Search Results
192 results found with an empty search
- Boards Warned on Increased Middle East Cyber Risk | GSA
< News Boards Warned on Increased Middle East Cyber Risk 2 Apr 2026 Law firm Gilbert & Tobin has issued sage advice for Boards and senior management regarding the heightened cyber security risks from the Middle East conflict. Materially Increased Risk Gilbert & Tobin say the escalating armed conflict in the Middle East has “materially increased cyber risk for Australian organisations”. S&P Global Ratings recently observed that the war and broader geopolitical tensions have driven a significant increase in state-sponsored cyberattacks. Common targets are critical infrastructure, financial services, government and the private sector. The attacks typically attempt to dislocate essential services, disrupt supply chains and destabilise economies. Reports from cyber security specialists indicate an increase in phishing campaigns, ransomware-style attacks, data exfiltration and malware deployment targeting energy systems, financial institutions and government networks. Critically, supply chain links mean organisations well outside the immediate conflict zone, including in Australia and New Zealand, face indirect but material risk. The Australian Signals Directorate’s Australian Cyber Security Centre (ACSC) has also been actively issuing alerts concerning the exploitation of network infrastructure by sophisticated threat actors, including state-sponsored groups. This is not a hypothetical risk. Modern conflicts routinely extend into cyberspace. For affected organisations, the consequences can include mandatory regulatory reporting obligations, enforcement actions, economic and reputational harm and litigation. Actions You Should Take Gilbert & Tobin recommend the following immediate steps: Board acknowledgement and oversight Boards should formally acknowledge the heightened external cyber threat environment at their next meeting. Directors should require the Chief Information Technology Officer and Chief Information Security Officer to review their organisation's current exposure to the external threat landscape and report back to the board on assessed risk and actions being taken. The reporting should address the adequacy of existing security controls, any gaps identified and a timeline for remediation. Active board engagement on cyber risk is increasingly expected by regulators and is consistent with good corporate governance. Proactive threat intelligence and risk posture review CITOs and CISOs should proactively review threat intelligence feeds from the ACSC, industry information-sharing bodies and trusted commercial threat intelligence providers. This includes monitoring for indicators of compromise associated with state-sponsored and hacktivist groups linked to the conflict, reviewing the organisation's risk posture against current attack vectors (including spear-phishing, ransomware and exploitation of network edge devices) and ensuring that detection and monitoring capabilities are calibrated to the heightened threat level. Organisations should ensure they are subscribed to ACSC alert service and are acting promptly on advisories. Organisations using a Managed Services Provider should engage with them to understand how they can support this review and uplift. Cyber insurance policy review Organisations should urgently review their cyber insurance policies for exclusions relating to war, armed conflict, or nation-state actors. In the current environment, where the lines between criminal cybercrime and state-sponsored operations are increasingly blurred, there is a real risk that insurers may seek to rely on these exclusions to deny or limit claims. Incident response plan testing Organisations should test their cyber incident response plans now. This includes conducting tabletop exercises that simulate scenarios relevant to the current threat environment, such as a ransomware attack attributed to a state-linked actor, or a supply chain compromise originating from a conflict-affected region. Organisations should proactively identify key response contacts, including forensic vendors, external legal counsel, insurers and relevant regulatory notification contacts and ensure those details are current and accessible. Supply chain and third-party risk assessment Organisations should review their supply chain and third-party dependencies for exposure to the conflict and associated cyber threats. Threat actors are known to exploit interconnections between organisations. Compromised suppliers and service providers can have cascading effects. Your review should prioritise third parties with operations in, or connections to, the affected region, as well as critical technology and infrastructure providers. Local Support Generic Systems Australia is always available to help Australian and New Zealand organisations enhance their cyber security through the world’s leading Managed File Transfer solution, GoAnywhere MFT . If we can help you consider how MFT can affordably bolster your cyber security in these troubled times, please get in touch . Previous Next
- Email Overload Creating Cyber Complacency in Australia | GSA
