Search Results
172 results found with an empty search
- Cybercrime Incident Costs Triple for Australian Enterprises | GSA
< News Cybercrime Incident Costs Triple for Australian Enterprises 21 Oct 2025 The latest Annual Cyber Threat Report from the Australian Cyber Security Centre (ACSC) revealed that the average cost of a cybercrime incident to large Australian businesses has more than tripled year on year. This alarming surge reflects not just the growing sophistication of cybercriminals, but also the expanding attack surface of enterprise systems and the rising stakes of data breaches in an increasingly digitised economy. Why Average Costs are Skyrocketing Several converging factors explain the dramatic escalation in financial impact. High-Value Assets : Large businesses hold vast troves of sensitive data — customer records, intellectual property, financial systems. These are prime targets for ransomware and data exfiltration. Cybercriminals are increasingly tailoring attacks to exploit these assets, demanding higher ransoms and causing deeper operational disruption. Supply Chain Vulnerabilities: Enterprises often rely on complex ecosystems of vendors, partners, and third-party platforms. A breach in one node can cascade across the network, amplifying the damage and complicating response efforts. Regulatory Penalties and Legal Exposure: Stricter data protection laws mean that businesses can incur hefty fines and legal liabilities for a breach. The reputational fallout can also erode customer trust and shareholder value. Extended Downtime and Recovery Costs : Cyber incidents often cripple critical infrastructure, leading to prolonged outages, lost productivity, and expensive recovery operations. For large businesses, even a few hours of downtime can translate into millions in losses. According to the ACSC, the average cost per incident for large organisations has surged from to over AUD $202,000 in just one year. It’s a stark reminder that reactive security is no longer sufficient. MFT: A Strategic Shield One of the most overlooked yet powerful tools in the cybersecurity arsenal is Managed File Transfer (MFT). Unlike ad hoc file sharing methods such as email attachments, cloud drives, or FTP, MFT provides a secure, auditable, and policy-driven framework for exchanging sensitive data. Here’s how MFT — such as the class leading GoAnywhere MFT — helps businesses reduce cybercrime exposure. End-to-End Encryption : MFT platforms encrypt data both in transit and at rest, ensuring that even if intercepted, the contents remain unreadable to unauthorised persons. Access Control and Authentication : Granular permissions, multi-factor authentication, and role-based access prevent unauthorised users from accessing or manipulating files. Automated Workflows and Monitoring : MFT systems can automate file transfers with built-in logging and alerts, reducing human error and enabling rapid detection of anomalies. Compliance and Audit Trails : MFT solutions often include detailed audit logs and compliance reporting features, helping organisations meet regulatory requirements and demonstrate due diligence in the event of an incident. Reduced Shadow IT : By centralising file transfers within a secure platform, MFT reduces the risk of employees using unapproved tools that bypass corporate security controls. From Reactive to Resilient As cyber threats grow in scale and complexity, large businesses need to shift from reactive defence to proactive resilience. This makes investing in secure infrastructure like Managed File Transfer more than a mere technical upgrade. GoAnywhere enables further resilience by providing High Availability and Failover through active-active clustering, enabling multiple GoAnywhere installations to work together in a distributed environment. This way, if one node fails or is compromised, other nodes seamlessly continue processing file transfers and workflows, minimising downtime and maintaining service continuity. The tripling of cybercrime costs is a wake-up call. By securing the channels through which data flows, organisations can close critical gaps, reduce breach likelihood, and contain the “blast radius” when incidents occur. In a landscape where every file could be a vector and every transfer a risk, MFT offers the control, visibility, and security that modern enterprises need. Standing By to Help At Generic Systems Australia , we’re Australia and New Zealand’s experts in helping business take advantage of GoAnywhere’s many capabilities. We’ve assisted dozens of organisations to make their file transfers resilient, secure and reliable — boosting their efficiency in the process. If you’d like to discuss how we can deliver these advantages to your organisation, please feel welcome to get in touch with me. I’m always happy to have an obligation-free chat and explain how easily we can transition you from your current approach to a new world of cyber security and productivity. At Generic Systems Australia, we’re your local experts in data transfer. Previous Next
