to cybercriminals. Our SFT Threat Protection Bundle enables your organisation’s email system to automatically detect and prevent phishing links and other malware from entering your organisation. Combining the layered strengths of GoAnywhere MFT and Clearswift, it enables your team to receive and share information securely, without impairing their productivity. How It Works The SFT Threat Protection Bundle seamlessly integrates managed file transfer with advanced threat protection and adaptive data loss prevention to keep your sensitive data secure. It not only prevents malware from entering your organisation, it also prevents employees from losing or mishandling data. For example, if an employee knowingly (or unknowingly) attempts to share any files containing malware, those files are sanitised by having the malicious elements automatically removed. The SFT Threat Protection Bundle can also automatically detect and –– if you configure it to do so –– prevent employees from sharing sensitive information. For Example Let’s say a folder contains Word or PDF documents or Jpeg image files which contain Personally Identifiable Information (PII). If an employee starts to load any of these files into the Secure File Transfer web client, the Clearswift secure ICAP gateway will automatically inspect and block the file. If you prefer, the gateway can automatically redact (i.e. mask out) sensitive PII information from documents and image files, while still enabling the remainder of the file to be shared. Free Demo If you’d like to see first-hand how the SFT Threat Protection Bundle can help keep your organisation’s data safe, get in touch with me, Bradley Copson, and my technical team at Generic Systems Australia. We’re your local experts in secure managed file transfer. And if you’d like a copy of Fortra's Phishing Study Report, including broader advice on how to address your cybersecurity challenges – I’ll be more than happy to send you a copy. #mft #managedfiletransfer #sft #securefiletransfer #cybersecurity Previous Next
- Increased 3rd Party Data Sharing Increases Data Theft Risk | GSA
< News Increased 3rd Party Data Sharing Increases Data Theft Risk 29 July 2024 The inability to track, control and report sensitive content shared with external contacts is a substantial risk for modern enterprises. And that risk appears to be rapidly escalating, as two-thirds of organisations each exchange sensitive data with more than a thousand third parties. These are some of the key findings from a survey conducted recently by Kiteworks, a US-based data security firm. Sensitive Content Kiteworks defines “sensitive content” as the wide variety of content commonly targeted by cyberthieves. It’s content which poses a significant threat to an organisation once bad actors get their hands on it. Sensitive content includes the data of customers and employees — personally identifiable information (PII), protected health information (PHI), and payment card industry (PCI) data. It also includes an organisation’s intellectual property (IP), legal communications and documents, financials, mergers and acquisitions data, and other types of private and confidential information. Kiteworks says that the key problem with sensitive content is how it does not stay in one place. During daily operations, it is shared not only among employees, but also with partners, suppliers, contractors, legal counsel, accountants, auditors, and more. More Comms Channels = More Risk Efficient organisations are always searching for more “frictionless” ways to move their data. However, as their number of communication channels with external parties grows, so too does the potential opportunity for bad actors to intercept and steal the data. That escalating risk is borne out by Kiteworks’ analysis. They found that organisations with more than seven communication tools experience ten plus data breaches, which is 3.5 times higher than the aggregate of those experiencing one to ten breaches. File Size Limits Exacerbate Risks The file size limits imposed by many content communication tools are a key contributor to the risks of moving data. Frustrated employees simply trying to do their jobs will sometimes use insecure and unauthorised consumer-grade file sharing services to bypass organisational limitations. Even for those employees who always follow the rules, the resulting workarounds can trigger significant waste of staff time. More than 30% of organisations surveyed by Kiteworks needed to implement workarounds due to file size limits for email, file sharing, and managed file transfers over 50 times per month. Around 10% said they must do so over 100 times per month. IT Teams Stepping Up Switched-on IT teams are increasingly focused on addressing their organisation’s need to protect sensitive content. A popular solution is to unify communication tools and channels to secure sensitive content communications. Their primary drivers for change may vary – from protecting intellectual property and corporate secrets to mitigating litigation, avoiding regulatory violations and protecting their brand reputation – but the way they are addressing these risks is similar… Control Through Consolidation Consolidating communication tools onto a single platform needs to be a foundational element of an organisation’s cyber defences. By reducing the number of disparate tools used for content communication, they can significantly lower the risk of data breaches and improve operational efficiency. Kiteworks’ survey shows that organisations with fewer communication tools experience fewer breaches. Tool consolidation significantly enhances security. MFT Consolidates, Automates, Improves Efficiency Managed File Transfer (MFT) software is a powerful technology which comprehensively addresses the risks and challenges of moving information within an organisation, and with external suppliers, partners and customers. MFT simplifies the complexities of data transfer by offering centralised control, encryption, and auditing capabilities. A significant advance on traditional approaches, MFT provides enhanced security protocols, ensuring data privacy during transmission and storage. And it does so via a user-friendly interface, which is easy to use for even non-technical employees. In addition to consolidating the plethora of disparate data exchange