< News Email Overload Creating Cyber Complacency in Australia 23 Oct 2024 Australians send and receive 8.1 billion emails each day. That makes us the 10th most prolific emailers in the world. And that’s a problem . It’s not just the inbox clutter we’re experiencing (or perhaps, contributing to). It’s the cyber security complacency it’s creating. You see, email continues to represent the single biggest threat to your organisation’s cyber security. The more emails we receive, the greater the risk that a cybercriminal will gain access to your organisation’s data and secrets. Proven Danger Real world tests have proven that the threat posed by Australians’ “email encumbrance” is real. Proofpoint conducted 183 million phishing simulations earlier this year. They observed that almost one in six recipients of a suspicious phishing email failed to protect their organisation’s valuable data. Recipients variously clicked malicious links, succumbed to a bogus password reset, or downloaded ransomware. What leads employees to fall for phishing and malware…? It’s “breach fatigue” – employees who have become complacent and careless about cybersecurity. Cyber Complacency Professor Sanjay Jha, UNSW Lead of the Cybersecurity Cooperative Research Centre, said: “It’s human nature that you start to just get used to certain things. (But) phishing attacks continue. In fact they are getting ever more innovative.” He urged companies to do more to keep personal data safe from hackers. “The problem is that ICT systems are very complex and every day new applications are deployed, and new information is stored and exchanged.” Whole-of-Enterprise Email Protection With escalating email volumes creating a high and persistent risk of cyber incursion, organisations need a systematic way for employees to securely and reliably exchange files and emails with external third parties. Thankfully, there are technical safeguards you can put in place to prevent your employees from accidentally - or negligently, or maliciously - allowing cyber criminals in. Not only will they help protect your organisation from cyber criminals, as a bonus, they’ll also improve your employees’ efficiency. Our SFT Threat Protection Bundle enables your organisation’s email system to automatically detect and prevent phishing links and other malware from entering your organisation. Better still, it can also automatically detect and prevent employees from sharing malware or sensitive information. Active Threat Protection If an employee - knowingly or unknowingly - attempts to share a file containing malware, the files are intercepted and “sanitised”. That is to say: their malicious elements are automatically removed. The SFT Threat Protection Bundle can also go a step further and automatically detect and prevent employees from sharing sensitive information. For example, let’s say a folder has Word or PDF documents, or Jpeg images, which contain Personally Identifiable Information. If an employee attempts to transmit any of these files, a secure ICAP gateway will automatically inspect and block the transfer. Or if you prefer, the gateway can be configured to automatically redact (i.e. mask out) sensitive information from documents and image files while still permitting the remainder of the file to be shared. Free Demonstration If you’d like to see first-hand how our SFT Threat Protection Bundle can help keep your organisation’s data safe, and help beleaguered employees keep their guards up, why not get in touch and have an obligation-free chat with me? At Generic Systems Australia , we’re your local experts in secure managed file transfer. PS: In the three minutes it took you to read this article, almost a billion new emails were sent around the world - many of them to and from Australians! Previous Next
- What to Look for in a Managed File Transfer Solution | GSA
< News What to Look for in a Managed File Transfer Solution 3 Mar 2025 Contributing to independent enterprise buying intelligence platform Peerspot , tech blogger Janet Staver has shared very useful advice on what to look for in a Managed File Transfer (MFT) solution. “If file transfers are an integral part of your business, it is crucial to implement an MFT solution,” she said. But how to choose which of the many MFT's on offer are best for your organisation...? Janet recommended you use the following key evaluation criteria: Security Ease of Use Data Analytics Authorisation and Validation Secure file governance Encryption and Decryption Regular Updates Automation Antivirus Visibility Budget-Friendly Customisation Security Highlighted by Janet as the “first and foremost” consideration – Janet observed that “not all secure MFTs are created equal.” In addition to assessing MFT solutions’ integrated security protocols, she advised intending purchasers to look for virus scans and the ability to quarantine to isolate malware. “MFTs with strong authorisation and validation are preferable as they can help with compliance requirements,” she said. Ease of Use For Janet’s second key consideration, she recommended businesses choose an MFT solution which improves productivity without requiring you to