top of page

Search Results

195 results found with an empty search

  • ‘Cyber Trust’ needed to tap EOFY splurge | GSA

    < News ‘Cyber Trust’ needed to tap EOFY splurge 25 June 2024 Australians are shifting their End of Financial Year (EOFY) shopping focus to online deals and security, as they spend an estimated $10.1B in EOFY sales this month. New research from PayPal indicates that 38% of Australians plan to participate in EOFY sales this year. 42% of those say they will primarily shop online. Despite the growing trend of online shopping, almost all Australians (93%) are concerned about online security. Fake retail sites have begun to use generative AI to appear more convincing, and 40% of Australians are more concerned about their online security now than they were a year ago. Implications for Retailers Growing customer anxiety about e-commerce makes it more important than ever before for companies to establish trust in the security of their systems. With customers beginning to question the security of a company’s systems before handing over credit card and other information, companies need to be able to provide reassurance - and proof – that their transactions and personal data will indeed be secure. In fact, actively promoting the security of company systems may even become a point of positive marketing differentiation for companies that get ahead of these concerns. Earning Customer Trust A proactive and layered strategy for storing, transferring and securing data is essential for storing customer data, and effecting online transactions. Secure managed file transfer, secure content engines, secure digital rights management, and employee education combine to create the optimal way to prevent data theft and cyber breaches. At Generic Systems Australia , we recommend the class-leading secure managed file transfer solution, GoAnywhere MFT , to keep data safe - at rest, and in transit. Coupled with our Advanced Threat Protection Bundle , we enable organisations to safely store and transmit only the customer data they intend, without exposing their systems to malware. If you’d like to learn more about how to earn potential customers’ trust in your data handling practices through layered cyber defences, please feel welcome to get in touch with me, Bradley Copson ( mailto:bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, and even offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your Local Experts in Secure Managed File Transfer. Previous Next

  • New Security Standards for NZ Government Agencies | GSA

    < News New Security Standards for NZ Government Agencies 24 June 2025 New Zealand's National Cyber Security Centre (NCSC) has drafted Cyber Security Standards which government agencies will be required to adopt and implement later this year. The new standards outline the minimum cybersecurity practices that agencies must adopt for their business-critical and external-facing systems. In general terms, they require that cyber security policies, capabilities, controls, and practices must be well-formed and repeatable. The Standards 10 draft Standards are currently being discussed with agencies and industry partners as part of pre-implementation consultation and feedback gathering. They are: 1. Security Awareness 2. Risk Management 3. Assets and their Importance 4. Secure Software Configuration 5. Patching 6. Multi-factor Authentication 7. Detect Unusual Behaviour 8. Least Privilege 9. Data Recovery 10. Response Planning Maturity Model The draft Standards feature a built-in Capability Maturity Model (CMM) to help agencies standardise how they measure, track and improve their cyber risk management over time. CMM1 “Informal”: Security capability may be ad-hoc, unmanaged or unpredictable. Success may rely on individuals rather than institutional capability. CMM2 “Planned and Tracked”: Security capability is well formed in designated business units. The security policies, capabilities, control and practices are in place and repeatable. They are designed to meet the organisation’s core security requirements. CMM3 “Standardised”: Security capability is standardised, integrated, understood and followed consistently across the enterprise. Security is well-governed and managed at an enterprise level. CMM4 “Quantitatively Controlled”: Security capability and performance is measured, monitored and objectively and quantitively controlled. Security measures are hardened in response to performance alerts. Security is a strategic focus for the organisation. CMM5 “Optimising”: Security capability adapts to a dynamic, high risk operating environment. Practices are generally recognised as world-leading and have near real-time measurement and response mechanisms. Agencies will be required to meet at least Capability Maturity Model level two (CMM2) for their business-critical and external-facing systems. Consultation Phase underway The NCSC began consulting with affected agencies and industry partners on 16 June. Discussions will continue until 4 July 2025, with final Standards planned for publication in October 2025. Agencies will be required to report on their implementation of the standards as part of Protective Security Requirements reporting process (a framework for managing security within NZ government organisations) in April 2026. The initial draft of the NCSC’s Minimum Cyber Security Standards are available for download from the NCSC website . MFT as a Baseline Protection Tactic NZ organisations seeking to step up to the new minimum standards should carefully consider installing a Managed File Transfer (MFT) solution as an initial step. This relatively simple enhancement to IT systems puts organisations miles ahead of businesses still using risky and outdated FTP (File Transfer Protocol) or email to transfer files. MFT centralises data transfer and - more importantly - applies policies to data to protect it from threats such as inbound malware and employees sending files via ad hoc platforms outside the defensive perimeter (e.g. Google Drive and Dropbox). MFT has the built-in advantage of “forcing” the application of policies designed to better protect data such as encryption, monitoring, and auditing. Expertise Close at Hand No-one better understands local MFT needs and best practices than Generic Systems Australia. Our team has decades of experience helping organisations implement the world’s leading MFT solution. Our Migration Service makes the transition even easier for busy agencies who would rather focus on their core mission than their IT systems. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch. At Generic Systems Australia, we’re your local experts in Secure Managed File Transfer. Previous Next