- Survey finds IT leaders increasingly focussed on PROACTIVE cybersecurity | GSA
< News Survey finds IT leaders increasingly focussed on PROACTIVE cybersecurity 12 June 2024 Australian IT leaders are increasingly focusing on proactive cybersecurity, according to a new survey released today. In a survey conducted by Tenable, IT leaders said that, while the ability to respond to and recover from cyber incidents remained essential, they are now focusing more on preventing such incidents altogether. Preventative measures they are investing in include: access controls and monitoring (64%) regular software updates and patch management (64%), and regular employee training and education on cybersecurity best practices (60%). Dark Tide Rising The most recent Australian Signals Directorate Report shows that cybercrime is on the increase for enterprises. On average, a new report is received every six minutes, up 23% year on year. The average cost of cybercrime has also increased by up to 14%. Saving Ransoms, Reputations, Operating Costs Adopting preventative cybersecurity measures isn’t only saving companies from the costs of cybercrime. Companies who take proactive steps say they are also benefiting from lower cyber insurance premiums. 44% of IT leaders experienced reductions ranging from 5% to 15%. Reductions of that magnitude demonstrate that insurers too are recognising the effectiveness of proactive cybersecurity. Proactive, Layered Defence A proactive strategy for storing, transferring and securing data is essential for keeping cyberthieves at bay. A layered approach - secure file transfer, secure content engines, secure digital rights management, and employee education – is the optimal way to prevent data breaches. At Generic Systems Australia , we recommend the class-leading secure managed file transfer solution, GoAnywhere MFT , to keep data safe - at rest, and in transit. Coupled with our Advanced Threat Protection Bundle , we enable organisations to safely collaborate without exposing systems to the risks of malware gaining a foothold within their IT systems. About The Survey Tenable partnered with Pure Profile to collect data from more than 200 IT and cybersecurity leaders across the insurance, banking, education, healthcare and transport industries in Australia. If you’d like to join the growing number of IT managers taking strong preventative measures to avoid cybercrime, please get in touch with me, Bradley Copson ( mail to :bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. Previous Next
- Ad-Hoc Filesharing Services Add Risk | GSA
< News Ad-Hoc Filesharing Services Add Risk 27 May 2025 Make no mistake - unintentional errors by employees and supply chain partners are a leading cause of data breaches. The uncontrolled use of ad-hoc file sharing services (e.g. WeTransfer, Dropbox, Google Workspace, Cerberus FTP Server, and ShareFile) significantly increases the risk of employees making mistakes and for those mistakes to go unnoticed. Here then are seven reasons why organisations should reconsider their use of ad-hoc cloud file sharing services. 1. They may not enforce automatic file encryption. A key means of preventing your data falling into the wrong hands is to ensure it’s always encrypted, both in transit, as well as when it’s being stored. A secure Managed File Transfer (MFT) solution can automatically encrypt your data. 2. Dubious key and certificate management. Beyond encryption of the file being transferred, some cloud applications leave files open to malicious intent by failing to maintain strong keys and certificates. 3. They may create compliance gaps. Not all cloud platforms meet regulatory requirements around file transfers, leaving your organisation liable for financial, legal, and reputational damages. 4. Limited data control. Unsupervised file sharing and collaboration can lead to files being sent to or accessed by unauthorised individuals. With many cloud-based solutions, once files are transferred, there’s no ongoing control over their use. A secure MFT provides ongoing safeguards with tight controls on who can access, edit, and transfer files, and for how long. 5. No workflow automation. MFT solutions such as GoAnywhere MFT simplify and automate file transfer processes, with multi-step workflows to execute repetitive, manual tasks. "Projects" can be easily created by dragging and dropping modules which define business processes to seamlessly transfer files, eliminating the need for complicated scripting or programming. For example: a Project can be created to retrieve encrypted data from a server, decrypt it, read file contents and submit them to a downstream internal application. The file can also be altered, added to, re-encrypted, and then sent to another external SFTP server. 6. Lack of centralised user management. Cloud file sharing solutions may not provide a comprehensive and easy to use dashboard for administrators to control access, authentication, and encryption of sensitive files. The more tools and applications that must be coordinated, the greater the risk of human or systems error. A robust MFT solution manages all types of file-send situations, including ad-hoc emails, large files, and batch files. 