Search Results
177 results found with an empty search
- Ditch Your File Transfer Scripts | GSA
< News Ditch Your File Transfer Scripts 10 Sept 2024 More and more companies across the Asia-Pacific region are realising they have a pressing need to eliminate their use of outdated file transfer scripts. A Key Vulnerability A recent survey found that our region is on the frontline, subject to more cyber attacks than any other. 72% of local organisations experienced four or more cybersecurity incidents in the past year - 20% more than the global average. Manual scripts – often written by employees to reduce the repetitive burden of manually transferring files – are a key vulnerability. Not only are file transfer scripts risky, they’re also inefficient and prone to failure. MFT: safer, more efficient Managed File Transfer (MFT) is a powerful technology which comprehensively addresses the risks and challenges of moving information, both within an organisation, and with external suppliers, partners and customers. It simplifies and secures data transfer by providing centralised control, encryption, enhanced security protocols and auditing. Unsurprising then that more and more IT departments are using MFT to replace their outdated manual file transfer scripts. Reasons to Ditch Scripts Scripts don’t play well with new tech. For example, cloud-based computing environments require file transfers to be integrated with cloud-based solutions, and platforms such as Azure and AWS. Scripts lack advanced features. For example, automating file transfers – say, with FTP - requires you to add a second solution, which is time-consuming and complex. Scripts are also challenged to detect and implement automatic “re-try” features in the event of failure, or prevent employees mishandling sensitive data. Scripts are time consuming. Developing, maintaining, and troubleshooting scripts takes time, distracting valuable IT staff from more important tasks. Worse, if the author of a script isn’t available when it fails, bottlenecks can occur in your workflow. Scripts don’t offer built-in reporting. Logging needs to be manually added to scripts. Accessing those logs – say, when you need to prove audit compliance, or meet other regulatory reporting requirements – is time consuming and difficult, requiring an effective filter and search tools. Scripts aren’t secure. As explained above, scripts don’t offer the security features necessary to keep cyber thieves at bay. User credentials aren’t encrypted, there’s no in-built key management, no access controls, and they’re unlikely to use up-to-date security protocols. Why MFT is Better than Scripts As well as increasing the security of your file transfers, ditching scripts offers your organisation many other compelling advantages. Centralised Control. Instead of using multiple different tools, programs, and scripts to encrypt, send, and automate your file transfers, MFT can enable all of these from a single interface. That significantly streamlines day-to-day operations and reduces wasted tool maintenance time. Automate. No matter the volume of files to be transferred across your business and supply chain, the best MFTs enable your team to spend time focusing on other things. Save Money. Clients are often surprised how many employee-hours they’re spending creating, maintaining and resolving problems with file transfer scripts. These ongoing hidden costs can really mount up. (And that’s without considering the potentially catastrophic cost to your business of a data breach enabled by an insecure script!) Flexible Scalability. The best MFTs scale fluidly – horizontally and vertically - as file transfer loads increase. They make redundant tedious and uncertain processes of buying, deploying and understanding gateways, load balancers and other expensive network devices and hardware. Cloud-friendly MFT tools also exploit new cloud and virtualisation capabilities to scale up quickly to meet demand. They can even be “failed over” to a DR site in the event of an outage. Regulatory Compliance. By logging file transfers and access across your organisation, the best MFTs ensure your compliance with legal requirements, such as data privacy and encryption. Logs are also readily accessible if you’re called on to demonstrate your compliance during an audit or need to conduct forensics after an internal security breach. The Best MFT Independent analysts agree that that GoAnywhere MFT is the industry’s leading Managed File Transfer solution. GoAnywhere not only enables your data to be moved securely - both internally and externally – it also enhances your team’s productivity. Asia-Pacific’s MFT Experts No-one better understands local MFT needs and best practices than Generic Systems Australia. Our local team has decades of experience helping businesses replace outdated and risky scripts with the world’s leading MFT solution, and our Migration Service makes the transition easy. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably transition from risky scripts to an advanced MFT solution, please feel welcome to get in touch . Previous Next
- MFT Popularity Set to Soar in 2025 | GSA