channels employees create during an organisation’s evolution, MFT technology provides an array of organisation advantages: Security: MFT employs robust encryption algorithms, reducing the risk of data breaches during transit. Features like Access Controls, and Multi-factor Authentication, safeguard sensitive information from unauthorised access. No Size Limit Straitjacket: The best MFT solutions enable organisations to set file size limits appropriate to their teams’ needs. They also offer “persistence protocols” which ensure large files are fully transmitted to their intended destinations. Efficiency: MFT automates repetitive tasks. This not only reduces human error, it saves significant staff time. Through scheduling of file transfers, monitoring of progress, and automatic error-handling, it enables a significant boost to operational efficiency. Compliance: In industries with strict regulatory requirements, MFT helps companies meet compliance standards (e.g. HIPAA and GDPR) by automatically maintaining detailed logs and audit trails. Scalability: Through its ability to handle large file transfers and an ever-growing number of users, MFT is able to grow in sync with an organisation's needs, while maintaining superior performance. Collaboration: In addition to improving business processes within an organisation, MFT facilitates seamless collaboration with external partners, suppliers, and customers, fostering strong relationships built on shared trust and reliability. The Best MFT At Generic Systems Australia, we recommend the industry’s class-leading MFT solution, GoAnywhere MFT . GoAnywhere is consistently declared by independent experts to be the best-in-class MFT solution. Besides achieving the highest overall score in the MFT category, GoAnywhere is also ranked highest for Vendor Capability Satisfaction, including the key dimensions of: • Business Value Created • Breadth of Features • Quality of Features • Product Strategy and Rate of Improvement • Useability and Intuitiveness • Vendor Support • Ease of Data Integration • Ease of Customisation • Availability and Quality of Training, and • Ease of Implementation GoAnywhere MFT's combination of versatility, security, ease of use, and budget-friendliness has propelled it to the top of the MFT market. Gain Expert Local Advice At Generic Systems Australia , we’re Australia’s and the Asia-Pacific region’s experts on MFT in general, and GoAnywhere in particular. If you’d like an obligation-free discussion about how we could help you keep your organisation’s sensitive content safe, please feel welcome to get in touch . We’re always happy to have an obligation-free discussion, and even offer a free Proof of Concept. Previous Next
- Ransomware payments no guarantee | GSA
< News Ransomware payments no guarantee 3 Oct 2025 Paying a ransomware demand is no guarantee that your precious business data will be restored. Research by Veeam found that fewer and fewer companies are actually getting their data back after a ransomware attack. For them, paying the ransom merely makes the full cost of business recovery even greater. Veeam found that only about a third of businesses who paid up recovered their data, down from around half in the prior year. The number of organisations who were able to recover their data without paying up in the same time period was just under a third. Ransomware accounts for 11% of cyber attacks reported to the Australian Signals Directorate (ASD). As of 30 May this year, Australian businesses with an annual turnover of more than $3M must report any ransomware or cyber extortion payments to the government within 72 hours of making the payment or becoming aware of it. At Generic Systems Australia we have decades of experience helping local businesses keep cyber thieves at bay through deployment of the world’s best MFT, GoAnywhere . If you’d like a no-cost, no-obligation discussion about how we could help you, please feel welcome to get in touch with me. Previous Next
- What is ‘MFT’ ... and why should you care | GSA
< News What is ‘MFT’ ... and why should you care 19 Oct 2023 What is ‘MFT’ - and why should you care about it? In today's data-driven world, the seamless and secure exchange of information is key to business efficiency. Managed File Transfer (MFT) is a powerful technology that comprehensively addresses the risks and challenges of moving information, both within an organisation, and with external suppliers, partners and customers. At its core, Managed File Transfer simplifies the complexities of data transfer by offering centralised control, encryption, and auditing capabilities. Unlike traditional approaches, such as FTP, MFT provides enhanced security protocols, ensuring data privacy during transmission and storage. And it does so via a user-friendly interface, which is easy to use for even non-technical employees. Organisations adopt MFT technology for the many benefits it provides. Security: MFT employs robust encryption algorithms, reducing the risk of data breaches during transit. Features like Access Controls, and Multi-factor Authentication, safeguard sensitive information from unauthorised access. Efficiency: MFT automates repetitive tasks. This not only reduces human error, it saves significant staff time. Through scheduling of file transfers, monitoring of progress, and automatic error-handling, it enables a significant boost to operational efficiency. Compliance: In industries with strict regulatory requirements, MFT helps companies meet compliance standards (e.g. HIPAA and GDPR) by automatically maintaining detailed logs and audit trails. Scalability: Through its ability to handle large file transfers and an ever-growing number of users, MFT is able to grow in sync with an organisation's needs, while maintaining superior performance. Collaboration: In addition to improving business processes within an organisation, MFT facilitates seamless collaboration with external partners, suppliers, and customers, fostering strong relationships built on shared trust and reliability. Managed File Transfer technology offers organisations a secure, efficient, and scalable solution for their data transfer needs. By leveraging MFT, businesses can not only streamline their operations but also gain a competitive edge, while ensuring the integrity and confidentiality of their data in today's interconnected digital landscape. Generic Systems Australia is the Asia-Pacific region’s leading provider of secure MFT solutions. If you’d like to explore how your organisations’ efficiency and bottom line could be boosted through MFT technology, please feel free to contact our Business Manager, Bradley Copson, ( bradley@gensys.com.au ) for an obligation-free discussion. Previous Next
