top of page

Search Results

184 results found with an empty search

  • How Load Balancing optimises your file transfers | GSA

    < News How Load Balancing optimises your file transfers 30 Apr 2024 Network bottlenecks that cause business downtime are the bete noir of corporate IT teams. Businesswire found that 82% of companies experienced at least one downtime incident during the past three years… costing small businesses $660 per minute, and larger organisations $14,000 per minute. Load balancing is a key technique for keeping network traffic flowing. What is Load Balancing? Load balancing is key to “clustering”, where multiple systems work together as a single unit to help ensure high-availability, scalability, and reliability. It’s a technique which enables organisations to distribute workloads and network traffic across multiple servers or network interfaces in a computer cluster. Effective load balancing means that network traffic is always directed to servers which are “available”, should a particular server become overwhelmed or fail. Balancing workloads optimises the performance of systems and applications –– for example, a managed file transfer (MFT) solution for exchanging data –– preventing bottlenecks and other efficiency-sapping impacts. Why Load Balance for File Transfers? Delays in sending files can have significant negative ripple effects throughout an organisation. Incoming orders may not be received, or shipping may be delayed, leading to dissatisfied customers. Delayed financial transactions with trading partners may weaken an organisation’s supply chain. Load balancing helps organisations continue to operate ‘business as usual’ even when a system fails or is inundated with a heavy network workload. Other benefits of load balancing include: Scalability: Load balancers can help organisations adapt to growing and changing conditions and workloads without suffering adverse events. New servers can be seamlessly added to the cluster when more scalability is needed. Performance Optimisation : Traffic is routed to the server most capable of handling a given request based on location or server health. Redundancy: Organisations safeguard themselves, should one server become overloaded or fail, with load balancing enabling processing work to continue without interruption. Using Middleware and Active-Active Framework for Load Balancing A robust managed file transfer solution, such as Fortra’s GoAnywhere MFT, delivers critical load balancing and scaling when installed in a cluster. The solution’s load balancer, GoAnywhere Gateway, serves as both a reverse proxy and load balancer. When paired with Gateway as a load balancer, each inbound file server connection can be distributed to available systems in the environment. MFT workflows performed in a clustering environment gain increased performance and throughput. If a system within a cluster fails, GoAnywhere Gateway automatically routes all new trading partner connections to the remaining systems in the cluster. For mission critical environments and processes, this is an “active-active” framework providing high availability. Enhanced Security GoAnywhere Gateway also provides an extra security layer when exchanging data. The Gateway keeps file sharing services such as FTPS, HTTPS, SFTP servers and any documents secure in the private or internal network. No additional inbound ports need to be opened, which helps organisations meet compliance requirements such as those for PCI DSS, SOX, HIPAA, GLBA, as well as certain privacy laws. This round robin algorithm essentially works like this: For each new FTP, FTPS, or SFTP connection from a trading partner, the Gateway distributes that session sequentially to the next FTP/FTPS/SFTP server within the cluster. HTTP/S, however, is a stateless protocol. It uses the round robin algorithm but will persist each connection for a time to maintain session integrity. HTTP/S sessions typically are only served by one HTTP/S server at a time. If you’d like to discuss how your organisation can reduce downtime through MFT load balancing, please feel welcome to contact our Business Manager, Bradley Copson (mail to: bradley@gensys.com.au ). He’s always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. Generic Systems Australia Your Local Experts in Secure Managed File Transfer Previous Next