< News MFT Popularity Set to Soar in 2025 3 Feb 2025 Managed File Transfer (MFT) software continues to be a popular addition to corporate IT systems, based on the last global market research. Washington-based Market Research Intellect (MRI) valued the MFT software and services market at US$12.6B in 2024, and now projects CAGR of 9.97% to a value of US$22.3B by 2031. It attributes this growth to “the increasing need for secure, efficient, and compliant data transfers across enterprises as organisations handle larger volumes of sensitive data”. MFT solutions provide secure mechanisms for exchanging files internally and externally while ensuring regulatory compliance. The rising adoption of cloud technologies, and the integration of automation and real-time monitoring, have further propelled uptake of MFT solutions, offering greater flexibility and scalability to businesses. MRI said that industries such as finance, healthcare, and manufacturing, where data security and integrity are paramount, are increasingly relying on MFT software to mitigate risks associated with traditional file transfer methods. Additionally, the growing trend of hybrid and remote workforces is fuelling the demand for cloud-based MFT solutions. According to MRI, the MFT software and service market is being shaped by “the increasing complexity of data security requirements and the need for compliance with industry regulations. “MFT facilitates secure, automated, and efficient file transfers, addressing critical pain points such as data breaches and downtime,” they said. Notwithstanding the popularity and growth of MFT solutions, perceived challenges such as integration with legacy systems, and the usual concerns about the scalability of new solutions in large organisations, might cause some to delay their adoption of MFT technologies. That’s why, at Generic Systems Australia, we use and recommend GoAnywhere MFT , the world’s leading MFT solution. It’s renowned for its easy implementation, robust performance and extensive enterprise systems integrations. MRI categorises MFT software as “a key solution for secure file management”. So if you’d like to explore further how MFT can help protect your data and make your organisation more efficient, please feel welcome to contact me for an obligation-free chat. At Generic Systems Australia , we’re your local experts in MFT. Previous Next
- Automate File Transfers to Boost Team Efficiency | GSA
< News Automate File Transfers to Boost Team Efficiency 17 Mar 2024 Dodge the Drudgery – Automate Your File Transfers Manually sending files around your organisation, and to external trading partners, is a tedious and time-consuming aspect of many employee’s lives. However, it needn’t be. You can help your team dodge the drudgery via file transfer automation software. This software enables your team to program when files should move between internal systems, other team members, or trading partners, and is often used to manage reoccurring or high-volume file transfers. Your team is freed up to focus on other business-critical tasks. Read on to find out how… The Leading Solution GoAnywhere MFT is the world’s leading secure FTP (SFTP) file transfer automation software. It enables users to quickly automate file transfers and schedule workflows, using its built-in scheduler or your existing scheduler software. Within GoAnywhere's browser-based administrator, users can also automate their workflows by executing projects with a single click. GoAnywhere MFT can execute multiple workflows concurrently, through its job management system. Administrators can define multiple job queues, grouping workflows that share common characteristics or service level agreements. Each job queue can define the priority of their jobs as well as the maximum number of concurrent jobs that can be executed from the queue. All these job queues can be managed and prioritised through GoAnywhere's Administrator interface. Built-In Schedulers With the built-in scheduler you can execute Projects (workflows) at future dates and times. Projects can run just once, or with any recurring frequency you choose. You can also define custom calendars with specific holidays or dates that are important to your organisation, or to avoid scheduling a job on a specific day. Schedules can be further personalised by specifying them to run under specific users, or with start dates, frequencies and other over-riding variables. You can also indicate the email addresses to be alerted when a Project has completed, or encounters any problem. Unlimited File Sizes Large files are no problem for GoAnywhere MFT, or its email add-on GoAnywhere Secure Mail. It enables you to send large files as secure packages on an ad hoc basis, as well as send multiple large files. Even large files transfers won’t choke... GoAnywhere provides auto-resume and integrity checks to keep big files moving, even when it encounters network connectivity challenges. Robust Audit Logs and Reporting Staying compliant with various industry regulations or privacy laws is easier with GoAnywhere MFT. You can generate comprehensive audit logs of all file transfer and administrator activity, including workflow and file server auditing and administrator logging. This data is captured for activity in GoAnywhere servers for AS2, FTP, FTPS, HTTPS, and SFTP, and it includes details on log in attempts, file uploads and downloads, errors, and other events. Reports can be quickly generated, viewed, filtered, sorted and exported as needed. Executing Projects Workflows can also be automated, executing whenever a file monitor detects new, modified, or deleted files in targeted folders. Workflows can be called from local and remote command lines, scripts, and programs using the provided commands and APIs. Workflows can additionally be called as Web Services using SOAP or REST requests. To execute Workflows based on user activity, triggers can monitor for events like when a file is uploaded or downloaded. Workflows can be executed in Debug mode, which enables users to interactively execute tasks one step at a time. At each stopping point, the values for the variables can be viewed or changed before the next task is executed. If you’d like to discuss how your organisation’s file transfers can be automated, adding to your productivity and bottom line, please feel free to contact our Business Manager, Bradley Copson, (mail to: bradley@gensys.com.au ). He’ll be more than happy to offer you an obligation-free discussion, no-cost trial, or Proof of Concept. Generic Systems Australia Your Local Experts in Secure Managed File Transfer Previous Next
- COMPLIANCE PRODUCT DATASHEET | GSA