7. Threat detection and management. Protecting your organisation from viruses, malware, ransomware, Advanced Persistent Threats, and banned media types requires constant vigilance. Our Advanced Threat Protection can automatically block these threats and remove the element of human error from your risk profile. Local Expertise Available If you’d like to discuss removing the risk of ad-hoc file sharing applications from your organisation, please feel welcome to contact me . I’m always happy to have an obligation-free discussion, demonstrate the capabilities of the world’s most advanced MFT, and even offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. Previous Next
- How We Became Mr Fixit to Solve a Customer’s ERP Problem | GSA
< News How We Became Mr Fixit to Solve a Customer’s ERP Problem 10 Sept 2025 While GoAnywhere is at core a Managed File Transfer solution, its many advanced features make it useful in lots of other ways. Take, for example, the way we were able to use it to help one of our customers wrestling with deficiencies in their ERP system. FMCG Fix This customer — a well-regarded manufacturer of perishable fast moving consumer goods — is critically dependant on legacy ERP software to accept, analyse and prepare invoices for incoming customer orders. Their ERP system aggregates these orders and alerts suppliers to the quantities of ingredients necessary for the business to fulfil each day’s orders. It also invoices customers for the orders they’ve placed. However, our customer was experiencing an increasingly prevalent problem. Their ERP software was mishandling orders and invoices where customers had changed their mind and amended their order after they’d already been invoiced. Every time the ERP system mishandled one of these amended orders, our customer’s dispatch staff would need to have an IT department colleague manually fix the problem. This was taking 20 minutes each time. And as their business continued to grow, what had once been a minor inconvenience was turning into a major time sink and drain on efficiency. Worse, not only were the manual order corrections wasting more and more valuable employee time, but sometimes, suppliers found themselves unable to provide the additional quantities of ingredients requested too late in the day. Overseas vendor – underdone service Of course, our customer’s first call was to their global ERP software vendor. However, that vendor wouldn’t commit to fixing the deficiency in their software until a future version release, many months away. Our customer needed a workaround until then. GoAnywhere to the Rescue Our customer called us to see whether we could help. And, being locally available and committed to providing excellent customer support, we found a way to do so — quickly! Our expert technician was able to cleverly leverage GoAnywhere’s advanced flexibility in an unexpected way. His solution lay in a novel use of GoAnywhere’s “Secure Forms” functionality. Secure Forms Briefly, GoAnywhere’s Secure Forms enable a business to collect sensitive data and files through customisable, web-based forms, securely transmitted via HTTPS. These forms can be tailored with specific input fields, labels, and file upload components. When submitted, these Forms trigger a GoAnywhere Project — an automated workflow which processes the input, handles file transfers, and returns output files or confirmation messages to users. They streamline data intake, reduce reliance on email or fax, and ensure secure, standardised submissions easily usable by other IT systems. Our technician was able to utilise GoAnywhere’s Secure Forms because they use JDBC (Java Data Base Connectivity) to transfer data from a variety of IT systems to SQL databases. That’s a commonly used kind of database, and unsurprisingly, was the kind of database used by our customer’s legacy ERP system. We were able to leverage GoAnywhere’s functionality to automatically update pricing and order quantities and recalculate totals, enabling invoices to be correctly amended and re-processed. It took us just a few days to design, test and implement this fix. And our happy customer was able to get on with what they were best at: growing their business and creating ever more happy customers of their own! Here to Help At Generic Systems Australia we’re on the ground in your time zone and ready to help your Australian or NZ organisation take advantage of GoAnywhere MFT’s incredibly flexible capabilities. As experts in Managed File Transfer solutions, we’ve assisted businesses of all sizes to protect their customer data and secure their file transfers, keeping their operations running smoothly. If you’d like to discuss how we can help you, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how simply we can help you. Previous Next
- MediSecure hack Australia’s worst so far | GSA