  • GoAnywhere MFT: the duct tape in your IT Toolbox | GSA

    < News GoAnywhere MFT: the duct tape in your IT Toolbox 11 Sept 2025 There are few modern inventions more versatile than duct tape. It can patch a leaky pipe, hold together a broken car bumper, or even fashion a makeshift wallet. GoAnywhere Managed File Transfer (MFT) is to enterprise data workflows what duct tape is to the physical world: a versatile inclusion in your IT toolbox, which you’ll find useful in a pinch, and in all kinds of unexpected ways. GoAnywhere MFT quietly binds together the jagged edges of digital infrastructure. It secures, automates, and streamlines file transfers across disparate systems—whether you're dealing with legacy mainframes, cloud APIs, or finicky partner protocols. Reliable Under Pressure Duct tape earned its reputation by reliably working under pressure, across materials, without drama. GoAnywhere MFT operates in a similar spirit: it’s the IT team's go-to when compliance deadlines loom, when FTP scripts fail at 2 a.m., or when a new vendor insists on AS2 transfers with custom encryption. It may be not flashy, but it’s indispensable—quietly enforcing governance, logging every transaction, and adapting to whatever format the situation demands. Just as importantly, both duct tape and GoAnywhere MFT are trusted because they scale to the size of the problem. You can use a strip of duct tape to seal a lunchbox or wrap an entire canoe. Likewise, GoAnywhere can handle a single secure upload or orchestrate thousands of transfers across hybrid environments, all while maintaining audit trails and access controls. In a world of IT that’s increasingly complex and interconnected, having a tool on hand that’s both rugged and adaptable isn’t just useful—it’s essential. And that’s why so many IT departments choose to keep GoAnywhere MFT handy. Add GoAnywhere to your Toolbox At Generic Systems Australia we’re experts in helping Australian and NZ organisations take advantage of GoAnywhere MFT’s versatility. In fact, we’ve assisted businesses of all sizes to protect their customer data and secure their file transfers, keeping their operations running smoothly. If you have an hour to spare, we can easily demonstrate the power and ease of use of GoAnywhere’s many capabilities. Simply contact me and I’ll be happy to set up an obligation-free chat. Previous Next

  • Ann Upgrade and Health Check Service | GSA

    Our Annual Upgrade and Health Check Service provides dedicated resources to update your organisation’s GoAnywhere environment to the latest version. One of our experienced local Technical Consultants will review your organisation’s upgrade strategy, conduct a Health Check of your system and consult with you on any risks and compatibility issues potentially associated with your upgrade. Review product datasheet below: RESOURCES HOME

  • Black 'Fileday' | GSA

    < News Black 'Fileday' 29 Nov 2023 Australian shoppers were tipped to spend $6.36B across the Black Friday weekend, according to the Australian Retailers Association.The surge in sales has in turn created a tsunami of data transfers, as businesses share orders, files and information with their supply chains.For some businesses, it will be a stressful period. But others - those who entrust their file transfers to GoAnywhere MFT - will surf the data tsunami with ease, as GoAnywhere conveys all their valuable files reliably and securely.(And of course, our local technical team at Generic Systems Australia will always be on hand to share our unparalleled MFT expertise with our customers.) Previous Next

  • MFT as your Middleware! | GSA

    < News MFT as your Middleware! 4 Nov 2025 Modern enterprises are constantly navigating the flow of information between intricate internal systems and external cloud services. Regardless of whether that flow is inside or outside of the corporate firewall, the need for secure and efficient data transfer remains paramount. Traditional solutions like Extract Transfer Load (ETL) systems help process and store data within a central warehouse, while Enterprise Service Buses (ESBs) serve as hubs that manage and monitor data and service flows across various applications. Yet, despite their strengths, these tools fall short when it comes to security—especially when third-party interactions are involved. This gap between integration and security has left organisations searching for a more unified approach. More than MFT Enter GoAnywhere MFT , a solution which redefines what managed file transfer can be. Unlike conventional MFT platforms, GoAnywhere functions as a lightweight ETL, a capable ESB, and a robust MFT tool—all rolled into one. What truly distinguishes GoAnywhere is its unwavering focus on security, making it one of the few platforms that can meet the growing demand for secure and seamless data exchanges both within and beyond enterprise boundaries. GoAnywhere offers the same automation and integration capabilities found in ETL, ESB, and Enterprise Application Integration solutions. It enables organisations to connect internal systems with cloud-based resources and external partners, including banks, credit card providers, financial data services, foreign exchange markets, and retirement or pension systems. When needed, GoAnywhere can also act as middleware, integrating with existing ETL setups while managing system connections, securing communications, and streamlining integration processes. Even for enterprises already equipped with ETL tools, GoAnywhere enhances data transfer security by introducing multiple layers of protection. Its architecture includes a multi-tier setup featuring the GoAnywhere Gateway, which operates as a reverse proxy in the DMZ to shield data from internet threats. Additionally, organisations can deploy a Secure ICAP Gateway—a deep content inspection engine that blocks malicious content from infiltrating through third-party interfaces. Security is further reinforced through integration with Fortra Threat Brain, a comprehensive threat intelligence database that proactively identifies and blocks suspicious IP addresses before they can breach the network. On-Prem, Off-Prem... Anywhere Another standout feature of GoAnywhere is its ability to bridge the divide between on-premises systems and cloud-based applications. Unlike typical SaaS middleware platforms, which often struggle to accommodate legacy systems, segmented networks, and hybrid environments, GoAnywhere centralises and secures file transfers across all these domains. It’s not limited to one environment, making it a truly versatile solution for enterprises with complex infrastructures. For organisations aiming to enhance operational efficiency, GoAnywhere offers a high-performance middleware platform that supports secure and high speed data transfers. It interfaces with a wide array of systems, applications, and cloud services, protects files from malware, enforces zero trust principles regardless of file destination, and ensures data remains outside the DMZ. Recognised globally as a leading MFT solution, GoAnywhere is celebrated for its security, adaptability, and ability to operate wherever and however enterprises need it. It’s increasingly becoming the connective tissue between disparate systems and workflows. Local Help On Hand At Generic Systems Australia , we bring years of experience helping IT teams across Australia and New Zealand optimise their file transfers and safeguard their data using GoAnywhere MFT. From assessing legacy systems to offering zero-cost Proof of Concepts and seamless Migration Services, we ensure businesses can transition to more secure practices without disruption. If you’re interested in exploring how GoAnywhere can benefit your organisation, feel free to reach out for an obligation-free conversation. At Generic Systems Australia, we’re proud to be Australia’s and New Zealand’s experts in Managed File Transfer. Previous Next