write scripts for data transfer. Data Analytics A useful tool to “gather data about your data”, Janet noted that data analytics were also useful for meeting compliance standards and optimising file management. Similarly, the best MFT solutions provide a high-level view of your system, including a CISO dashboard and SIEM (Security Information and Event Management) enabling reports on total access, locations, transfers, and threats. “A good MFT will include secure file storage and governance tools that don’t compromise security,” Janet said. “Flow authoring access controls (to work with advanced workflows), granular file access roles and user policies, and regular logging are some of the basic features you should look for.” Advanced Workflows, Regular Updates Janet noted that some MFTs offer automation capabilities, including agents to complete complex tasks at scale. Regular updates are also important to keep a company’s data safe from hackers, Janet said. (Her full advice can be read here . ) Independent Analysis To get you started comparing MFTs, you might want to consult the findings of respected independent tech analysts Info-Tech. They recently performed a comprehensive analysis of MFT solutions, using data sourced from real end users. Their recommendation…? GoAnywhere MFT . Besides achieving the highest overall score in the MFT category, GoAnywhere also ranked highest for Vendor Capability Satisfaction, including the key dimensions of: “Business Value Created” “Breadth of Features” “Quality of Features” “Product Strategy and Rate of Improvement” “Useability and Intuitiveness” “Vendor Support” “Ease of Data Integration” “Ease of Customisation” “Availability and Quality of Training”, and “Ease of Implementation” Tap Australia’s and NZ’s MFT Experts No-one better understands local MFT needs and best practices than Generic Systems Australia. Our local team has decades of experience helping businesses implement the world’s leading MFT solution. Our Migration Service makes the transition even easier for busy businesses who’d rather spend their time focusing on their customers than their IT systems. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch . At Generic Systems Australia , we’re your local experts in MFT. Previous Next
- How MFT Helps Thwart AI Security Threats | GSA
< News How MFT Helps Thwart AI Security Threats 19 Feb 2026 Artificial intelligence has changed the cybersecurity landscape in two powerful ways: it has given defenders new tools for detection and automation, and it has given attackers faster, smarter, and more adaptive methods for exploitation. As organisations adopt AI across their operations, the risks tied to data exposure, model manipulation, and shadow‑AI usage are growing rapidly. That’s exactly why Managed File Transfer (MFT) has become a critical control point in modern AI security strategies. One of the biggest challenges today is that AI systems thrive on data - large volumes of it, moving constantly between teams, tools, and external partners. Every transfer is a potential attack surface. Traditional ad‑hoc methods like email attachments or unsecured cloud links simply can’t keep up with the sophistication of AI‑powered threats. Hardened, governed, auditable MFT platforms, however, provide a hardened, governed, and fully auditable channel for moving sensitive information, dramatically reducing the opportunities for AI‑driven attacks to take hold. Modern MFT solutions like the award-winning GoAnywhere MFT incorporate real‑time threat detection, anomaly spotting, and adaptive security controls. These capabilities are essential as attackers use AI to probe for weaknesses. AI‑enhanced MFT can identify suspicious patterns, stop threats as they emerge, and strengthen encryption and key management practices, giving organisations a proactive defence posture rather than a reactive one. However, the real blind spot isn’t always the transfer itself - it’s what happens after the data arrives. Many organisations have invested heavily in securing file movement, only to lose control the moment an employee uploads that same data into an unvetted AI tool. Closing the Gap As one analysis notes, the risk often comes from the gap between secure systems and everyday AI use, where sensitive information can slip outside established controls without malicious intent. MFT helps close this gap by centralising oversight, enforcing governance, and ensuring that data entering or leaving AI workflows remains visible, compliant, and protected. As AI governance frameworks mature, organisations are under increasing pressure to demonstrate transparency, accountability, and strong data‑handling practices. MFT supports these requirements by providing consistent audit trails, policy enforcement, and automated compliance reporting - key elements of responsible AI governance. In a world where AI accelerates both innovation and risk, MFT acts as a stabilising force. It ensures that sensitive data moves safely, predictably, and under strict governance - reducing the likelihood that AI‑driven threats can exploit gaps in the flow. For organisations embracing AI, MFT isn’t just a file‑transfer tool; it’s a foundational security layer for the era ahead. Help Right Here Generic Systems Australia is Fortra’s #1 GoAnywhere Partner in Australia and New Zealand, with decades of experience enabling organisations to become more efficient, organised and protected. Our Migration Service makes the transition even easier. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch with us. Previous Next