< News MediSecure hack Australia’s worst so far 19 July 2024 eScripts provider MediSecure has revealed that 12.9M Australians had their data stolen in a hack earlier this year, making it one of the largest cyber breaches in Australian history. MediSecure, which facilitates electronic prescriptions and dispensing, confirmed in May it was the victim of a ransomware attack, following an earlier theft of data which continued until November 2023. The company went into voluntary administration in June after the federal government ruled out a financial bailout. Sensitive Patient Data Lost In a statement released late Thursday afternoon, MediSecure gave details about the kinds of data stolen, including full names, phone numbers, dates of birth, home addresses, Medicare numbers, and Medicare card expiry dates. The 6.5 terabytes of data also included some sensitive health information, such as which medications people were prescribed, the name of the drug, dosage, the reason for their prescription, and instructions for taking the medication. Inadequate Protection MediSecure said it was unable to identify specific impacted individuals “due to the complexity of the data set" and that doing so would have come at a "substantial cost that MediSecure was not in a financial position to meet". A tiny sample of the data was published on a dark web forum following the hack, and the larger data set was listed as being for sale, for $50,000. It's not clear whether the data was sold, but it's considered likely. Vigilance Urged Cyber security experts have urged Australians to remain vigilant for signs of fraud being committed using their medical data. Said one: "If contacted by someone claiming to be a medical or other service provider, including financial service provider, seeking personal, payment or banking information, you should hang up and call back on a phone number you have sourced independently." Avoiding becoming the Next MediSecure Now in liquidation, MediSecure is an example of how not to protect the sensitive customer data entrusted to your organisation. One of your best defences against hackers is to centrally control the flow of data into and out of your organisation. Managed File Transfer (MFT) software does that for you. But MFT does more than just provide centralised control. It also offers encryption, efficiency boosts and auditing capabilities. Using enhanced security protocols, it ensures data privacy during transmission and storage. And it also provides detailed audit-ready logs which detail which data has been accessed and by who. Expert Local Advice At Generic Systems Australia , we’re the Asia-Pacific’s experts on the world’s #1 MFT, GoAnywhere . If you’d like an obligation-free discussion about how we could help you keep your organisation safe from cyber thieves, please feel welcome to get in touch . Attribution: This article was largely sourced from Australia’s ABC News service Previous Next
- The Missing Link in Your Cyber Security Strategy? | GSA
< News The Missing Link in Your Cyber Security Strategy? 22 Apr 2025 Is Secure Managed File Transfer a “missing link” in your company’s cyber security strategy? Protect Your Data, Not Just Your Network The increasing frequency of hacks and other cyber incursions suggest that the cyber security measures being employed by Australian and New Zealand organisations are not keeping pace with cyber threats. As Forbes observes, “Companies keep pouring tons of money into protecting their network… but the real crown jewels are in the data that sits behind the network walls. That data is often not protected." “Locking the door” through corporate network protections is a good start. But it’s not enough. An organisation’s crown jewels should also be kept in a vault. This ensures that, even if a hacker gets inside, they won’t be able to exploit the data they find. Encrypting your data keeps it in the vault. And the security guard that puts your data in that vault is Managed File Transfer (MFT). How MFT Secures Your Data To be truly secure, data must be protected not only when it’s stored, but also while it’s enroute to and from storage . MFT solutions such as the class-leading GoAnywhere MFT encrypt data at rest and in transit, complying with the highest data security standards across the US and Europe, such as HIPAA, HITECH, PCI DSS, SOX, and the GDPR. MFT manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols such as SFTP, FTPS, and AS2 to send files securely, and encryption standards such as Open PGP and AES to protect data in transit and at rest. The "Managed" in MFT MFT software automates and streamlines the exchange of data for you, reducing manual processes and eliminating the need for any legacy tools and scripts you might currently be using. Data (including documents, images, videos, and other files) can also be exchanged via MFT across your private networks, systems, applications, partners, and cloud environments from a single point of administration. More than Transfers MFT software isn’t only for sending files between users and systems. It can also automate business processes, ensure