  • Resources | GSA

    RESOURCES INDEX Independent Info-Tech MFT Quadrant Report (2025) For the 3rd consecutive year, respected tech analysts Info-Tech have evaluated the most popular MFT software and vendors, and found that GoAnywhere is the top MFT solution. To receive a complimentary copy of their 2025 report, simply submit your email address below and we'll email you back a PDF. Read More "MFT's Role in Business: IT Leaders Weigh In" eBook In this eBook, nine leading IT and security professionals share their real-world experiences of leveraging GoAnywhere's many capabilities in their businesses. Read More New Cyber Laws Passed - What Australian Businesses Need to Know and Do What Australian organisations need to know - and do - to meet their new obligations under the nation’s new Cyber Security legislation. Read More Use APIs to Accelerate Your MFT's ROI How to boost the ROI of your MFT solution - and scale its deployment - by pairing it with APIs. Enhance automation, integration, and customisation. Read More MFT Local Buyer's Guide Ask the right questions, and consider the key issues, to identify the right Managed File Transfer solution for your organisation. Read More Independent Info-Tech MFT Quadrant Report (2024) Once again, respected tech analysts Info-Tech have evaluated the most popular MFT software and vendors, and found that GoAnywhere is the top MFT solution. Here’s their 2024 independent report. Read More 2024 Cybersecurity Insiders Survey Fortra's "2024 State of Cybersecurity Survey" shares the invaluable insights of more than 400 cybersecurity professionals from across the globe, including many in Australia, New Zealand and the Asia-Pacific region. Read More Best Practices for Cloud MFT Most modern organisations rely to an extent on the Cloud as they transfer files between employees, trading partners, and customers. Here are best practices for safeguarding your data on its way to, from and in, the Cloud. Read More Meeting CDR Requirements Australia’s Consumer Data Right (CDR) requires businesses to carefully plan how they handle, store and disclose the consumer data they collect. This primer explains your obligations, the breaches that can occur, and a strategy to avoid them. Read More Secure Your Cloud Data with MFT How a robust Managed File Transfer (MFT) solution helps protect your data transfers – in transit and at rest – without compromising the convenience or cost-effectiveness of moving your business to a cloud-based environment. Read More Why Automating Encryption and Decryption Makes Good Cybersecurity Sense How does encryption and decryption work? This handy primer explains. Read More Think Like a Hacker To win the fight against cybercriminals, it helps to think like a hacker. Read More Annual Upgrade and Health Check Service Take the time, effort and risk out of ensuring your GoAnywhere environment is up to date and running smoothly! Read More GoAnywhere Product Datasheet GoAnywhere MFT is the world’s leading Managed File Transfer solution. This datasheet summarises its key technical features. Read More Advanced Threat Protection Product Datasheet GoAnywhere MFT is the world’s leading Managed File Transfer solution. This datasheet summarises its key technical features. Read More GoAnywhere Gateway Product Datasheet GoAnywhere Gateway provides an additional layer of security when exchanging data with your trading partners, enabling you to keep file sharing services and documents safely in your private/internal network. Read More GA Modules for Licencing Product Datasheet GoAnywhere is a robust and complete managed file transfer solution. Modules are available that can satisfy a wide array of file transfer requirements –– you can choose to license only the modules you currently need, and easily unlock additional modules if necessary. Read More Threat Brain Product Datasheet “Threat Brain” is a unique and innovative addition to GoAnywhere MFT which keeps the world’s leading Managed File Transfer solution a step ahead of cyber thieves and competing MFT solutions. Read More Compliance Product Datasheet Every organisation needs to meet stringent industry, state and federal data and privacy laws and regulations. GoAnywhere is the secure file transfer solution built to satisfy these demanding Compliance requirements. Read More 'An Introduction to GoAnywhere' (video) In this brief video, our Business Manager Bradley Copson overviews GoAnywhere's key features and benefits. Read More 'Secure MFT Threat Protection Bundle' (video) Our Secure MFT Threat Protection Bundle can automatically catch and kill email threats before they enter or leave your organisation. This brief video shows how. Read More Independent Info-Tech MFT Quadrant Report (2022) Respected tech analysts Info-Tech evaluated the most popular MFT software and vendors. Read More