  • Build Better Solutions by Incorporating MFT | GSA

    < News Build Better Solutions by Incorporating MFT 22 July 2025 Solutions Architects play the critical role of translating complex business requirements into scalable, maintainable technology solutions. Their holistic view of their organisation’s information systems ensures that individual components — from databases and integration layers to user interfaces — work together seamlessly. However, amid the complex considerations for developing sophisticated new software solutions, it can be easy to overlook simple opportunities to also improve an organisation’s fundamental IT processes. For example: file exchange. Any solution which still relies on insecure scripts, ad-hoc FTP servers or email attachments is inherently less efficient and more risky than a solution which leverages Managed File Transfer (MFT) technology. Outdated file transfer approaches expose an organisation to data breaches, compliance violations, and painful troubleshooting cycles. A minimal incremental investment in MFT could transform those weak links into a strategic asset, delivering automated, auditable, and secure data flows that align perfectly with modern architecture patterns. Hidden Risks of Traditional File Transfer Legacy file-sharing methods carry hidden dangers: Unencrypted channels leave sensitive data exposed. Manual processes introduce human error and delays. Absence of centralised visibility hinders troubleshooting and governance. Ignoring these pitfalls increases operational overhead and jeopardises client trust. As a Solutions Architect, you hold the blueprint for resilient systems. And when it comes to security and reliability, file transfer can’t be an afterthought. Why MFT Deserves a Place in Your Architecture Integrating MFT early in your design delivers: Enhanced Security: End-to-end encryption, role-based access, and non-repudiation. Regulatory Compliance: Built-in audit trails, detailed reporting, and retention policies. Automated Workflows: Trigger-based transfers, retries, and notifications eliminate manual handoffs. Centralised Visibility: Dashboards and logs surface issues before they escalate. Seamless Scaling: Cloud or on-prem deployment adapts to seasonal or unpredictable load. By codifying file transfers as robust services, you unlock consistent performance and reduce risk across every project. Tips for Practical Integration Enhancing your solution with MFT is relatively straightforward. Define Requirements: Catalogue data types, transfer volumes, and compliance mandates. Evaluate Vendors: Compare security features, deployment models, and API support. Run a Pilot: Validate connectivity, throughput, and automation capabilities with sample workflows. Embed in CI/CD: Treat transfer jobs like code—version, test, and deploy with your pipeline. Train Stakeholders: Empower developers and operators with clear documentation and dashboards. Essential With hacking and data theft rampant across the globe, MFT is no longer a “nice-to-have” — it’s essential infrastructure. Weaving MFT into your solution blueprints elevates security, streamlines operations, and future-proofs data exchange. By baking MFT into your next project, your organisation’s architecture — and stakeholders — will thank you. Expert Local Help There’s no need to go it alone – or rely on overseas resources - when building MFT into your local solution. At Generic Systems Australia , we have many years of practical experience helping Australian and New Zealand IT teams simply and easily integrate MFT with their many and varied solutions. Please feel welcome to contact me to learn more. I’m always happy to have an obligation-free discussion. At Generic Systems Australia, we’re your local experts in Managed File Transfer. Previous Next