secure connections, track file transfer activity, and more. File Encryption GoAnywhere MFT employs integrated encryption technologies to secure sensitive data. It also includes a key manager which enables you to create, import, export, and manage your keys and certificates within the product. Automation User errors and manual processes can also cause data breaches. By automating the encryption and exchange of sensitive files, processes and workflows can run without user intervention — especially useful when dealing with a high volume of file transfers. Email Enhancement GoAnywhere MFT offers a secure email module which allows users to send one-off file transfers securely, through a HTTPS connection. Cloud Connections MFT can help you build better connections between your network and web/cloud applications. GoAnywhere MFT offers built-in cloud integrations with applications such as Dropbox, SharePoint, and JIRA, and popular cloud services including Amazon, Google and Azure. Auditing & Reporting GoAnywhere MFT provide audit reports to meet compliance needs. All file transfer and administrator activity is stored and easily searchable. For organisations that need to report on file transfer activity to remain compliant with regulations and laws, the audit logs can be automatically generated and distributed as PDF reports. These are just some of the many MFT features which can help you protect your files. Add the Missing Link The rise in the rate of cyber crime suggests it’s a case of “when” – not “if” – your organisation will be targeted. So now is the time to get ahead of the hackers and explore how MFT can enhance your data’s security. Why not arrange a free trial and see how MFT can work in your organisation? The benefits are immediate, from file transfer automation to solid data encryption. I’m always happy to have an obligation-free discussion, explain how quickly and easily my team of technical experts can transition your organisation to the world’s best MFT solution, and offer you a zero-cost Proof of Concept. Previous Next
- Five Indications Your Organisation Could Benefit from an MFT | GSA
< News Five Indications Your Organisation Could Benefit from an MFT 20 May 2025 Data is the lifeblood of a modern business. Your ability to safely store and move data is fundamental to your daily operations. Your efficiency in moving and using data determines the overall speed at which your business operates. So it’s worth taking a few moments to consider how to potentially improve the way your team currently stores, protects and moves your valuable organisational data. Are they still relying on outdated file transfer protocols like FTP? Are they trusting your data to a hodge-podge of risky ad-hoc cloud dropbox-style services? Are they relying on years-old hand-coded file transfer scripts? There’s a better – safer, more robust, faster, more efficient, fully automated – way: Managed File Transfer (MFT). Here are five key indicators that your business may be ready to benefit from an MFT solution. Using Outdated Ways to Send Data? A surprising number of organisations still rely on outdated protocols and clunky scripts to move precious data around. However, these legacy methods increase the risk of human error, take time away from more critical tasks, and are difficult to maintain. An MFT is easy to use, easy to audit, requires little maintenance, and removes manual tasks from your stretched IT team’s To Do list. Increasingly Targeted by Cybercriminals? Your IT team can tell you how many cybercrime incursions they’re seeing daily. The number may shock you! With hackers escalating their efforts to extort your business and customers, it’s more essential than ever to secure your data and maintain a ‘circle of trust’ with your supply chain partners. An MFT solution, such as GoAnywhere MFT, employs the latest encryption algorithms to reduce the risk of data breaches during transit. Features like Access Controls, and Multi-factor Authentication, safeguard sensitive information from unauthorised access. New Government Regulations? In response to the impacts of escalating cybercrime on businesses and citizens, governments are imposing ever greater requirements on businesses to ensure they protect consumers’ personal data. From health data (hospital records, test results), to banking data (debit and credit card numbers, bank account details), to identity data (home address, government id), businesses that fail to take responsible measures to protect sensitive data face growing sanctions. Worse, a breach may not only cost your organisation time and money to remediate, it may also ruin your reputation. An MFT solution helps ensure your file transfers comply with regulatory requirements. Features such as auditing, reporting, role-based access, secure protocols, centralised security controls, encryption, and key management protect employee and consumer data from security mishaps. Cloud Dependencies? Many organisations have moved business processes to the cloud, and regularly exchange files with