Every organisation needs to meet stringent industry, state and federal data and privacy laws and regulations. GoAnywhere is the secure file transfer solution built to satisfy these demanding Compliance requirements. Review compliance datasheet below: RESOURCES HOME
- GoAnywhere: the Swiss Army Knife of Systems Connectivity | GSA
< News GoAnywhere: the Swiss Army Knife of Systems Connectivity 29 July 2025 When all the buzzwords are said and done, the single biggest advantage of using information technology is enhanced efficiency through automation and connectivity . It’s in precisely these areas where GoAnywhere MFT shines. While GoAnywhere is a Managed File Transfer solution, its usefulness is far broader. It’s a “Swiss Army Knife” for automatically moving files between an organisation’s systems, suppliers and customers. Whether you’re moving data between your ERP , CRM , HRM , SCM , CMS , BI , BPM and ITSM systems, GoAnywhere helps you seamlessly interconnect their outputs and inputs, amplifying IT’s overall speed and efficiency benefits across your business. GoAnywhere not only monitors your various solutions for new output, it also translates that output into the new formats required by your other systems before routing the translated files to their destinations. Automatically. Comprehensive Extract Transfer Load features enable data values to be mapped, formatted and modified between source and target files. Automating with MFT Automation is where GoAnywhere really shines vs less capable Managed File Transfer solutions. It manages recurring and high-volume file transfers and eliminates the need for manual data processing. Surprisingly, there are still some organisations which continue to be dependent on tedious manual file transfer processes, complicated system configurations and manual batches. The reason they remain reliant on such risky approaches is often lost to the past - there’s simply no-one left on staff who was around at the time their systems were initially installed. “However it works … it does work” seems to be the thinking. “If it ain’t broke … don’t fix it” can be seductive when there’s lots else demanding your attention. However, failing to understand file transfer dependencies, and disregarding the need to make them resilient, is a dangerous way to run a business. Small changes in file formats and security protocols, or the unforeseen consequences of a software version update, can cause havoc. Background legacy scripts, homegrown processes, and outdated PC tools are prone to fail for the simplest of reasons. That means systems downtime, lost revenue, distrustful suppliers and unhappy customers. Minor Investment, Major Gain Making the relatively minor investment of time and expense to automate file transfers simplifies and streamlines critical everyday tasks, eliminates human error, saves time and cuts costs. GoAnywhere is more than just a file moving tool. It can monitor folders both on-premises or in the cloud, send you emails and SMS alerts when triggered events occur, and test and debug your automatic file transfer workflows. And, should you ever need to trace the movement of your data – say, for auditing or compliances purposes - GoAnywhere’s comprehensive logging tools and centralised dashboard make this easy. How It Works With GoAnywhere installed, a simple drag-and-drop interface defines how files will be securely and reliably moved between internal systems, supply chain partners and customers. It’s much easier than writing manual scripts, and no programming skills are required. GoAnywhere’s automation enables systems to execute each step of a business process one after the next without human intervention. File movements are monitored and controlled, including sending, retrieving and delivering data. You can schedule when files should be sent or retrieved between systems, users, trading partners, applications, and the cloud. Your business processes are made significantly more efficient. Here to Help At Generic Systems Australia , we’re Australia and New Zealand’s experts in helping business take advantage of every one of GoAnywhere’s many capabilities. We’ve assisted dozens of organisations to make their file transfers resilient, secure and reliable, boosting their efficiency. If you’d like to discuss how we can deliver these advantages to your organisation, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how easily we can transition you from your current approach to a new world of productivity. At Generic Systems Australia, we’re your local experts in data transfer. Previous Next
- Top 5 MFT Trends in 2026 | GSA
< News Top 5 MFT Trends in 2026 27 Jan 2026 With January’s holidays fading into memory and business getting back to work, it’s time to look ahead at what 2026 holds for data movement—the lifeblood of modern enterprises. As data volumes surge and digital ecosystems grow more complex, the systems responsible for secure file transfers are undergoing a major evolution. Organisations are exchanging more data than ever, and the demand for secure, compliant, automated file movement is rising just as quickly. Managed File Transfer (MFT) has long been the trusted foundation for these exchanges, but the landscape is shifting rapidly thanks to advances in AI, analytics, and cloud technologies. The era of basic point‑to‑point transfers is receding. Today’s MFT platforms must deliver intelligence, transparency, and the ability to scale across increasingly hybrid environments. Here are five major trends that will reshape MFT in 2026 and beyond. 1. Smarter Automation Through AI and Predictive Workflows Automation has always been a core strength of MFT, but AI is set to elevate it further. Organisations will use machine learning to predict issues before they occur, fine‑tune transfer schedules, and boost overall reliability. The file transfer logs and automated workflows generated by GoAnywhere MFT provide invaluable input to AI agents. By analysing this historical data, AI can recommend optimisations for bandwidth, security, and efficiency. 