  • Protect Your Organisation From Stranger Strings | GSA

    < News Protect Your Organisation From Stranger Strings 1 Dec 2025 In the hit Netflix series Stranger Things , danger lurks in the shadows of ordinary life — a flickering light, a hidden passage, or a seemingly harmless object can conceal a gateway to the Upside Down. That’s how it is with the batch files still used by many organisations to conduct critical daily file transfers. These batch files may look mundane, even routine. However, a single hidden line of code can unleash chaos. Hiding in Plain Sight A batch file is essentially a script: a sequence of commands executed by the operating system. While this makes them convenient for repetitive tasks, it also makes them vulnerable to tampering. A single malicious line can transform a routine transfer into a catastrophic event. Consider this simple example: “del C:\*.* /Q /F” This line, if inserted into a batch file, would attempt to delete every file on the C: drive. To the untrained eye, it might blend seamlessly among legitimate commands like ‘xcopy’ or ‘robocopy’. Yet its impact would be devastating — wiping out critical data, halting operations, and potentially opening the door to further exploitation by hackers. The danger lies not in the complexity of the attack, but in its simplicity. One unnoticed command can undo years of work. The Demogorgon in the Detail Batch files are inherently insecure because they lack the safeguards modern IT environments demand. Their key risks include: Ease of manipulation: as they’re plain text, anyone with access can edit them, inserting destructive or unauthorised commands. No authentication or encryption: they move files without verifying the sender or encrypting the data, leaving sensitive information exposed. Limited logging and visibility: they provide little or no audit trail. You may not even know a breach has occurred until the damage becomes apparent. Escalated privileges: a malicious line may not just affect files; it may compromise your entire system. Prone to human error: a simple mistyped command can have disastrous consequences. No Place for 80s Nostalgia Batch files are relics of a time when networks were simpler and threats less sophisticated. In today’s environment of ransomware, insider threats, and regulatory scrutiny, relying on them is a huge gamble. The Modern Alternative Managed File Transfer (MFT) solutions address batch file vulnerabilities by providing a secure, automated framework for moving data. Unlike batch files, MFT platforms are designed with security, compliance, and reliability at their core. Here’s why MFT is a safer choice: Encryption by default: MFT solutions encrypt files both in transit and at rest, ensuring sensitive data cannot be intercepted or read by unauthorised parties. Authentication and access control: Only authorised users and systems can initiate transfers, and different permissions can be assigned to each user. This prevents tampering and ensures accountability. Audit trails and monitoring: Every transfer is logged, providing visibility into who moved what, when, and where. This is invaluable for compliance and incident response. Error handling and recovery: MFT platforms include built-in mechanisms to detect failed transfers and retry automatically, reducing the risk of data loss. Scalability and automation: MFT systems can handle complex workflows across multiple environments, eliminating the need for fragile, manually maintained scripts. Compliance support: For industries bound by regulations such as GDPR, HIPAA, or PCI DSS, MFT provides the controls and reporting necessary to demonstrate compliance. Staying Out of the Upside Down The contrast between batch files and Managed File Transfer is stark. Batch files are like handwritten notes left on a desk — easy to read, easy to alter, and easy to misuse. MFT, by comparison, is like a secure courier service: encrypted, tracked, and accountable at every step. At Generic Systems Australia , we’re Australia’s and New Zealand’s experts in helping organisations automate their file transfers with Managed File Transfer solutions. If you’d like to discuss how we can help you, please feel welcome to get in touch with me . I’m always happy to have an obligation-free chat and explain how simply and affordably we can replace your outdated batch files with a reliable and efficient MFT solution. Previous Next