trading partners there. But transfers to and from the cloud – especially those over public telecommunications networks – require extra protection. From streamlining and automating cloud file transfers to platforms like Amazon Web Services and Microsoft Azure, to integrating with popular web and cloud services like SharePoint and Google Drive, using an MFT makes working with partners in the cloud smooth, reliable and safe. Evolving Network Conditions? Research shows that a single hour of system downtime can easily cost a medium-sized business a six-figure sum. As organisations and trading partners become increasingly integrated, it’s critical that file transfers are performed without delay or disruption. Whereas a document containing a batch of important transactions may once have been delivered over several hours, today’s fast pace of business requires it to take mere seconds. An enterprise-calibre file transfer solution should have a high availability plan in place. The right solution will provide active-passive and active-active (i.e. clustering) methods for organisations who need to keep their processes running no matter the situation at hand. Clustering provides the best high availability by running multiple servers simultaneously. Therefore, if one goes down, file transfers and workflows will continue to run on other servers so communication with your trading partners won’t be interrupted. The Leading MFT If any of these indicators ring true for you, it may be time to consider upgrading to an MFT solution. The acknowledged leading MFT, GoAnywhere, is an all-in-one solution, automating and encrypting file transfers from a centralised dashboard. GoAnywhere saves businesses time, money, and reputation. Local Expert Help At Generic Systems Australia we have decades of experience installing and customising MFT solutions to suit the needs of Australian and New Zealand businesses. If you’d like to explore how MFT can boost your organisation’s security and efficiency, please feel welcome to get in touch . I’m always ready to have a broad-ranging, no-obligation discussion. If you’d like, I can even organise a quick proof-of-concept to demonstrate how MFT can be easily tailored to your organisation’s specific needs. At Generic Systems Australia, we’re your local experts in Managed File Transfer. Previous Next
- A New Year's Resolution? | GSA
< News A New Year's Resolution? 17 Mar 2024 Having enjoyed some personal downtime over the festive season, business leaders often see January as a good month for planning operational priorities for the year ahead. If this is you, consider whether 2024 is the year to 'get your house in order' in the core area of Managed and Secure File Transfer. A surprising number of businesses still rely on risky, outdated, ad-hoc data transfer practices, from email attachments to legacy scripts. Not only are they 'sitting ducks' for cyber-crime, but they're also wasting valuable time and money. They could also be dependent on the people that have written complex Scripts who decide to up and leave. It happens all the time…. If you'd like to discuss how a Managed File Transfer solution can inexpensively improve your cyber-security and business bottom line, please feel welcome to contact me for an obligation-free discussion and demo. Previous Next
- GenAI Cyber Attacks on the Rise: Gartner | GSA
< News GenAI Cyber Attacks on the Rise: Gartner 30 Sept 2025 Attacks using Generative AI (“GenAI”) for phishing, deepfakes and social engineering have become mainstream, and attacks on GenAI application infrastructure and prompt-based manipulations are emerging. These are among the troubling findings of a recent survey of cyber security leaders by Gartner, the technology insights company. GenAI is a form of artificial intelligence designed to create original content—such as text, images, music, video, or code—based on patterns it learns from existing data. Unlike traditional AI which classifies or predicts, GenAI generates new data that mimics human creativity. Rise of the Machines 62% of organisations experienced a deepfake attack involving social engineering or exploiting automated processes. These attacks included: deepfake videos used against automated face biometrics or identity verification (29%); deepfake audio clips used against automated voice biometrics (32%); social engineering with deepfake during video calls with an employee (36%); and social engineering with deepfake during audio calls with an employee (44%). In addition, 29% of cybersecurity leaders reported that their organisations had experienced an attack on enterprise GenAI infrastructure in the last 12 months. 