2. Real-Time Visibility and Advanced Reporting for Stronger Decisions In a world defined by big data, visibility is everything. Understanding how files move across an organisation—where they go, how fast they travel, and whether they meet compliance requirements—is essential. That’s why modern MFT platforms must offer real‑time monitoring, detailed reporting, and actionable insights. Dashboards and audit logs give IT teams a live view of transfer activity, helping them track throughput, capacity, SLA performance, and overall system health. This level of transparency is especially valuable for enterprises managing large volumes of sensitive data across multiple departments or global locations. Better visibility leads to better decisions and more efficient operations. 3. Centralised Security and Compliance Control With data privacy regulations tightening worldwide, organisations can no longer rely on a patchwork of tools for encryption, authentication, and data loss prevention. MFT platforms are increasingly becoming unified hubs for enforcing security and compliance. GoAnywhere MFT offers a single, web-based interface to automate, encrypt, and audit file transfers across on-premises, cloud, and hybrid environments. It replaces fragmented scripts and manual processes with a unified platform that secures data in transit and at rest—directly supporting compliance with PCI DSS, HIPAA, GDPR, FISMA, and other regulations. By consolidating these capabilities, organisations reduce compliance complexity and maintain consistent security across every file exchange. 4. Cloud-Ready Deployment and Hybrid Flexibility As organisations modernise their infrastructure, flexible deployment has become a top priority. MFT solutions now need to support on‑premises, cloud, and hybrid environments without compromising control or compliance. This shift toward cloud‑ready MFT reflects a broader trend: businesses want agility without sacrificing security. GoAnywhere MFT is a centralised, platform-agnostic solution that can be deployed across on-premises, cloud, and hybrid environments. It facilitates secure, automated data exchange between internal systems, trading partners, and popular cloud services (e.g. AWS S3, Azure Blob, SharePoint, Salesforce) using built-in Cloud Connectors and lightweight, centrally managed agents. 5. API-Driven Integration and Seamless Interoperability MFT is no longer just about moving files—it’s becoming a central connector between enterprise systems, cloud applications, and external partners. Modern platforms support robust REST APIs and standard protocols such as SFTP, FTPS, HTTPS, and AS2, making it easier to integrate with ERP, CRM, SIEM, and other business systems. This interoperability reduces manual handling, improves data consistency, and streamlines automation across workflows. In an API‑centric world, MFT plays a crucial role in ensuring data flows securely and efficiently across the entire ecosystem. The Next Era of Intelligent File Transfer MFT has been a staple technology for years, but many legacy solutions are reaching end‑of‑life. The next generation of MFT is about more than secure transfers—it’s about enabling intelligent, data‑driven operations. Organisations embracing AI‑enhanced automation, real‑time analytics, compliance‑ready security, flexible deployment models, and API‑first integration will be best positioned to protect their data and stay ahead of operational challenges. The future of file transfer isn’t just secure. I’s smart, adaptive, and deeply connected to the broader digital landscape. Global Trends – Local Expertise At Generic Systems Australia , we’re Australia’s and New Zealand’s experts in helping organisations leverage the world’s leading Managed File Transfer solutions. If you’d like to discuss how we can help you, please feel welcome to get in touch with me . I’m always happy to have an obligation-free chat. Previous Next
- Battle “Breach Fatigue” with Managed File Transfer | GSA
< News Battle “Breach Fatigue” with Managed File Transfer 16 Dec 2025 With the festive season fast approaching, many in business may be left feeling a little fatigued by what has been a hectic business year. But none more so than your beleaguered IT team. In 2025 they’ve been facing relentless waves of cyber-attack. From phishing campaigns to ransomware threats, they’ve needed to maintain constant vigilance to defend against the hordes of cyber criminals eager to steal your organisational data. In a phenomenon known as “Breach Fatigue”, a state of near exhaustion occurs when IT teams become desensitised to the sheer volume of alerts, warnings, and incidents they must manage daily. The consequences are serious: slower response times, overlooked vulnerabilities, and a creeping sense of burnout. Human Toll IT departments are inundated with hundreds of alerts each day, ranging from minor anomalies to potentially serious threats. Over time, the sheer volume of these notifications becomes mentally exhausting, making it increasingly difficult for teams to distinguish genuine risks from false positives. This operational overload not only slows response times but also raises the likelihood of critical signals being overlooked. As fatigue sets in, vigilance naturally declines. Teams may unconsciously lower their guard, treating new alerts as routine rather than recognising the urgency each one demands. This reduced attentiveness can allow real threats to slip through undetected, leaving systems exposed to breaches that could otherwise have been prevented with sharper focus. The constant exposure to high-stakes scenarios also takes a toll on morale. IT professionals working under relentless pressure often experience burnout, which can lead to