  • Why Your Business Can't Rely on Employee Cybersecurity Training | GSA

    < News Why Your Business Can't Rely on Employee Cybersecurity Training 29 Oct 2025 The employee cyber security training programs implemented by most large companies don’t reduce the risk of their employees falling for phishing scams. That’s the shocking conclusion of recent research evaluating the effectiveness of two common types of cybersecurity training.  Phishing is a deceptive tactic in which attackers impersonate trusted entities to trick individuals into revealing sensitive information like passwords, credit card numbers, or personal data.  It continues to be the most common form of cyber attack, and leads to the greatest number of cyber infiltrations. Testing the Defences To test the effectiveness of anti-phishing training, researchers sent 10 different phishing email campaigns to 19,500 employees at UC San Diego Health over an eight month period.  They found that there was no significant relationship between whether an employee had recently completed mandated cybersecurity training and whether they then fell victim to a phishing email. Researchers also tested whether sharing anti-phishing information after an employee fell for a phishing scam improved the employee's ability to detect a subsequent phishing attempt. However, once again, they observed very little difference in repeat failure rates. In fact, embedded phishing training only reduced the likelihood of an employee clicking on a phishing link by a mere 2%. Why training fails Research study co-author Grant Ho said a key reason the anti-phishing training isn’t effective is that most employees don’t engage with embedded training materials.  75% of users in the study engaged with embedded training materials for a minute or less, and a third closed embedded training pages immediately, without reading them. He recommended that organisations refocus their efforts to combat phishing on technical countermeasures. Technical Countermeasures One of the first and best lines of defence against phishing is to prevent malware and suspicious links before they can reach employees’ devices.  At Generic Systems Australia we combine the world’s leading Managed File Transfer solution, GoAnywhere , with Advanced Threat Protection to deliver a proactive, multilayered defence against both external threats and internal data leakage.  GoAnywhere provides secure encryption, access controls and audit trails for file transfers, while ATP enables your organisation’s email system to automatically detect and prevent phishing links and other malware from entering your organisation. Here to Help At Generic Systems Australia we have decades of experience helping Australian and New Zealand organisations protect themselves against malware and other cyber attacks. Our Migration Service makes the transition even easier for organisations who prefer to let their team get on with their regular work rather than taking time out to improve their IT plumbing. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT and ATP solution, please feel welcome to get in touch with me. At Generic Systems Australia, we’re your local experts in Secure Managed File Transfer. Previous Next

  • Mid-Q3 Already...?! How’s That IT Roadmap Faring | GSA

    < News Mid-Q3 Already...?! How’s That IT Roadmap Faring 11 Aug 2025 With 2025 already more than halfway done, how well are your IT deployments shaping up against your start-of-year roadmap? A Gartner survey at the end of last year found that most A/NZ CIOs were planning to invest significantly in improved cyber security in 2025. In fact, 88% of our region’s CIOs and technology executives said they’d invest in heightened cyber security measures, with 82% nominating it as their top investment priority. More Attacks, More Regulation The factors driving that focus certainly haven’t let up in the year to date. That is to say: the government’s push for greater regulation and transparency and the volume and sophistication of cyber attacks haven’t abated. As Gartner VP Brian Ferreira told the 2025 Gartner IT Symposium/Xpo on the Gold Coast: “Organisations face greater scrutiny as they batten down the hatches to avoid becoming the next target or breaching stewardship. This continues to drive significant focus and investment towards cybersecurity and legal compliance into next year.” Executive and board scrutiny of cyber security preparedness hasn’t let up, either. Heightened Focus Gartner’s survey found that ANZ CIOs would have a significantly heightened focus on ensuring compliance and minimising risks (92% - up from 57% last year). That makes perfect sense, with Australia’s regulatory landscape tightening and more stringent laws enacted to increase CIOs’ stewardship obligations. Checkpoint So, as Q4 2025 looms on the horizon: how are your 2025 IT advances panning out vs your 2025 plans? Here at Generic Systems Australia we’re continuing to see many Australian and New Zealand enhancing their core cyber security through class-leading Managed File Transfer solutions. We have many years of experience helping our customers do that, from the initial scoping of legacy data transfer approaches through to zero-cost Proof of Concepts and hassle-free Migration Services. If you’d like a to discuss how your organisation’s cyber security can be boosted by a cost effective Managed File Transfer solution, please feel welcome to contact me. I’m always happy to have an obligation-free discussion. Previous Next