  • Secret Ransomware Payments Rife: Survey | GSA

    < News Secret Ransomware Payments Rife: Survey 19 Aug 2024 Pervasive cyberattacks are leading most companies to pay ransoms and break their “Do Not Pay” policies, according to recent research. A poll of IT and security decision-makers conducted by Cohesity found that that most companies have paid a ransom in the last two years. In fact, 79% of respondents said their company had been the victim of a ransomware attack during the second half of 2023. The breadth of an organisation’s “attack surfaces” depends on the size and scope of its data environments. However, 78% of respondents said their data security risk had increased faster than the growth in the data they manage. They also said their organisation’s cyber resilience and data security strategies had not kept pace with emerging threats – only 21% had full confidence in their company’s cyber resilience strategy. Slow Recovery, Lack of Testing Cyber resilience is a critical element of business continuity, and encompasses a company’s ability to recover their data and restore business processes when they suffer a cyberattack or IT outage. Key insights from the survey on this point included: All respondents said they need more than 24 hours to recover data and restore business processes. Only 7% said their company could recover data and restore business processes within 1-3 days. 35% said they could recover and restore in 4 to 6 days, while 34% need 1-2 weeks, and 23% need more than 3 weeks. Only 12% of those surveyed said their company had stress-tested their data security, data management, and data recovery processes or solutions in the six months prior to being surveyed. 46% hadn’t tested in more than 12 months. Secret Ransom Payments While 84% had a “do not pay” policy, Cohesity reported that 94% of respondents divulged that their company would pay a ransom to recover data and restore business processes. 5% said “maybe, depending on the ransom amount”. Two thirds said their company would be willing to pay over US$3M to recover data and restore business processes, and a third said their company would be willing to pay over $5M. Don’t Pay: Prevent! The volume, frequency, and sophistication of ransomware attacks will only increase. And paying ransoms only encourages cyberthieves to escalate their efforts. Worse, if ransoms are seen as “easy money”, new miscreants will be tempted to acquire ransomware tools from the dark web and join the cyber crimewave. Rather than investing in ransoms, organisations need to invest in their cyber resilience. That starts with keeping thieves at bay - protecting valuable data where it is stored, and when it is transferred – and building organisational capability in rapidly responding to and recovering from cyberattacks. Building cyber resilience need not be a drag on an organisation’s efficiency. Automation can ensure data is protected at rest and in motion, requiring little to no manual management. For example, Managed File Transfer (MFT) solutions such as the class-leading GoAnywhere MFT encrypt data at rest and in transit, complying with the highest data security standards (including the US’s and Europe’s HIPAA, HITECH, PCI DSS, SOX, and GDPR). MFT manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols such as SFTP, FTPS, and AS2 to send files securely, and encryption standards such as Open PGP and AES to protect data in transit and at rest. Advanced Threat Protection and Adaptive Loss Prevention add a further layer of defence. SFT Threat Protection enables safe collaboration with external parties, preventing malware from entering your organisation, and reducing opportunities for employees to lose or mishandle sensitive data. Local Expertise Ready to Help Generic Systems Australia are your local experts in Managed File Transfer and Advanced Threat Protection. We’ve assisted hundreds of organisations across the Asia-Pacific region to secure their data, keep cybercriminals at bay… and keep ransomware off the books. If you’d like to discuss improving your cybersecurity, please feel welcome to contact me , Bradley Copson. I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. About the survey: Cohesity’s findings are based on a survey of 902 IT and Security decision-makers (split as close to 50:50 as possible) commissioned by Cohesity and conducted by Censuswide. Survey respondents were polled from businesses in Australia, the United Kingdom, and the United States. The top five industries selected by respondents as best representing the industry their company operates in were: IT & Telecommunications, Finance, Healthcare, Finance, HR, and Manufacturing & Utilities. Previous Next