disengagement or even resignation. When skilled staff leave, organisations face knowledge gaps and weakened defences, compounding the vulnerability created by Breach Fatigue. Financial Toll The financial consequences of this cycle are significant. A single overlooked breach can trigger costly downtime, regulatory fines, and lasting reputational damage. Breach Fatigue magnifies these risks by eroding the organisation’s defensive posture, turning what might have been a manageable incident into a major financial and operational setback. MFT Lightens the Load One way to alleviate Breach Fatigue is by reducing the number of potential breach vectors. Managed File Transfer (MFT) technology provides a secure, automated framework for moving sensitive data across systems, partners, and users. Unlike ad hoc file sharing methods — such as email attachments or unsecured FTP — MFT is designed with security and compliance at its core. MFT solutions encrypt files both in transit and at rest, ensuring that sensitive data cannot be intercepted or tampered with. This reduces the number of alerts IT teams must chase down related to insecure transfers. Instead of tracking multiple file-sharing platforms, IT staff gain a single dashboard to monitor transfers. This consolidation cuts down on noise and helps teams focus on genuine anomalies. By automating repetitive file transfer processes, MFT reduces human error — a common cause of breaches — and frees IT staff to focus on higher-value security work. MFT platforms often include built-in compliance features, such as audit trails and role-based access controls. This not only strengthens security but also reduces the stress of preparing for regulatory audits. Here to Help If you’re considering supporting your hard-working IT team with a Managed File Transfer solution, please feel welcome to get in touch . I’m always available for an obligation-free exploration of how MFT can help your business. I and my team have many years of experience helping companies big and small painlessly and affordably implement MFT solutions. At Generic Systems Australia , we’re your local experts in Managed File Transfer. Previous Next
- New Cyber Laws Impose New Business Obligations | GSA
< News New Cyber Laws Impose New Business Obligations 16 Oct 2024 Australia’s federal government last week introduced much-anticipated legislation to parliament which will revolutionise Australia’s cyber security preparedness. If passed as expected, the new laws will impose new compliance and reporting requirements on local businesses. Govt Intent Designed to protect businesses and consumers from the growing scourge of cyber crime, the Cyber Security Act 2024 is Australia’s first standalone cyber security legislation. Introducing the Act, Minister for Cyber Security, Tony Burke, said that – like IT systems themselves - legislation needed to be hardened to protect national security and economic stability. He described the package as providing a clear legislative framework for contemporary, whole-of-economy issues which would identify and respond to new and emerging cyber threats. Seven Initiatives There are seven initiatives under the 2023-2030 Australian Cyber Security Strategy which collectively address gaps in current legislation to: Mandate minimum cyber security standards for smart devices; Introduce mandatory ransomware reporting for certain businesses to report ransom payments; Introduce a ‘limited use’ obligation for the National Cyber Security Coordinator and the Australian Signals Directorate; and Establish a Cyber Incident Review Board. SOCI Reforms The legislation will also progress and implement reforms under the Security of Critical Infrastructure Act 2018 (SOCI Act): Clarifying existing obligations in relation to systems holding business critical data; Simplifying information sharing across industry and Government; Introducing Government powers to direct entities to address serious deficiencies within their risk management programs; and Moving regulation for the security of telecommunications into the SOCI Act. The SOCI Act reforms will also expand current Government assistance measures to ensure Government can step in as a last resort to manage the consequences of significant incidents. Govt Empowered Changes to government assistance measures will empower the Government to gather information or direct entities to take or refrain from certain actions, on authorisation from the Minister for Home Affairs, in response to a serious incident. Characterising the legislation as a significant step towards his government’s vision of becoming a world leader in cyber security by 2030, Tony Burke said: “We know government has to lead the way on cyber, but we also know we can’t do it alone. This is why these new laws have been consulted extensively with business. “To achieve Australia’s vision of being a world leader in cyber security by 2030, we need the unified effort of government, industry and the community.” New Business Obligations Legal firm A&O Shearman cautioned that the new Cyber Bill will introduce several new critical areas of compliance and reporting. It said businesses must take heed of these new obligations, and ensure they put in place robust cyber security measures. • Ransomware Reporting Obligations : Entities impacted by cyber security incidents and making ransomware payments must report these payments within 72 hours. The aim of this obligation is to improve the detection and response to ransomware incidents, thereby reducing their impact. Failure to report can result in civil penalties. • Security Standards for Smart Devices : The Cyber Bill mandates that manufacturers and suppliers of smart devices comply with specified security standards. This is crucial for businesses involved in the production or distribution of smart devices. Non-compliance can result in compliance notices, stop notices, and recall