  • Top Cyber Security Agency Reports on Most Common Cyber Threats to Businesses | GSA

    < News Top Cyber Security Agency Reports on Most Common Cyber Threats to Businesses 3 Dec 2024 The latest annual report by Australia’s top cyber security agency – The Australian Signals Directorate (ASD) – contains sobering details about the challenges being confronted daily by Australian businesses. Describing the current cyber security strategy environment as “the most complex and challenging … since the Second World War”, the ASD says advancements in critical and emerging technologies dramatically improve the ability of cyber thieves targeting Australian organisations. Cyber Crime Increasing ASD received more than 36,700 calls to its Australian Cyber Security Hotline during the 2023-24 financial year - up 12% on the previous year. It responded to more than 1,100 cyber security incidents, and notified organisations of potential malicious activity on their networks more than 930 times. However, these numbers are merely the tip of the iceberg relative to the total number of attempted hacks. ASD characterised cybercrime as “a persistent and disruptive threat”. Contributing to the surge in cyber crime is the availability of new opportunities and technologies such as artificial intelligence. This is reducing the level of sophistication needed for cybercriminals to operate, and attracting new criminals to the field. Top Business Threats Compromised business email accounts (20%) and fraud (13%) were among the top self-reported cybercrimes for businesses and individuals in Australia during the last financial year. Online banking fraud accounted for a further 13% of incidents. Ransomware and data theft extortion (stealing data without encrypting their victims’ systems) also remained a pervasive and costly threat. The top 5 sectors reporting cybercrimes to law enforcement were: Retail trade (15%) Professional, scientific and technical services (13%) Construction (12%) Financial and insurance services (8%) Other services (7%) Average Losses by Businesses Interestingly, the average self-reported cost of cybercrime to Australian business fell slightly vs the previous financial year: Small businesses: $49,615 (down 8%) Medium businesses $62,870 (down 35%) Large businesses $63,602 (down 11%) However, it’s worth bearing mind recent research which shows a large number of businesses did not report ransomware payments in 2023-24. Cybercrime Reports by State and Territory Australia’s more populous states continue to report more cybercrime, with Queensland and Victoria reporting disproportionately higher rates of cybercrime relative to their populations. The highest self-reported financial losses were from victims in NSW (~$86,000 per cybercrime) followed by Victoria (~$66,000). Common Cybercrime Techniques The ASD says Credential Stuffing – using stolen usernames and passwords to access other services and accounts via automated logins – is one of the most common cyber attacks. Another common technique is Password Spraying - a brute-force attack where cybercriminals attempt to access a large number of accounts with commonly used passwords. Quishing - Quick Response (QR) phishing – is another growing threat. Cybercriminals use QR – for example, on a café menu, or a subtly altered public notice - to trick people into providing personal information or downloading malware onto their smart device. Combating the Threats In its report, ASD urges organisations to replace unsupported information and communications technology systems with secure-by-design products, and consider cyber security when implementing new technologies. Two great examples of secure-by-design protective technologies are those that we recommend at Generic Systems Australia. Managed File Transfer (MFT) is a technology which enables organisations to securely exchange data between systems and people in an automated, reliable and efficient way. Advanced Threat Protection adds a further layer of defence, seamlessly integrating your managed file transfers with adaptive data loss prevention to keep sensitive data secure. ASD also urges organisations to prepare a cyber security incident response plan and test it regularly to ensure an effective response and fast recovery. The process of developing such a plan will help an organisation understand the nature of its most valuable data, where it is stored, which systems and individuals have access to it, and how it is protected – or exposed to – malicious threats. Obtaining Expert Help At Generic Systems Australia , we have many years of experience helping Australian and New Zealand IT teams protect their valuable data with the very best MFT solutions. From the initial scoping of organisations’ legacy data transfer approaches, through zero-cost Proof of Concepts and hassle-free Migration Services , we help companies stay focused on running their business without disruption as we transition them to more secure approaches. If you’d like a to discuss how your cyber security can be boosted by MFT and layered defences, please feel welcome to contact me . I’m always happy to have an obligation-free discussion. Generic Systems Australia are your local experts in Managed File Transfer. You can view a full copy of The Australian Signals Directorate Annual Cyber Threat Report 2023-24 here . Previous Next