- The Emotional Toll of Ransomware Attacks | GSA
< News The Emotional Toll of Ransomware Attacks 25 Aug 2025 Sophos’s recent report The State of Ransomware 2025 sheds light on the little-discussed human impacts of cyber attacks within compromised organisations. Sophos polled 3,400 IT and cyber security leaders across 17 countries who had been hit by ransomware in the past year. Aside from the financial and reputational costs to the organisations, Sophos found that the organisation’s IT and cyber security teams suffered negative personal consequences from every attack. Taking the Fall The fallout from a cyber attack was often most severe at the top of the IT team. In one in four cases, the team’s leadership was replaced as a consequence. That might seem “fair” to some. However, as most CISOs will tell you, business investment decisions are frequently made at the Line of Business level. CISO projects and investment requests are considered alongside other business priorities and investments – sometimes, deprioritised and rejected. In those instances, is it reasonable to hold the CISO accountable? As Frank Dickson, group VP for security at IDC, remarked to CSOonline.com : “Some presume that a ransomware attack is the fault of the CISO. The CISO is a leader, but not the leader. Breaches are the result of a pattern of decisions of many.” Dickson said that some enterprise business units — even some CEOs and COOs — will sidestep CISOs by deliberately not inviting them to key meetings, out of the fear they will slow down certain business processes. With the growing frequency of cyber attacks, and the considerable business disruption they create, that’s shortsighted and risky. Emotional Toll Sophos’ survey found that the human consequences of a cyber attack were felt well beyond the leadership level. 41% of IT/cybersecurity teams reported increased anxiety or stress about future attacks. 34% said the team felt guilty that the attack was not stopped in time. 40% reported increased pressure from senior leaders - though 31% reported increased recognition. 31% of teams experienced staff absences due to stress/mental health issues related to the attack. The survey responses reveal how a ransomware attack can be a brutal blow — not just to an organisation’s finances and reputation, but to the people responsible for the IT systems. For the IT team, it’s often a high-stakes, high-pressure ordeal. HR & C-Level Support An organisation’s Human Resources team and C-suite need to play a critical role in stabilising the IT team in the aftermath of a ransomware crisis. That begins with providing immediate support: Acknowledging the pressure, and recognising within the organisation the IT team's efforts. Providing flexible work arrangements, such as adjusted hours, remote work options, and time off where feasible. Making psychological first aid and counsellors available. Ensuring clear internal communication, to avoid the stresses of miscommunication and rumours. Longer term, the focus should be on building IT team resilience. Recognising and rewarding the IT team's role in recovery. Conducting cyber security training across departments - not just IT – to reinforce a culture of shared responsibility. Implementing retention strategies to mitigate post-ransomware attack attrition. Prevention: Better than Cure At Generic Systems Australia , we help Australian and New Zealand organisations avoid cyber attacks by making file transfer and email systems smarter and more resilient. Please feel welcome to contact me if we can help you. We’re your local experts in data transfer. Previous Next
- Why Your Business Can't Rely on Employee Cybersecurity Training | GSA
< News Why Your Business Can't Rely on Employee Cybersecurity Training 29 Oct 2025 The employee cyber security training programs implemented by most large companies don’t reduce the risk of their employees falling for phishing scams. That’s the shocking conclusion of recent research evaluating the effectiveness of two common types of cybersecurity training. Phishing is a deceptive tactic in which attackers impersonate trusted entities to trick individuals into revealing sensitive information like passwords, credit card numbers, or personal data. It continues to be the most common form of cyber attack, and leads to the greatest number of cyber infiltrations. Testing the Defences To test the effectiveness of anti-phishing training, researchers sent 10 different phishing email campaigns to 19,500 employees at UC San Diego Health over an eight month period. They found that there was no significant relationship between whether an employee had recently completed mandated cybersecurity training and whether they then fell victim to a phishing email. Researchers also tested whether sharing anti-phishing information after an employee fell for a phishing scam improved the employee's ability to detect a subsequent phishing attempt. However, once again, they observed very little difference in repeat failure rates. In fact, embedded phishing training only reduced the likelihood of an employee clicking on a phishing link by a mere 2%. Why training fails Research study co-author Grant Ho said a key reason the anti-phishing training isn’t effective is that most employees don’t engage with embedded training materials. 