Search Results
170 results found with an empty search
- Info Stealer Supply Chain Exposed | GSA
< News Info Stealer Supply Chain Exposed 23 Oct 2025 The Australian Signals Directorate has demonstrated how Information Stealer malware is simplifying data theft for even “entry level” cybercriminals. This malicious software is designed to infect a device, collect as much valuable data as possible, and deliver it directly to cybercriminals. It’s commonly distributed through SMS or email phishing, online advertisements containing malicious links and downloads containing hidden malicious code. The malware extracts data such as usernames and passwords, credit card details, cryptocurrency wallets, local files and browser data including cookies, user history and autofill details. Malware-as-a-Service providers offer info stealers to entry-level cybercriminals, enabling them to easily collect stolen data which can be used down the cybercrime supply chain to extort organisations and individuals. At Generic Systems Australia, we have many years of experience helping organisations thwart cyber criminals through cutting-edge Managed File Transfer solutions and secure email gateways. Get in touch if you’d like an obligation-free discussion about how we could potentially help your organisation. Previous Next
- How MFT Monitors and Protects Your Organisation’s Vulnerable Edge Devices | GSA
< News How MFT Monitors and Protects Your Organisation’s Vulnerable Edge Devices 11 Mar 2025 The Australian Signals Directorate (ASD) has urged Australian organisations to ensure they employ effective logging and monitoring to detect potential threats on network edge devices. Edge Devices Edge devices are critical network components positioned at the periphery of an organisation’s internal network (i.e. "the edge"). They’re the critical interface between the organisation and the internet, performing essential functions such as managing data traffic, enforcing security policies and enabling seamless communication across network boundaries. The most common edge devices across enterprise networks include enterprise routers, firewalls and VPN concentrators. Every organisation with a connection to the internet has at least one edge device. Edge Vulnerability Because edge devices they can access other assets on the organisation’s network, they’re an appealing target for cyber criminals. Failing to secure them is like leaving a door open from the internet to internal networks. Once inside, hackers can access sensitive data and disrupt business operations. As they perform their important task in the background, it can be easy to overlook the security vulnerabilities that edge devices present. And the more edge devices an organisation uses, the greater the potential “threat surface”, and the greater challenge for IT staff to keep them secure. Compromised edge devices can lead to data loss, intellectual property loss, financial loss, business disruption, reputational damage and legal liabilities. Maintaining The Edge The ASD says that, to protect their edge devices, organisations should focus on: • capturing high-quality logs • centralising logging in real time, and • securing event log storage. Automated Logs, Auditing and Reporting Managed File Transfer (MFT) technology has a key role to play in monitoring data transfers, both within an organisation and to the outside world. Leading MFT solutions such as GoAnywhere MFT automatically compile comprehensive audit reports of file transfer activity. All file transfer activity is securely stored and easily searched. Reports and alerts can be automatically emailed to cyber security staff, who can instantly check files are only being sent where they should go, and by people appropriately authorised to send and receive them. Further, any organisations required to report on file transfer activity can use GoAnywhere’s logs to comply with their industry’s cyber regulations. Heeding the ASD’s Advice At Generic Systems Australia, we have decades of experience helping Australian and New Zealand organisations take advantage of the security and efficiency that MFT provides. And our Migration Service makes the transition even easier for busy businesses who’d rather spend their time focusing on their customers than their IT systems. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch . Previous Next
- Bargain Retailer finds GoAnywhere Really “Delivers the Goods” | GSA