  • Australian Govt’s “Horizon 2” Comes Into View | GSA

    < News Australian Govt’s “Horizon 2” Comes Into View 5 Aug 2025 The Australian Government has invited input on the key policy and program outcomes the nation needs to achieve under the 2023 – 2030 Australian Cyber Security Strategy. Building on the momentum of the recently introduced Cyber Security Act 2024 , Minister for Cyber Security, Tony Burke MP, has released the Horizon 2 Policy Discussion Paper. It seeks feedback and input on key policies designed to enable Australia to: · Embed cyber messaging, cyber standards, capability and efforts. · Empower Australian businesses and citizens to protect themselves and become more resilient to cyber incidents. · Enhance cyber frameworks, workforce, and business ecosystem to drive further cyber security uplift. Consultation on the Discussion Paper is open to all levels of government, industry, educational institutions, community groups, and the Australian public. Submissions to can be made through the Department’s consultation webpage until 29 August 2025. Further industry co-design and Town Halls will also be held during the consultation process. Releasing the Discussion Paper, the Minister said: “We have made historic progress on cyber security but there is always more to do when confronting this evolving threat. Our government believes that all Australians have the right to be safe and feel safe, and cyber security is a critical part of that effort. “We’ve laid excellent foundations with Horizon 1 of the strategy and the passage of the Cyber Security Act – Horizon 2 will continue our progress towards our rightful place as a world leader on cyber security.” Submissions can be made through the Department’s consultation webpage until 29 August 2025. Previous Next

  • Why It’s Worth Migrating to a Better MFT | GSA

    < News Why It’s Worth Migrating to a Better MFT 9 Dec 2025 Is your existing Managed File Transfer (MFT) solution failing to keep pace with modern security, efficiency and budgetary needs? Companies whose existing MFT solution no longer meets modern security, compliance, or usability needs should consider trading up to the world’s leading MFT solution, GoAnywhere MFT . GoAnywhere MFT makes migration straightforward with dedicated tools and services. The Case to Replace Organisations rely on Managed File Transfer to securely exchange sensitive data with partners, customers, and internal systems. However, some legacy solutions struggle to keep pace with today’s demands. Common reasons for replacement include: Volume Pricing Gotchas: some MFTs lure customers with seemingly low initial prices, only to rapidly increase costs as the number of users, or the amount and size of transfers, increase. Budgeting becomes difficult as their MFT licence grows ever more costly. Security Gaps: Some MFT tools lack advanced encryption, secure protocols, or modern authentication methods, leaving organisations exposed to cyber threats. New Compliance Requirements: Increasing government and industry regulation requires auditable, automated file transfer processes. Some MFT systems fall short in providing detailed logging and compliance reporting. Inefficiencies: Maintaining outdated solutions can be costly, requiring manual scripting and complex workarounds. This slows down IT teams and increases the risk of human error. Inadequate Scalability: As businesses grow, file transfer volumes increase. Legacy solutions may not scale effectively, leading to bottlenecks and downtime. Poor User Experience: Modern enterprises expect intuitive interfaces and automation. If the current solution is cumbersome, adoption and productivity suffer. Why GoAnywhere MFT? GoAnywhere MFT is a secure, automated, and user-friendly platform designed to address the deficiencies of competitor MFTs. It offers: Transparent pricing with no surprises as user volumes increase. The licencing model is Server/Node based and has been since the solution’s inception. Centralised management of all file transfers, reducing complexity. Automation features like scheduling, alerting, and workflows to eliminate manual intervention. High availability and scalability , ensuring reliable performance even under heavy loads. Compliance-ready reporting with detailed audit trails. Integration capabilities with cloud services, APIs, and enterprise applications. Easy Migration A common concern of companies considering a switch to a better MFT is the potential for disruption. But at Generic Systems Australia, we alleviate this directly through our comprehensive Migration Services . Our technical experts can quickly and efficiently install GoAnywhere MFT and then configure it to replace all your existing scripts, integration packages and other file transfer middleware. This way, you and your team can keep on doing what you do best – free of distractions – while we do what we do best. Our Migration Services enable you to transition from outdated, inefficient or expensive solutions without risking operational delays. Whether transitioning from in-house processes or another MFT vendor, GoAnywhere provides a structured path to adoption. Make the Move With GoAnywhere MFT from Generic Systems Australia, migration is not only achievable but also streamlined through expert guidance and automation – all available from local technical experts who are the best in their field. At Generic Systems Australia, we’re Oceania’s experts in File Transfer solutions. Previous Next