75% of users in the study engaged with embedded training materials for a minute or less, and a third closed embedded training pages immediately, without reading them. He recommended that organisations refocus their efforts to combat phishing on technical countermeasures. Technical Countermeasures One of the first and best lines of defence against phishing is to prevent malware and suspicious links before they can reach employees’ devices. At Generic Systems Australia we combine the world’s leading Managed File Transfer solution, GoAnywhere , with Advanced Threat Protection to deliver a proactive, multilayered defence against both external threats and internal data leakage. GoAnywhere provides secure encryption, access controls and audit trails for file transfers, while ATP enables your organisation’s email system to automatically detect and prevent phishing links and other malware from entering your organisation. Here to Help At Generic Systems Australia we have decades of experience helping Australian and New Zealand organisations protect themselves against malware and other cyber attacks. Our Migration Service makes the transition even easier for organisations who prefer to let their team get on with their regular work rather than taking time out to improve their IT plumbing. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT and ATP solution, please feel welcome to get in touch with me. At Generic Systems Australia, we’re your local experts in Secure Managed File Transfer. Previous Next
- Accountability Gap Creates Cyber Risk | GSA
< News Accountability Gap Creates Cyber Risk 22 Oct 2024 New research has revealed a concerning gap in accountability for cyber security in many Australian organisations. Security firm Trend Micro polled 100 Australian IT leaders to better understand their attitudes toward Attack Surface Risk Management. They found that most organisations lacked clear leadership buy-in and sufficient resources to measure and mitigate cyber risks. The top three gaps in cyber resilience were: Insufficient staffing for round-the-clock cybersecurity coverage. Inadequate techniques to measure and manage attack surface risks. Not using proven regulatory and other frameworks, such as the NIST Cybersecurity Framework. Only 37% of those surveyed said their organisation had satisfactorily closed each of these exposures. The buck stops… nowhere? Seeking root causes for unclosed gaps in organisational cyber resilience, Trend found that the failures could be traced back to a lack of leadership and accountability at the top of the organisation. More than a third of respondents claimed their leadership didn’t consider cybersecurity to be their responsibility. When asked who does or should hold responsibility for mitigating business risk, respondents gave a variety of answers, indicating a lack of clarity on reporting lines. Nearly a third (32%) said the buck stopped with organisational IT teams. Trend spokesperson, Srujan Talakokkula, said the “lack of clear leadership on cybersecurity, can have a paralysing effect on an organisation, leading to reactive, piecemeal and erratic decision making”. “A lot of that comes down to collaboration and communication across the business,” he said. “Companies need CISOs to clearly communicate in terms of business risk to engage their boards. “Ideally, they should have a single source of truth across the attack surface from which to share updates with the board, continually monitor risk, and automatically remediate issues for enhanced cyber-resilience,” he added. ASIC Cracking Down Trend’s warning comes on the heels of reports that Australia’s corporate regulator is preparing legal actions against some company directors for their lack of governance relating to cyberattacks. ASIC has previously cautioned directors that they need to prepare for hacks, and that sanctions would be applied to those who didn’t. They told The Australian Financial Review that companies wouldn’t get away with paying lip service to cyber defence and must provide evidence they had performed their duties if their organisation was breached by cybercriminals. “With one cyberattack reported every six minutes in Australia, ASIC’s message for directors is to make sure your organisations have appropriate cybersecurity measures in place – this is your responsibility,” a spokesperson said. Not just “an IT Issue” ASIC’s heightened investigations show that cyber security is no longer a fringe issue that can be relegated to technical staff. However, a survey of in-house lawyers by Herbert Smith Freehills recently found many boards are not yet engaged on the topic of cyber resilience. 