  • What is ‘MFT’ ... and why should you care | GSA

    < News What is ‘MFT’ ... and why should you care 19 Oct 2023 What is ‘MFT’ - and why should you care about it? In today's data-driven world, the seamless and secure exchange of information is key to business efficiency. Managed File Transfer (MFT) is a powerful technology that comprehensively addresses the risks and challenges of moving information, both within an organisation, and with external suppliers, partners and customers. At its core, Managed File Transfer simplifies the complexities of data transfer by offering centralised control, encryption, and auditing capabilities. Unlike traditional approaches, such as FTP, MFT provides enhanced security protocols, ensuring data privacy during transmission and storage. And it does so via a user-friendly interface, which is easy to use for even non-technical employees. Organisations adopt MFT technology for the many benefits it provides. Security: MFT employs robust encryption algorithms, reducing the risk of data breaches during transit. Features like Access Controls, and Multi-factor Authentication, safeguard sensitive information from unauthorised access. Efficiency: MFT automates repetitive tasks. This not only reduces human error, it saves significant staff time. Through scheduling of file transfers, monitoring of progress, and automatic error-handling, it enables a significant boost to operational efficiency. Compliance: In industries with strict regulatory requirements, MFT helps companies meet compliance standards (e.g. HIPAA and GDPR) by automatically maintaining detailed logs and audit trails. Scalability: Through its ability to handle large file transfers and an ever-growing number of users, MFT is able to grow in sync with an organisation's needs, while maintaining superior performance. Collaboration: In addition to improving business processes within an organisation, MFT facilitates seamless collaboration with external partners, suppliers, and customers, fostering strong relationships built on shared trust and reliability. Managed File Transfer technology offers organisations a secure, efficient, and scalable solution for their data transfer needs. By leveraging MFT, businesses can not only streamline their operations but also gain a competitive edge, while ensuring the integrity and confidentiality of their data in today's interconnected digital landscape. Generic Systems Australia is the Asia-Pacific region’s leading provider of secure MFT solutions. If you’d like to explore how your organisations’ efficiency and bottom line could be boosted through MFT technology, please feel free to contact our Business Manager, Bradley Copson, ( bradley@gensys.com.au ) for an obligation-free discussion. Previous Next