32% said they experienced an attack on AI applications that leveraged the application prompt during the last 12 months. Gartner said that chatbot assistants are vulnerable to a variety of adversarial prompting techniques, such as attackers generating prompts to manipulate large language models (LLMs) or multimodal models into generating biased or malicious output. Emerging Threats Speaking at a Gartner Security and Risk Management Summit in London, Akif Khan, Gartner’s specialist VP in identity and access management, said: “As adoption accelerates, attacks leveraging GenAI for phishing, deepfakes and social engineering have become mainstream, while other threats — such as attacks on GenAI application infrastructure and prompt-based manipulations — are emerging and gaining traction.” While 67% of cybersecurity leaders said emerging GenAI risks demand significant changes to existing cybersecurity approaches, Gartner said a more balanced strategy is warranted. “Rather than making sweeping changes or isolated investments, organisations should strengthen core controls and implement targeted measures for each new risk category,” Khan said. MFT vs GenAI One such core control is a Managed File Transfer (MFT) solution, such as GoAnywhere MFT . It should be among an organisation’s first lines of defence. Managed File Transfer (MFT) solutions play a critical role in defending organisations against deepfake phishing and social engineering by enforcing secure, authenticated channels for data exchange. Unlike ad hoc file sharing methods that can be easily exploited, MFT platforms integrate multi-factor authentication (MFA), encryption, and access controls to ensure that only verified users can initiate or receive transfers. This mitigates the risk of attackers impersonating trusted individuals using deepfake audio or video to trick employees into sharing sensitive files. Additionally, robust MFT systems include audit trails and automated alerts which help security teams detect anomalous behaviour — such as unusual file requests or access patterns — that may indicate social engineering attempts. By centralising and securing file movement, MFT reduces the attack surface and strengthens organisational resilience against increasingly sophisticated deception tactics. Local Expertise Available At Generic Systems Australia we’re Australia’s and NZ’s experts in deploying Managed File Transfer solutions. We’ve assisted businesses of all sizes to protect their customer data and secure their file transfers, while keeping their operations running smoothly. If you’d like to discuss how we can help you, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how simply we can help you maintain your customers’ trust. Previous Next
- Global Insurer Uses GoAnywhere to Replace Legacy File Transfers | GSA
< Case Studies Global Insurer Uses GoAnywhere to Replace Legacy File Transfers Instead of copying and piecing together scripts for file transfers - a process which took 30-60 minutes per script – this global insurance company now uses GoAnywhere to automate and make secure its file transfer task in less than five minutes. Discovering the many other ways they could leverage GoAnywhere’s advanced features was a bonus. Decades of experience helping Asia-Pacific customers have established Generic Systems Australia as our region’s local experts in secure managed file transfer. In this case study, we share how a global insurance company is saving time and money – and avoiding headaches – by using GoAnywhere MFT , the world’s leading MFT solution . For one global insurance company, having file transfer processes that work seamlessly is non-negotiable. Between needing to share data with the company’s national office, running a collaboration with a car rental company, and catering to more than a million customers, they need their file transfers to run smoothly and securely. However, the legacy systems and processes they had in place prior to 2018 were frustrating, to say the least. One of the company’s applications engineers couldn’t believe the file transfer processes they had to deal with before switching to managed file transfer software. "We had a server where a bunch of batch scripts ran and transferred files to vendors," he said. "We wrote manual scripts — 50 or 60 of them — that all ran from Task Scheduler." Because their setup lacked security and encryption features, critical information wasn’t always protected during batch transfers. Their setup didn’t have alerting or reporting abilities either. It quickly became clear that better cybersecurity strategies were needed to protect their file transfers. Convoluted Clustering The engineer’s team also wanted to cluster their systems, so the bank files they exchanged wouldn’t be interrupted by system failure or downtime. But making Task Scheduler cluster aware required knowledge of PowerShell. "It was this huge, long convoluted process," he said. "And with security in mind, we had to implement a DMZ secure gateway server to go along with a new file transfer server. Jobs would have to be scheduled on two different sets of task schedulers." The design files they created to make clustering work were crazy. There had to be an easier way. Back to Basics For this insurance company, it was time to unravel their processes and systems and go back to the basics that mattered: encryption, automation, alerting, and reporting. If they could find a solution that did all these