58% said it would take an actual cyberattack to motivate their organisation to meaningfully improve their data risk management. Owning and managing the risk Rather than letting cyber resilience slip between the cracks in org charts, directors need to put cyber resilience at the top of their companies’ board agendas. Executive management should be requested to report on the measures and investments they’re making to keep cyber thieves at bay. A Managed File Transfer (MFT) solution such as the class-leading GoAnywhere MFT can encrypt data at rest and in transit, complying with the highest data security standards. It manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols and encryption to protect data in transit and at rest. Advanced Threat Protection and Adaptive Loss Prevention add a further layer of defence. SFT Threat Protection enables safe collaboration with external parties, preventing malware from entering an organisation, and reducing the risk of employees losing or mishandling sensitive data. Local Experts On Hand Generic Systems Australia are local experts in Managed File Transfer and Advanced Threat Protection. We’ve assisted hundreds of organisations across the Asia-Pacific region to secure their data and keep cybercriminals at bay. If you’d like to discuss how we can help improve your company’s cybersecurity, please feel welcome to contact me , Bradley Copson. I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. Previous Next
- Survive the Cyber Security Staff Drought | GSA
< News Survive the Cyber Security Staff Drought 3 Sept 2024 Australian organisations are still struggling to recruit and train sufficient cyber security specialists to keep their valuable data safe. A report by government-funded industry body AustCyber predicted that Australia would need an extra 4800 cyber security workers each year to avoid a significant shortfall by 2030. It warned that the local industry is lagging those of other countries, urging further private sector investment in the area. AustCyber found that 74% of cyber security professionals were being impacted by non-availability of suitably qualified staff. Only 8.8% rated Australia’s cyber security sector as “highly competitive”, while 21% rated the local industry as “not competitive” compared to other global markets. 20% Positions Vacant The Australian Government’s 2023 Skills Priority List shows cyber security roles as among the highest-ranked skills with a national shortage. According to AustCyber, cyber security architects are the most in-demand cyber security role, followed by engineers and analysts. While there were ~51,300 dedicated cyber security workers in Australia last year, a staggering 12,500 jobs had remained vacant. The workforce needs to grow by 66% to reach the total of 85,000 who would be required by 2030. Speaking to The Australian Financial Review earlier this year, the RMIT’s Research Director from the Centre of Cyber Security, Matthew Warren, said: “We cannot run before we walk, and right now the Australian cyber security industry does not have the depth of dedicated, skilled cyber security workers required to strengthen Australia’s security posture against the increasing sophistication, ferocity and prevalence of cyber security threat actors.” AustCyber chief executive Chris Kirk said that cyber security was now a “non-negotiable, impacting every Australian”. Early Education + a Wider Funnel While there’s been a 30% year-on-year growth in the number of people studying cyber security at university, the funnel for future workers needs to be wider for AustCyber’s target to be met. Said Kirk: “We really need to get cyber into the education system quite early, like primary school. And, at the speed of which the industry moves, your skill set can be severely challenged very quickly. So it’s extremely important we upskill and keep globally relevant the professionals in these jobs.” Surviving Staff Shortfalls Organisations struggling to recruit cyber security specialists should consider how automation can augment and relieve the load being carried by their existing cyber security specialists. For example, advanced Managed File Transfer solutions, such as GoAnywhere MFT , can centrally manage and secure file transfers organisation-wide. Recognised for its class-leading features, GoAnywhere frees up your cyber security specialists, working in the background to comprehensively mitigate the risks of storing and moving your data, both within and outside your organisation. Through its centralised control, encryption, and auditing capabilities, GoAnywhere replaces risky traditional approaches and improves productivity. Its versatility, security, ease of use, and budget-friendliness have made it a must-have solution for organisations committed to protecting their information assets. Expert Local Advice On Hand At Generic Systems Australia , we’re Australia’s and the Asia-Pacific region’s experts on Managed File Transfer solutions. If you’d like a no-cost, no-obligation discussion about how we could help you augment your cyber security team’s efforts, please feel welcome to get in touch . Previous Next
- ‘Cyber Trust’ needed to tap EOFY splurge | GSA