  • Increased 3rd Party Data Sharing Increases Data Theft Risk | GSA

    < News Increased 3rd Party Data Sharing Increases Data Theft Risk 29 July 2024 The inability to track, control and report sensitive content shared with external contacts is a substantial risk for modern enterprises. And that risk appears to be rapidly escalating, as two-thirds of organisations each exchange sensitive data with more than a thousand third parties. These are some of the key findings from a survey conducted recently by Kiteworks, a US-based data security firm. Sensitive Content Kiteworks defines “sensitive content” as the wide variety of content commonly targeted by cyberthieves. It’s content which poses a significant threat to an organisation once bad actors get their hands on it. Sensitive content includes the data of customers and employees — personally identifiable information (PII), protected health information (PHI), and payment card industry (PCI) data. It also includes an organisation’s intellectual property (IP), legal communications and documents, financials, mergers and acquisitions data, and other types of private and confidential information. Kiteworks says that the key problem with sensitive content is how it does not stay in one place. During daily operations, it is shared not only among employees, but also with partners, suppliers, contractors, legal counsel, accountants, auditors, and more. More Comms Channels = More Risk Efficient organisations are always searching for more “frictionless” ways to move their data. However, as their number of communication channels with external parties grows, so too does the potential opportunity for bad actors to intercept and steal the data. That escalating risk is borne out by Kiteworks’ analysis. They found that organisations with more than seven communication tools experience ten plus data breaches, which is 3.5 times higher than the aggregate of those experiencing one to ten breaches. File Size Limits Exacerbate Risks The file size limits imposed by many content communication tools are a key contributor to the risks of moving data. Frustrated employees simply trying to do their jobs will sometimes use insecure and unauthorised consumer-grade file sharing services to bypass organisational limitations. Even for those employees who always follow the rules, the resulting workarounds can trigger significant waste of staff time. More than 30% of organisations surveyed by Kiteworks needed to implement workarounds due to file size limits for email, file sharing, and managed file transfers over 50 times per month. Around 10% said they must do so over 100 times per month. IT Teams Stepping Up Switched-on IT teams are increasingly focused on addressing their organisation’s need to protect sensitive content. A popular solution is to unify communication tools and channels to secure sensitive content communications. Their primary drivers for change may vary – from protecting intellectual property and corporate secrets to mitigating litigation, avoiding regulatory violations and protecting their brand reputation – but the way they are addressing these risks is similar… Control Through Consolidation Consolidating communication tools onto a single platform needs to be a foundational element of an organisation’s cyber defences. By reducing the number of disparate tools used for content communication, they can significantly lower the risk of data breaches and improve operational efficiency. Kiteworks’ survey shows that organisations with fewer communication tools experience fewer breaches. Tool consolidation significantly enhances security. MFT Consolidates, Automates, Improves Efficiency Managed File Transfer (MFT) software is a powerful technology which comprehensively addresses the risks and challenges of moving information within an organisation, and with external suppliers, partners and customers. MFT simplifies the complexities of data transfer by offering centralised control, encryption, and auditing capabilities. A significant advance on traditional approaches, MFT provides enhanced security protocols, ensuring data privacy during transmission and storage. And it does so via a user-friendly interface, which is easy to use for even non-technical employees. In addition to consolidating the plethora of disparate data exchange channels employees create during an organisation’s evolution, MFT technology provides an array of organisation advantages: Security: MFT employs robust encryption algorithms, reducing the risk of data breaches during transit. Features like Access Controls, and Multi-factor Authentication, safeguard sensitive information from unauthorised access. No Size Limit Straitjacket: The best MFT solutions enable organisations to set file size limits appropriate to their teams’ needs. They also offer “persistence protocols” which ensure large files are fully transmitted to their intended destinations. Efficiency: MFT automates repetitive tasks. This not only reduces human error, it saves significant staff time. Through scheduling of file transfers, monitoring of progress, and automatic error-handling, it enables a significant boost to operational efficiency. Compliance: In industries with strict regulatory requirements, MFT helps companies meet compliance standards (e.g. HIPAA and GDPR) by automatically maintaining detailed logs and audit trails. Scalability: Through its ability to handle large file transfers and an ever-growing number of users, MFT is able to grow in sync with an organisation's needs, while maintaining superior performance. Collaboration: In addition to improving business processes within an organisation, MFT facilitates seamless collaboration with external partners, suppliers, and customers, fostering strong relationships built on shared trust and reliability. The Best MFT At Generic Systems Australia, we recommend the industry’s class-leading MFT solution, GoAnywhere MFT . GoAnywhere is consistently declared by independent experts to be the best-in-class MFT solution. Besides achieving the highest overall score in the MFT category, GoAnywhere is also ranked highest for Vendor Capability Satisfaction, including the key dimensions of: • Business Value Created • Breadth of Features • Quality of Features • Product Strategy and Rate of Improvement • Useability and Intuitiveness • Vendor Support • Ease of Data Integration • Ease of Customisation • Availability and Quality of Training, and • Ease of Implementation GoAnywhere MFT's combination of versatility, security, ease of use, and budget-friendliness has propelled it to the top of the MFT market. Gain Expert Local Advice At Generic Systems Australia , we’re Australia’s and the Asia-Pacific region’s experts on MFT in general, and GoAnywhere in particular. If you’d like an obligation-free discussion about how we could help you keep your organisation’s sensitive content safe, please feel welcome to get in touch . We’re always happy to have an obligation-free discussion, and even offer a free Proof of Concept. Previous Next