< Case Studies Bargain Retailer finds GoAnywhere Really “Delivers the Goods” Decades of experience helping Asia-Pacific customers have established Generic Systems Australia as our region’s local experts in secure managed file transfer. In this case study, we share how a US retailer is leveraging both robustness and advanced features of GoAnywhere MFT , the world’s leading MFT solution . Grocery Outlet is a chain of more than 300 family-owned deep-discount grocery stores based in Berkeley, California. The retailer helps more than 1.5 million shoppers each week save big, making it the US’s largest extreme value retailer. Homegrown: Good for Produce; Not for File Transfers Steve Tuscher is the Director of IT at Grocery Outlet, overseeing technology which manages more than 33,000 file transfers each day. “We had always transferred files between our systems with homegrown FTP scripts,” he said, “but knew we needed a better solution. Writing the scripts for these transfers was time consuming. However, the real challenge the IT team faced was tracking down what happened if a file exchange failed. The grocer primarily wanted to send files back and forth reliably and in a controlled manner. They also sought a solution that included error reporting functionality that was platform independent, as they exchange files with multiple vendors, suppliers, and other trading partners daily. “One of our vendors suggested a file transfer tool but it was priced out at US$100,000, and we didn't want to do that,” said Steve. “We knew of GoAnywhere Managed File Transfer (MFT) because they'd been in the AS400 (IBM i) world for a couple decades at least, the same as we have been. So we thought we'd give GoAnywhere MFT a shot. He added: “It's been a great product. It worked from day one and it's worked ever since.” Bargain Retailer Gets Money’s Worth While GoAnywhere does the heavy lifting on the large volume of daily files transferred, Steve discovered another surprising benefit of GoAnywhere MFT — managing the many emails the company received and creating a reporting system for them as well. “After we learned that GoAnywhere could retrieve mail from an Exchange mailbox, we developed an automated script to do that. It checks for incoming mail every three seconds and launches a job based on if there's new mail on the IBMi. We then take that request, run another job, then return the email with a report. It's a handy little reporting system that's very popular,” he said. GoAnywhere not only provides users a way to simplify and secure their file transfers, keeping sensitive data secure both at rest and in motion, it also helps retailers meet relevant security and compliance regulations, with auditing and reporting functionality, as well as strong encryption and security protocols. “All the other extras that came with it, and all of the ways we're using GoAnywhere now have been a bonus,” said Steve. In particular, he called out the solution’s scripting language. “The robustness of that language has been a real surprise – a pleasant surprise,” he said. GoAnywhere’s ease-of-use, and ability to manage the many file transfers occurring each day without the need to write homemade FTP scripts enables Grocery Outlet’s IT team to spend their time on more critical, and less manually intensive tasks. Improved Workflows and Partner Relations Grocery Outlet extracts much of its data from FTP scripts. With GoAnywhere, the previously complex process now runs unattended every night. “It's been great. Just having the ability to run an FTP script to get data, zip it up, and send it somewhere has been phenomenal,” Steve said. The GoAnywhere solution saves Grocery Outlet’s IT team time in two ways: problem resolution and eliminating the problems all together. “Typically, you'd copy some script and create a new script, and it would generally run. The problem is that when it wouldn't run, you wouldn't find out about it until it was too late, or until people were waiting for their orders or in a crisis. “The real time saving in GoAnywhere is that it basically never fails. That thing is rock solid. I can't remember the last time we had a failure due to GoAnywhere. If there's a failure, it's because the receiving side is down or not available.” With GoAnywhere quickly replacing all internal FTP scripts, the grocer transformed their data delivery across all their business partners and all internal systems. Steve noted his surprise at being able to do so as quickly and as easily as they did. The biggest surprise for the company, however, was how they use the email retrieval function. “That has been a huge homerun application for being able to request and report on your phone, and have it delivered back to your phone, like a sales report, within seconds. The response time is amazing! Literally within seconds you’re able to get a nicely formatted HTML email report on your phone, no matter where you are, via GoAnywhere. That has been great,” Steve said. He said he tried to stay up to date on updates to GoAnywhere, so that Grocery Outlet could take advantage of new features. Quick ROI Steve is enthusiastic in his recommendation of GoAnywhere, exclaiming: “It will be the easiest implementation you've ever had. It will be the best value of software that you've ever had. And you'll be sorry if you do not explore this package.” Previous Next
- Battle “Breach Fatigue” with Managed File Transfer | GSA