notices. These measures are designed to ensure that smart devices are secure and do not pose a risk to users. • Protected or Limited Use of Incident Information : The Cyber Bill includes provisions to ensure that information provided about cyber security incidents is used or disclosed only for permitted purposes, with strict limitations on using this information for civil or regulatory actions against the reporting entity. • Cyber Incident Review Board : The Cyber Bill establishes a Cyber Incident Review Board tasked with reviewing certain cyber security incidents and making recommendations. The Board has the authority to request and require documents from entities. Non-compliance may result in civil penalties. A&O Shearman said organisations should make sure they implement security standards in compliance with the specified security measures currently provided for in the Cyber Bill, and make sure they can comply with the ransomware reporting obligations, including the timelines foreseen in the Cyber Bill. Meeting New Requirements Criminal syndicates target organisations which haven’t adequately protected their data transfers and systems access. Defending against them requires a multi-layered strategy which includes robust data transfer protection, multifactor authentication and employee training. Managed File Transfer (MFT) solutions such as the class-leading GoAnywhere MFT encrypt data at rest and in transit, complying with the highest data security standards - including the US’s and Europe’s stringent HIPAA, HITECH, PCI DSS, SOX, and GDPR. MFT manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols such as SFTP, FTPS, and AS2 to send files securely, and encryption standards such as Open PGP and AES to protect data in transit and at rest. GoAnywhere MFT also provides audit reports, which will help organisations meet new reporting and compliance needs. All file transfer and administrator activity is stored and easily searchable. To help organisations report on file transfer activity and remain compliant with the new legislation, these audit logs can be automatically generated and provided as PDFs. Advanced Threat Protection and Adaptive Loss Prevention add a further layer of defence. SFT Threat Protection enables safe collaboration with external parties, preventing malware from entering an organisation, and reducing the risk of employees losing or mishandling sensitive data. Local Expertise on Hand Generic Systems Australia are your local experts in Managed File Transfer solutions. We’ve assisted dozens of organisations across the Asia-Pacific region to secure their data and keep cybercriminals at bay. If you’d like to discuss improving your cybersecurity, please feel welcome to contact me , Bradley Copson. I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. Previous Next
- The GoAnywhere Customer Who Didn’t Panic | GSA
< News The GoAnywhere Customer Who Didn’t Panic 20 Aug 2025 In Douglas Adams’ much-loved work of science-fiction whimsy, The Hitchhiker’s Guide to the Galaxy, the Babel Fish is a small yellow fish inserted into a person's ear to provide instant translation of any language. Described by The Guide as “probably the oddest thing in the universe”*, the Babel Fish is a neat (if somewhat slimy) solution to the pervasive galactic challenge of interspecies communication. It reminds me how GoAnywhere MFT once solved a customer’s pressing “payslip-up”. “But the plans were on display…”* Our customer, a leading provider of human services who employs thousands, had installed a new payroll system. This system, like the outdated system it was replacing, produced employee payslips as PDF files. These were subsequently distributed to employees via a separate Human Resources system. Installation, testing and initialisation of the new payroll system had all gone according to plan. Until, that is, the first pay run was performed. “Have you any idea what these strange symbols are?”* In what The Hitchhiker’s Guide may well have cited as “a practical demonstration of the principles of infinite improbability” employees didn’t receive their payslips. It was soon realised that the problem had occurred because the PDF payslips produced by the new payroll system were formatted differently to the PDFs previously produced by the old one. (The old system had output the PDFs as individual PDF files for each employee, compressed into a zip file. The new system output one PDF file for each employee and, further complicating the situation, the new payslips varied in number of pages.) These PDF formatting changes rendered the output from the new payroll system unreadable by the Human Resources system - a problem which had somehow been overlooked during testing. “The consequences of not knowing any of this stuff are particularly terrible”* This failure of inter-systems communication wasn’t just a problem for the employees, who had understandably grown accustomed to keeping tabs on their earnings, but it created a looming compliance problem for the business. Australia’s Fair Work Act is vexingly inflexible when it comes to the timing of providing employees with payslips. (This is in marked contrast to the famously flexible relationship with time enjoyed by The Guide’s author Douglas Adams, particularly as relates to deadlines). Failure to fix the problem quickly would expose the business to financial penalties, legal consequences and potential union action. “Don’t Panic!”