  • A Missing Piece in Your Cyber Security Strategy? | GSA

    < News A Missing Piece in Your Cyber Security Strategy? 26 Mar 2024 Is Secure Managed File Transfer a “missing piece” in your company’s Cybersecurity Strategy? The Australian Federal Government has set its sights on making Australia a world leader in cybersecurity by 2030 and is currently drafting upgraded cybersecurity regulations. In the industry consultation period just ended, they flagged new cybersecurity legislation and amendments to the Security of Critical Infrastructure Act which would include: Secure-by-design standards for the Internet of Things; Mandatory ransomware reporting; and Upgraded protection for and risk management of critical corporate infrastructure. The new legislation reflects comments made by Attorney-General, Mark Dreyfus, in the aftermath of the 2022 Optus hack. He said “We need better laws to regulate how companies manage the huge amount of data they collect, and bigger penalties to incentivise better behaviour. (E)xisting safeguards are inadequate. It’s not enough for a penalty for a major data breach to be seen as the cost of doing business.” With new legislation — and much bigger fines — imminent, now is the time to plug any potential gaps in your organisation’s cybersecurity strategy. Protect Your Data, Not Just Your Network Increasingly frequent cyber incidents prove that cybersecurity is not keeping pace with cyber threats. According to Forbes, “Companies keep pouring tons of money into protecting their network… but the real crown jewels are in the data that sits behind the network walls. That data is often not protected." It’s not enough to lock the door. An organisation’s crown jewels should also be kept in a vault. This ensures that, even if a hacker gets inside, they won’t be able to exploit the data they find. The vault is encryption. And the security guard that puts the jewels in the vault is Managed File Transfer (MFT). How MFT Secures Your Data To be truly secure, data must be protected not only when it’s stored, but also while it’s enroute to and from storage . MFT solutions such as the class-leading GoAnywhere MFT encrypt data at rest and in transit, complying with the highest data security standards across the US and Europe (e.g. HIPAA, HITECH, PCI DSS, SOX, and the GDPR). MFT manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols such as SFTP, FTPS, and AS2 to send files securely, and encryption standards such as Open PGP and AES to protect data in transit and at rest. The "Managed" in MFT MFT software automates and streamlines the exchange of data for you, reducing manual processes and eliminating the need for any legacy tools and scripts you might currently be using. Data (including documents, images, videos, and other files) can also be exchanged via MFT across your private networks, systems, applications, partners, and cloud environments from a single point of administration. More than Transfers MFT software isn’t only for sending files between users and systems. It can also automate business processes, ensure secure connections, track file transfer activity, and more… File Encryption GoAnywhere MFT employs integrated encryption technologies to secure sensitive data. It also includes a key manager which enables you to create, import, export, and manage your keys and certificates within the product. Automation User errors and manual processes can also cause data breaches. By automating the encryption and exchange of sensitive files, processes and workflows can run without user intervention — especially useful when dealing with a high volume of file transfers. Email Enhancement GoAnywhere MFT offers a secure email module which allows users to send one-off file transfers securely, through a HTTPS connection. Cloud Connections MFT can help you build better connections between your network and web/cloud applications. GoAnywhere MFT offers built-in cloud integrations with applications such as Dropbox, SharePoint, and JIRA, and popular cloud services including Amazon, Google and Azure. Auditing & Reporting GoAnywhere MFT provide audit reports to meet compliance needs. All file transfer and administrator activity is stored and easily searchable. For organisations that need to report on file transfer activity to remain compliant with regulations and laws, the audit logs can be automatically generated and distributed as PDF reports. These are just some of the many MFT features which can help you protect your files. Plugging in the Missing Piece With the Federal Government soon to unveil its new cybersecurity legislation, now is the time to get ahead of requirements and explore how MFT can enhance your data’s security at rest and in motion. Arrange a free MFT trial and see how it works in your organisation. The benefits are almost immediate, from file transfer automation to solid data encryption. A data breach need not be a given for your organisation. By adding the missing MFT piece to your Cybersecurity Strategy, your valuable data can remain out of reach of cyberthieves. If you’d like to discuss how MFT can complete your organisation’s Cybersecurity Strategy, please feel welcome to contact us . We’re always happy to have an obligation-free discussion, explain how quickly and easily we can transition your organisation to the class-leading MFT solution, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , We’re Your Local Experts in Secure Managed File Transfer! Previous Next

bottom of page