< News Battle “Breach Fatigue” with Managed File Transfer 16 Dec 2025 With the festive season fast approaching, many in business may be left feeling a little fatigued by what has been a hectic business year. But none more so than your beleaguered IT team. In 2025 they’ve been facing relentless waves of cyber-attack. From phishing campaigns to ransomware threats, they’ve needed to maintain constant vigilance to defend against the hordes of cyber criminals eager to steal your organisational data. In a phenomenon known as “Breach Fatigue”, a state of near exhaustion occurs when IT teams become desensitised to the sheer volume of alerts, warnings, and incidents they must manage daily. The consequences are serious: slower response times, overlooked vulnerabilities, and a creeping sense of burnout. Human Toll IT departments are inundated with hundreds of alerts each day, ranging from minor anomalies to potentially serious threats. Over time, the sheer volume of these notifications becomes mentally exhausting, making it increasingly difficult for teams to distinguish genuine risks from false positives. This operational overload not only slows response times but also raises the likelihood of critical signals being overlooked. As fatigue sets in, vigilance naturally declines. Teams may unconsciously lower their guard, treating new alerts as routine rather than recognising the urgency each one demands. This reduced attentiveness can allow real threats to slip through undetected, leaving systems exposed to breaches that could otherwise have been prevented with sharper focus. The constant exposure to high-stakes scenarios also takes a toll on morale. IT professionals working under relentless pressure often experience burnout, which can lead to disengagement or even resignation. When skilled staff leave, organisations face knowledge gaps and weakened defences, compounding the vulnerability created by Breach Fatigue. Financial Toll The financial consequences of this cycle are significant. A single overlooked breach can trigger costly downtime, regulatory fines, and lasting reputational damage. Breach Fatigue magnifies these risks by eroding the organisation’s defensive posture, turning what might have been a manageable incident into a major financial and operational setback. MFT Lightens the Load One way to alleviate Breach Fatigue is by reducing the number of potential breach vectors. Managed File Transfer (MFT) technology provides a secure, automated framework for moving sensitive data across systems, partners, and users. Unlike ad hoc file sharing methods — such as email attachments or unsecured FTP — MFT is designed with security and compliance at its core. MFT solutions encrypt files both in transit and at rest, ensuring that sensitive data cannot be intercepted or tampered with. This reduces the number of alerts IT teams must chase down related to insecure transfers. Instead of tracking multiple file-sharing platforms, IT staff gain a single dashboard to monitor transfers. This consolidation cuts down on noise and helps teams focus on genuine anomalies. By automating repetitive file transfer processes, MFT reduces human error — a common cause of breaches — and frees IT staff to focus on higher-value security work. MFT platforms often include built-in compliance features, such as audit trails and role-based access controls. This not only strengthens security but also reduces the stress of preparing for regulatory audits. Here to Help If you’re considering supporting your hard-working IT team with a Managed File Transfer solution, please feel welcome to get in touch . I’m always available for an obligation-free exploration of how MFT can help your business. I and my team have many years of experience helping companies big and small painlessly and affordably implement MFT solutions. At Generic Systems Australia , we’re your local experts in Managed File Transfer. Previous Next
- MFT'S ROLE IN BUISNESS : EBOOK | GSA
“MFT's Role in Business: IT Leaders Weigh In” eBook A good way to learn the value of a Managed File Transfer (MFT) solution is to hear about it from those who use one. In Fortra’s eBook “MFT's Role in Business: IT Leaders Weigh In”, nine IT and security professionals share their experiences using Fortra’s GoAnywhere MFT. To receive a complimentary copy of the eBook, simply send us your email address below: First name Last name Enter your email address Phone You'll receive the "MFT's Role in Business: IT Leaders Weigh In" eBook RESOURCES Receive Report HOME
- Employee Error Lets Hackers Clean Up at Clorox | GSA
< News Employee Error Lets Hackers Clean Up at Clorox 25 July 2025 The Clorox Company’s $574M lawsuit against IT services provider Cognizant Technology Solutions is a stark reminder of the cyber threat posed by unwitting or uncaring employees. Clorox alleges that help desk agents managed by Cognizant provided hackers with access to Clorox’s IT network in August 2023. They say that Cognizant agents repeatedly reset passwords and multi-factor authentication (MFA) tokens for hackers posing as Clorox employees without asking a single security question. One partial call transcript filed with the court shows a Cognizant agent volunteering “Let me provide the password to you” after a hacker said he couldn’t log in. Hackers used the credentials provided to paralyse manufacturing lines, which led to product shortages costing Clorox hundreds of millions in lost sales. Clorox says it had provided Cognizant with strict credential-reset protocols such as verifying a manager’s name and sending confirmation emails, but that these protocols weren’t followed. Human Error Common Clorox’s unfortunate experience is consistent with studies which have found human error a leading cause of most cyber security incursions. In a 2024 experiment by Fortra, 14.9% of employees across the Asia-Pacific region succumbed to hackers’ attempts to have them provide network access. 