things simply and efficiently… that would be a win. And win they did. After evaluating several managed file transfer (MFT) solutions, the engineer tried GoAnywhere MFT, the class-leading cybersecurity solution. More than Transfers The engineer and his team discovered many additional benefits during their trial of GoAnywhere: Ease of Use: GoAnywhere was powerful but not overly technical. The software was a breeze to install and easy to use. Focused on What Matters: The team was pleased to see GoAnywhere support extra functionality, like user-to-user collaboration, but even more pleased to find that GoAnywhere never lost sight of their bread-and-butter requirements: automation, auditing, and secure file transfers. Out-of-the-Box Project Designers: GoAnywhere included a drag-and-drop project designer for workflows and automation. This eliminated the need for scripting and programming. Affordability: Finally, the cost beat out the competition. GoAnywhere offered the insurance company a positive ROI that they could achieve quickly and efficiently with less of a learning curve—while still boasting all the features and functionality of other comparable solutions. A Fresh Start with MFT Once GoAnywhere was fully implemented, the global insurance company couldn’t imagine life without it. Now they meet requirements and complete key projects via several of GoAnywhere’s features: PCI DSS Compliance: The insurance company is PCI DSS certified. To ensure their member information is protected as much as possible, they are required to go above and beyond PCI DSS requirements to ensure their file transfers are compliant. GoAnywhere MFT supports PCI DSS compliance efforts through encryption, secure, industry-standard file transfer protocols, access controls for sensitive data, and detailed logging/reporting. Google Integration: After implementing GoAnywhere, the insurance company installed GoAnywhere’s Google Cloud Storage Connector. This cloud integration allows them to pull data from the cloud from two vendors they’ve partnered with. Each month, GoAnywhere transfers a file generated in-house to a Google storage bucket. Once the files are in the bucket, two of their vendors apply logic to the data for marketing purposes. The file finishes processing using the Google compute engine before GoAnywhere pulls the file back into the company’s enterprise data warehouse (EDW) system. AWS Integration: GoAnywhere’s Amazon AWS integration fulfills an important project in their environment. "We’ve used [the Amazon AWS integration] since day one," explained the company’s engineer. "It was one of the selling features for us." Improved Visibility & Centralisation Before GoAnywhere came into the picture, the engineer and a co-worker relied on Task Scheduler and batch file transfers to send and retrieve sensitive data. Their legacy setup did not have alerting, notifications, or reporting functionality. They’d need to spend precious time tracking down issues or digging into different data sources to regain some visibility. This lack of clarity was a source of frustration. A big selling point for this insurance company was GoAnywhere’s ability to provide visibility into all areas of their file transfer processes, including the data movement happening on-premises, within their cloud environment, and to their web applications. Not only does this visibility help the engineer’s team know when and where files are sent, it gives them flexibility to train new employees if needed. "Say I need more help and we’re hiring someone else," he explained. "I can say [to that new hire,] ‘Everything’s in GoAnywhere. All our jobs, anything that’s incoming, all the users. You can see who has access, you can see the agents we have deployed and what they’re doing.’ Having that [data] in a central place is just so much easier than what we’ve used in the past." Remote MFT Agents GoAnywhere’s MFT Agents module allows admins to remotely control automated file transfers and file processing from a central GoAnywhere server. With MFT agents in place, this insurance company has improved its overall security posture. They can move sensitive files between restricted servers without having to rely on insecure methods or window transfers. All of these transfers are automated, secured, and can be audited. Set for Success Instead of copying and piecing together scripts to send new file transfers (a process that took 30-60 minutes per script before), GoAnywhere can create a job in under five minutes. The team has utilised several areas of the software in a short amount of time and have exciting use cases in mind for the future. Of his favourite thing about GoAnywhere, the engineer said: "I love that I’m not on a batch file trying to deduce what’s going on. I can just visualise something [the workflow] and say ‘oh, this is what it needs.’ I can just set up a job and my coworker knows about it because now we get an email notification if it fails... Compared to what we had before, [our file transfer process] is where we need it to be." Previous Next