* Heeding the single most important piece of advice in The Hitchhiker’s Guide to the Galaxy , our customer didn’t panic. Instead, they called me to ask whether Generic Systems Australia could help solve their predicament. And - thanks to their installed GoAnywhere Managed File Transfer solution – we could! The Babel Fish* Faster than a Vogon invited to a poetry recital**, our Solutions Architect revised the customer’s GoAnywhere automated file transfer process. GoAnywhere was already collecting the PGP-encrypted PDF from the new payroll system via SFTP, decrypting it, and transferring it to the customer’s Human Resources system. He added to that automated transfer process new logic which split the PDF pages, correctly formatting the output and allowing for payslips of varying page lengths. GoAnywhere was, in effect, performing the role of a computerised Babel Fish. And, thanks to GoAnywhere’s easy to use drag-and-drop interface, it took our Solutions Architect less than half a day to set up the workflows. He didn’t even need a towel***. “If you ever need help again…”* There’s no need to go to the ends of the universe**** to get expert help on file transfers and translations. At Generic Systems Australia , we’re Australia and New Zealand’s experts in helping business take advantage of every one of GoAnywhere’s many capabilities. We’ve assisted hundreds of organisations to automate their data flows, making their file transfers resilient, secure and reliable, and boosting their efficiency. If you’d like to discuss how we can boost your organisation’s efficiency, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how easily we can transition you from your current approach to a galaxy-leading level of productivity. At Generic Systems Australia, we’re your local experts in data transfer. _______________________________________________________________________________________ * A direct quote from The Hitchhiker's Guide to the Galaxy . ** In The Guide , Vogon poetry is described as the third worst in the universe, surpassed only by the poetry of the Azgoths of Kria and the late Paula Nancy Millstone Jennings. It's so bad, it's often used as a form of torture, causing physical pain to the listener. *** The Guide describes a towel as the most massively useful thing an interstellar hitchhiker can have - not just useful for practical purposes like warmth, sunbathing, or even as a weapon, but also with significant psychological value. A hitchhiker who knows where their towel is is seen as someone together and capable, as it implies they also possess other essential items. **** The Guide describes Milliways, the Restaurant at the End of the Universe, as being enclosed in a time bubble and offering a unique floorshow featuring the end of the universe. Previous Next
- Privacy Policy | GSA
Generic Systems Australia Privacy Policy Generic Systems Australia (“GSA”, “we” or “us) are committed to protecting the privacy of the BUSINESS information we collect. Our Privacy Policy describes how we collect and use your business information where we are acting as a data controller (i.e. where we decide how and why your information is used). This Policy does not apply to personal information we hold as an employer or data processor when acting on behalf of, and in accordance with the instructions of our customers through our customers’ use of GSA services and the software licenced via us. We may make changes to our Privacy Policy from time to time to take account of changes to our standard practices and procedures or where necessary to comply with new laws and regulations. If we make changes, we will update the “last updated” date in the following paragraph, and the latest version will always be available on our website. This Policy was last updated on 1 June 2024 . We encourage you to check our website from time to time to ensure that you are aware of our current Privacy Policy. Types of personal information we collect The types of personal information we collect will depend on the circumstances in which the information is collected. However, the types of personal information we collect and hold about you may include: identifying information, such as your name; contact information, such as your address, email address and telephone/mobile number; usernames and passwords that you create when registering for an account with us; your organisation and position, where your organisation has business dealing with us; information about your occupation and employer organisation; information about how you use the products or services we provide to you; records of our communications with you, such as telephone, email, SMS, online and in person communications; if you visit our offices, images of you which may be captured on CCTV; other information that you provide us during the course of business; and other information that is capable of identifying you. You are always welcome to provide us with comments, queries and feedback in relation to our products and services. We may record and monitor telephone calls and other communications between you and us for training, quality control and compliance purposes. When you communicate with us, we may collect additional information including the languages you speak, how best to manage communications with you, and information about your dealings with us. If you participate in a survey or competition, or respond to a feedback request, we will collect the information that you provide in doing so, and associated information such as when and how you submitted the response. We collect information about people who are our contractors, suppliers and business partners, or who are employed by our contractors, suppliers and business partners. When you do business with us, we may collect information about you from others, such as from others who do business with you. Our website may contain links to third party websites. We are not responsible for the privacy practices or the content of those third-party websites. The privacy practices applicable to those third-party websites may differ substantially from ours, so we advise you to read the privacy policy of those websites before using them. Log data, device and location information When using our products and services (including our website), we will collect information about you and about your use of our products and services, such as