60% of the employees who clicked on that phishing link went on to further expose their organisation by sharing their password. Guarding Against Employee Error Employee education is a great start to protecting your organisation. But as Clorox’s experience shows, it’s not enough. Technical safeguards are needed, too. Generic Systems Australia’s Advanced Threat Protection Bundle enables your organisation’s email system to automatically detect and prevent phishing links and other malware from entering your organisation. Combining the layered strengths of GoAnywhere MFT and Clearswift, it enables your employees to receive and share information securely without impairing their productivity. How It Works Our Advanced Threat Protection Bundle seamlessly integrates managed file transfer with advanced threat protection and adaptive data loss prevention to keep your sensitive data secure. It not only prevents malware from entering your organisation, but it also prevents employees from losing or mishandling data. For example, if an employee knowingly (or unknowingly) attempts to share any files containing malware, those files are sanitised by having the malicious elements automatically removed. The Advanced Threat Protection Bundle can also automatically detect and –– if you configure it to do so –– prevent employees from sharing sensitive information. Local Support If you’d like to see first-hand how the Advanced Threat Protection Bundle can help keep your organisation’s data safe, please feel welcome to get in touch with me. My technical team at Generic Systems Australia are local experts in the field. Previous Next
- Managed File Transfer: Conductor of Your Enterprise IT Orchestra | GSA
< News Managed File Transfer: Conductor of Your Enterprise IT Orchestra 4 Dec 2025 In today’s enterprise IT landscape, complexity is the rule rather than the exception. Organisations rely on dozens—sometimes hundreds—of applications, platforms, and services to keep operations running smoothly. Each system has its own rhythm, is its own “instrument,” and has its own way of producing value. The challenge lies not in the individual performance of these systems, but in how well they coordinate with one another. This is where Managed File Transfer (MFT) can step up and play the role of orchestra conductor. Your IT Orchestra Imagine your enterprise IT environment as a vast orchestra. The finance system is the brass section, bold and powerful. The HR platform is the woodwinds, steady and supportive. The customer relationship management tool is the strings, agile and expressive. Each application has its own sheet music, tuning and timing. Left to themselves, these musicians might play well individually. But without guidance, the ensemble risks descending into cacophony. MFT ensures that every musician receives the right cues, at the right tempo, and in the right order. It doesn’t matter if the ERP system “plays” in one key and the analytics platform in another; MFT provides the synchronisation and structure that allows them to perform together harmoniously. Timing and Precision In an orchestra, timing is everything. A single misplaced note can disrupt the entire performance. Similarly, in enterprise IT, a delayed or failed file transfer can ripple across departments, causing inefficiencies or even compliance risks. MFT acts as the baton, ensuring that data moves securely, reliably, and on schedule. It enforces discipline across the ensemble, so that the payroll system receives its inputs before payday, the supply chain platform gets its updates before shipments, and the analytics engine has fresh data before executives make decisions. Security as the Score A conductor doesn’t just wave a baton; they interpret the score, ensuring fidelity to the composer’s intent. In IT, the “score” is the organisation’s security and compliance requirements. MFT enforces encryption, authentication, and auditing, ensuring that sensitive data is handled in accordance with regulations. Just as a conductor prevents the orchestra from straying off‑script, MFT prevents systems from improvising in ways that could compromise security or compliance. Flexibility and Adaptation Orchestras often perform different pieces, requiring the conductor to adapt to new tempos, styles, and arrangements. Likewise, enterprises constantly evolve—adding new applications, integrating with partners, or scaling to meet demand. MFT provides the flexibility to incorporate new “musicians” without disrupting the ensemble. It abstracts away the complexity of how systems connect, so IT teams can focus on the music rather than the