< News ‘Cyber Trust’ needed to tap EOFY splurge 25 June 2024 Australians are shifting their End of Financial Year (EOFY) shopping focus to online deals and security, as they spend an estimated $10.1B in EOFY sales this month. New research from PayPal indicates that 38% of Australians plan to participate in EOFY sales this year. 42% of those say they will primarily shop online. Despite the growing trend of online shopping, almost all Australians (93%) are concerned about online security. Fake retail sites have begun to use generative AI to appear more convincing, and 40% of Australians are more concerned about their online security now than they were a year ago. Implications for Retailers Growing customer anxiety about e-commerce makes it more important than ever before for companies to establish trust in the security of their systems. With customers beginning to question the security of a company’s systems before handing over credit card and other information, companies need to be able to provide reassurance - and proof – that their transactions and personal data will indeed be secure. In fact, actively promoting the security of company systems may even become a point of positive marketing differentiation for companies that get ahead of these concerns. Earning Customer Trust A proactive and layered strategy for storing, transferring and securing data is essential for storing customer data, and effecting online transactions. Secure managed file transfer, secure content engines, secure digital rights management, and employee education combine to create the optimal way to prevent data theft and cyber breaches. At Generic Systems Australia , we recommend the class-leading secure managed file transfer solution, GoAnywhere MFT , to keep data safe - at rest, and in transit. Coupled with our Advanced Threat Protection Bundle , we enable organisations to safely store and transmit only the customer data they intend, without exposing their systems to malware. If you’d like to learn more about how to earn potential customers’ trust in your data handling practices through layered cyber defences, please feel welcome to get in touch with me, Bradley Copson ( mailto:bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, and even offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your Local Experts in Secure Managed File Transfer. Previous Next
- Think Mutual Bank finds GoAnywhere to be “the Obvious Choice” | GSA
< Case Studies Think Mutual Bank finds GoAnywhere to be “the Obvious Choice” Decad es of experience helping Asia-Pacific customers have established Generic Systems Australia as our region’s local experts in secure managed file transfer. In this case study, we share how GoAnywhere MFT , the world’s leading MFT solution , solved a US bank’s need to integrate with its external partners’ IT systems – extra fast! Think Mutual Bank, located in the US’s sprawling midwest, was searching for a way to transfer data between disparate banking systems. Although their core system runs on the IBMi, much of their broader business banking ecosystem runs on MS SQL. Getting all the data into the one place - their IBMi - then copying updated files back to the MS SQL system, was a daily challenge. Van Sy, Lead Systems Administrator at Think Mutual Bank, was tasked with finding a PCI DSS compliant solution – fast! Finding the Right Fit – Fast! Although Think Mutual Bank had a product that performed some of the functions they needed, Sy began a search for a product which offered greater functionality, and which could be implemented in the short timeframe he’d been given. As Sy explained: “We own another product that has some FTP functionality, but it doesn’t have the data push that we wanted. We wanted to be able to copy just certain fields from a SQL database over to the IBM i, and GoAnywhere does that, all in one package. "Due to our short timeline – literally, we were looking at just a month," he added. "We didn’t want or have time to do any coding ourselves, so GoAnywhere became the obvious choice.” Also key to the project’s success was a product whose technical resource staff were readily on hand to ensure the product was up and running when Think Bank needed it. “The support person I dealt with was very knowledgeable," Sy said. "Every time we had questions, he was there, and it really helped that he was very familiar with the product.” Planning for the Future A year on from the successful installation and transition to GoAnywhere MFT, Sy was planning to extend his use of the solution’s functionality. “We’ve been running GoAnywhere for about a year now, using the database push and the FTP functionality. In the short term, we’ll probably extend it out to other systems than just our business banking side. With GoAnywhere, it’s a secure FTP client, so I’ll be moving some of the older systems over to it.” Added Sy: “Most of the other solutions out there do one or two things, but not the whole package – that’s the reason we went with the GoAnywhere product. It really met all of our specific needs, with the database conversion, the database push and the secure FTP. So far, it’s been really solid.” Previous Next