- Companies ignoring hack warnings | GSA
< News Companies ignoring hack warnings 4 Oct 2024 Almost half of the businesses warned by Australia’s top cyber security agency of impending hacks didn’t bother to return the phone call. In an alarming disclosure to The Australian Financial Review, the new director-general of the Australian Signals Directorate (ASD), Abigail Bradshaw, said that the agency had contacted organisations 620 times in the last 12 months to tell them it had information “that suggests that you might have a problem”. But of those calls, 280 were never returned. Bradshaw said the agency shared such information because it had been shown to help companies to achieve positive outcomes in the face of escalating threats while enabling The ASD to detect more incidents. Sharing Encouraged The ASD’s alerts are part of a broader government plan to encourage more information sharing. New rules recently announced will permit businesses to share private details with government agencies without concern it will be used against them in future damages claims. That being said, regulators are still tightening the screws on directors and executives to take responsibility for cyber security prevention and recovery. The new laws won’t provide “immunity” for those who fail to prepare in the months or years leading up to a hack. Hacking: this century’s “H-Bomb” Not only is cybercrime financially lucrative for ransomware gangs, but digital attacks are becoming a critical component of geopolitical conflict, Bradshaw said. “The line between state-based actors and criminal actors is becoming finer,” she said. Cybercrime and conflict are set to escalate as quantum computing coupled with artificial intelligence supercharges hacking efforts. The US’s Pentagon described that emerging combination as “the 21st century’s equivalent of the nuclear bomb”. The Australian Financial Review warned that “if you get caught out by a cyberattack which causes broader harm, directors will not be able to talk their way out of trouble by saying they thought their techies had it covered”. Acting on ASD Alerts To mitigate hefty fines and sanctions, directors and executives need to prioritise their time and attention on cyber safety. A Managed File Transfer (MFT) solution such as GoAnywhere MFT can encrypt data at rest and in transit, complying with the highest data security standards. It manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols and encryption to protect data in transit and at rest. Advanced Threat Protection and Adaptive Loss Prevention add a further layer of defence. SFT Threat Protection enables safe collaboration with external parties, preventing malware from entering an organisation, and reducing the risk of employees losing or mishandling sensitive data. Local Experts On Hand Generic Systems Australia are local experts in helping companies deploy Managed File Transfer and Advanced Threat Protection. We’ve assisted hundreds of organisations across Australia and New Zealand to secure their data and keep cybercriminals at bay. If you’d like to discuss how we can help you, please feel welcome to contact me, Bradley Copson. I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. Previous Next
- INFO TECH REPORT 22 | GSA
Info-Tech Report MFT Quadrant Report (2022) Independent analysts Info-Tech compared MFT solutions and vendors in 2022, and found that GoAnywhere MFT was the unsurpassed leader in the field. To receive a Complimentary Copy of their Report, please submit your email address below: First name Last name Enter your email address Phone You'll receive the 'Info-Tech Report MFT Quadrant Report' shortly! RESOURCES Receive Report HOME
- WTH is MFT…? | GSA
< News WTH is MFT…? 31 Mar 2025 In an industry overrun by acronyms, you may be wondering “WTH is MFT?” FWIW, here’s a brief overview. “MFT” is the abbreviation of Managed File Transfer - a powerful technology which comprehensively addresses the risks and challenges of moving information both within an organisation, and externally, to suppliers, partners and customers. MFT simplifies the complexities of data transfer by providing centralised control, encryption, and auditing capabilities. Unlike traditional approaches such as FTP, MFT offers enhanced security protocols, ensuring data privacy during transmission and storage. The best MFT solutions do all this via a user-friendly interface, which is easy to use for even non-technical employees. WHY MFT? The reasons organisations initially adopt MFT solutions are many and varied. However, every organisation which employs the technology soon realises its many and varied benefits. Security MFT employs robust encryption algorithms, reducing the risk of data breaches during transit. Features like Access Control, and Multi-factor Authentication, safeguard sensitive information from unauthorised access. Efficiency MFT automates repetitive tasks. This not only reduces human error, it saves significant staff time. Through scheduling of file transfers, monitoring of progress, and automatic error-handling, it enables a significant boost to operational efficiency. Compliance In industries with strict regulatory requirements, MFT helps companies meet compliance standards (e.g. HIPAA and GDPR) by automatically maintaining detailed logs and audit trails. Scalability Through its ability to handle large file transfers and an ever-growing number of users, MFT is able to grow in sync with an organisation's needs, while maintaining superior performance. Collaboration In addition to improving business processes within an organisation, MFT facilitates seamless collaboration with external partners, suppliers, and customers, fostering strong relationships built on shared trust and reliability. W2 MFT? If all that’s TMI, then the TL;DR is: MFT provides organisations a secure and efficient way to transfer their data. And if you’d like to know more about MFT, then LMK and we can jump OTP. B4N! 😉 Previous Next