mechanics. A Successful Symphony Ultimately, the value of MFT lies in its ability to transform disparate systems into a unified performance. It ensures that the finance section doesn’t drown out HR, that analytics doesn’t rush ahead of operations, and that customer data flows seamlessly across the organisation. The result is not just efficiency, but coherence—a symphony of systems working together to deliver business value. MFT is more than a logistics tool; it is the conductor that turns enterprise IT from a collection of talented but isolated musicians into a world‑class orchestra. By ensuring timing, security, and harmony, MFT enables organisations to perform at their best—producing not noise, but music. Here and Ready to Help At Generic Systems Australia we have decades of experience helping Australian and New Zealand organisations become more efficient, organised and protected through the power of the world’s leading MFT solution . Our Migration Service makes the transition even easier. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch with us. At Generic Systems Australia, we’re your local experts in secure Managed File Transfer. Previous Next
- What is ‘MFT’ ... and why should you care | GSA
< News What is ‘MFT’ ... and why should you care 19 Oct 2023 What is ‘MFT’ - and why should you care about it? In today's data-driven world, the seamless and secure exchange of information is key to business efficiency. Managed File Transfer (MFT) is a powerful technology that comprehensively addresses the risks and challenges of moving information, both within an organisation, and with external suppliers, partners and customers. At its core, Managed File Transfer simplifies the complexities of data transfer by offering centralised control, encryption, and auditing capabilities. Unlike traditional approaches, such as FTP, MFT provides enhanced security protocols, ensuring data privacy during transmission and storage. And it does so via a user-friendly interface, which is easy to use for even non-technical employees. Organisations adopt MFT technology for the many benefits it provides. Security: MFT employs robust encryption algorithms, reducing the risk of data breaches during transit. Features like Access Controls, and Multi-factor Authentication, safeguard sensitive information from unauthorised access. Efficiency: MFT automates repetitive tasks. This not only reduces human error, it saves significant staff time. Through scheduling of file transfers, monitoring of progress, and automatic error-handling, it enables a significant boost to operational efficiency. Compliance: In industries with strict regulatory requirements, MFT helps companies meet compliance standards (e.g. HIPAA and GDPR) by automatically maintaining detailed logs and audit trails. Scalability: Through its ability to handle large file transfers and an ever-growing number of users, MFT is able to grow in sync with an organisation's needs, while maintaining superior performance. Collaboration: In addition to improving business processes within an organisation, MFT facilitates seamless collaboration with external partners, suppliers, and customers, fostering strong relationships built on shared trust and reliability. Managed File Transfer technology offers organisations a secure, efficient, and scalable solution for their data transfer needs. By leveraging MFT, businesses can not only streamline their operations but also gain a competitive edge, while ensuring the integrity and confidentiality of their data in today's interconnected digital landscape. Generic Systems Australia is the Asia-Pacific region’s leading provider of secure MFT solutions. If you’d like to explore how your organisations’ efficiency and bottom line could be boosted through MFT technology, please feel free to contact our Business Manager, Bradley Copson, ( bradley@gensys.com.au ) for an obligation-free discussion. Previous Next
- THINK LIKE A HACKER | GSA
THINK LIKE A HACKER To win the fight against cybercriminals, it helps to think like a hacker. In this guide, we explain the terminology and techniques used by cyber thieves, and share seven important strategies for protecting your valuable data. To receive our Guide, please submit your email address below: First name Last name Enter your email address Phone You'll receive the 'Think Like a Hacker' Guide shortly! RESOURCES Receive Report HOME
- LOCAL BUYERS GUIDE | GSA
MFT Local Buyer's Guide Finding the right Managed File Transfer solution for your organisation may not be easy... with dozens of factors to consider - including industry and government compliance requirements, cloud vs on-prem solutions, critical cybersecurity protections, pricing models and more. In this MFT Local Buyer’s Guide, you’ll find the key considerations, the questions you need to ask vendors, and a wealth of other advice to help you successfully evaluate MFT solutions. To receive our Local Buyers' Guide, simply submit your email address below: First name Last name Enter your email address Phone You'll receive the Buyers' Guide shortly! RESOURCES Receive Report HOME