  • Cyber Target Paris Prepares | GSA

    < News Cyber Target Paris Prepares 23 July 2024 As the attention of sports fans turns to Paris this week, so too are the nefarious attentions of the world’s cyber criminals. So: how will the world’s largest sporting event keep its data and systems secure…? Read on to learn more from those charged with defending the Summer Olympics’ IT systems. Miscreant Magnet Vincent Strubel, head of France’s national cybersecurity agency (ANSSI), warned that this year’s summer Olympics was facing an unprecedented level of cyber threats. Said Strubel: “There will be cyberattacks during the Games and the Paralympics... Some won’t be serious. Some will be serious, but won’t have an impact on the Games. And perhaps there will be some that are serious and liable to have an impact on the Games.” Franz Regul, head of the cyber team responsible for Paris 2024, said he expects the number of security events this year to be “multiplied by 10 compared to Tokyo”. There is a need to keep an exceptionally tight attack surface and tie up any loose ends like SSL misconfigurations, open ports, and privacy issues such as cookie consent violations. French anti-cybercrime units have classified the cyber threats in five categories: 1. Amateur Hackers As the “as-a-service” cybercrime economy develops, it’s become easier than ever for novice threat actors to launch more sophisticated attacks than their limited skillsets would otherwise have allowed. This lowered bar for entry will lead to a higher overall number of attacks. 2. Thrill-Seekers The sheer size and popularity of the Olympic Games will tempt those broadly inclined to create nuisance or show off their “cyber chops” to their peers. They’ll likely seek to exploit any security weaknesses in the websites or booking sites purposed for the event, including those of media organisations and sponsors. Common website security attacks such as cross-site scripting, SQL injection, and DDoS attacks will be their primary threat vector. 3. Hacktivists Activists passionate for their cause of choice are likely to attempt to hijack the world’s largest stage. 4. Black Hat Thieves The immense cashflow around the Paris Olympics makes them a potentially lucrative target for cyber thieves. Phishing attempts – expected to arrive in the form of unsolicited emails about the Games, lodging, tickets, or information followed by “helpful links” – will abound. Those who open the emails and click on the links may find their bank accounts quickly compromised. 5. Nation-State Actors The Olympics have long been a huge world stage on which global powers send political signals to countries, governments, and the world at large. As the Associated Press recently noted, “Among the most threatening cyber-adversaries are countries who might want to embarrass and exact costs on France and the International Olympic Committee.” Defending the Games French cybersecurity authorities are cagey about the significant precautions they’re taking to thwart cyber criminals. Revealing too much would give away a tactical advantage to blog-reading Black Hats. However, here’s what we know so far… 1. Ethical Hackers The ANSSI has hired ethical hackers to test the attack vectors on all Olympic websites. According to Strubel, 500 sites, competition venues and local collectives have all been put under “friendly fire”. 2. AI Artificial Intelligence is being employed to test for multiple threats across IT systems and websites. Regul said that AI was helping differentiate “between a nuisance and a catastrophe”. 3. Physical Security Transportation, supply chains, and surveillance systems are other potential targets for those seeking to compromise the Games. All have been included in the safety perimeter of the Paris 2024 cybersecurity preparations. 4. External Expertise The 2018 Winter Olympic Games were targeted by malware dubbed “Olympic Destroyer”, which aimed to disrupt the opening ceremony. Paris cybersecurity teams have tapped the knowledge and experiences of the consultants who detected and disabled that threat. A Bug Bounty program has also sought to attract the time and skills of independent IT practitioners. 5. Education & War Gaming During the past two years, ANSSI has been “war gaming” cyber incidents with the International Olympic Committees’ IT partners, and deploying cyber defence education programs across the thousands of people responsible for operating the Paris Games’ IT systems. No News will be Good News The final word on Paris’s cyber preparations belongs to Jérémy Couture, who helms the official cybersecurity hub of the Paris Olympic games. Couture said his dream for the Olympics is that technology and cybersecurity won’t be talked about - because that will mean they were a non-issue. Sports fans around the world will be hoping his dreams become reality. Need a Local Expert? If – like the Paris Games - you’d like to tap local expertise keep cyber criminals at bay, please feel welcome to contact me, Bradley Copson ( mailto:bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. #MFT #managedfiletransfer #securefiletransfer #sft #cybersecurity #datatransfer Previous Next

bottom of page