which services you use and how you use them. We will collect information such as: user name and password; device information, such as the model and ID of the device you use, operating system, telephone number and mobile phone network; server log information, such as details of how you used the products or service (including our website), IP address, hardware settings, browser type, browser language, the date and time of your use and referral URL; and your browser or your account using cookies (see below for further information about our use of cookies). Our products and services (including our website) may also detect and use your IP address or domain name for internal traffic monitoring and capacity management purposes or to otherwise administer the products and services. The patterns of usage of visitors to the online services may be tracked for the purposes of providing improved service and content based on aggregate or statistical review of user traffic patterns. How we collect personal information We may collect personal information about you in the following ways: when you order products or services from us; when you use our online services and other products and services (including our website); when you visit our sites or offices; when you submit a query or request to us; when you respond to a survey that we run or fill in forms on our website; by tracking your use of our products and services (including our website); from third parties who are entitled to disclose that information to us; from publicly available sources; from online sources (including social media platforms and providers like LinkedIn); suppliers of information products and services (e.g. companies that consolidate data from multiple public sources); or other lawful means. From time to time, we may use third-party online services to collect personal information such as your name and email address or telephone number to administer online competitions, customer feedback and surveys. If you provide us with personal information about someone else, you must only do so if that person has provided their permission for you to do so. Cookies We may also collect personal information about you and your use of our website, products and services using cookies. Amongst other things, we use cookies to monitor and observe your use of our website, products and services, compile aggregate data about that use, and provide you with a more effective service (which may include customising parts of our website based on your preferences and past activities on that website). How we use personal information and our legal basis for using your personal information We use personal information that we collect about you to: verify your identity when you are dealing with us; maintain our relationship with you; determine your eligibility for any of our products or services; answer your queries and requests; enable us to provide you or your organisation with our products and services; use in accordance with any request or instructions from you; make special offers related to our products or services that we think may be of interest to you; keep you informed about our activities and notify you of changes to our products or services; monitor use of our products and services (including our website); provide better products, services and information to our customers and to the community; assess, operate, maintain, upgrade and improve our products and services (including our website); maintain and update our records; carry out market analysis and research; carry out planning and forecasting activities and other internal business processes; manage and resolve any legal or commercial complaints or issues (including debt recovery); meet our obligations and perform our functions under applicable laws and agreements; comply with our legal and regulatory obligations; use as otherwise required or authorised by law or government agency. We may also use your personal information for any other purpose as authorised by you. Our legal basis for the above activities includes: consent; necessary for performance of a contract; necessary for our legitimate interests or the legitimate interests of a third party; necessary for compliance with our legal obligations. . When we have legitimate interests As set out above, in some cases we use your information where it is necessary for our legitimate interests or the legitimate interests of a third party. This includes where the use of your personal information is necessary to: administer our operations and business in an efficient and effective way including undertaking management planning and improving and developing our products and services; for our authorised third-party service providers or others to perform services on our behalf, such as payment processing and data analysis; understand and respond to queries, complaints and feedback; send direct marketing to business contacts; transfer personal information in relation to an actual or proposed sale, transfer or reorganisation of all or part of our business and the acquisition of the business; analyse and optimise our website's content by updating it in accordance with your preferences; ensure network and information security; and enforce our legal rights and manage any dispute and legal claims and take legal or other professional advice. Direct marketing and research If you have given us your consent or if we are otherwise legally entitled to do so, we may use and disclose your personal information for marketing purposes (but we will not sell your personal information to any third party) including contacting you about our products and services (including our website), the products and services of other people, or related special offers from our business partners, that we think may be of interest to you. This information may be sent to you by email, SMS or by other means. We may use your personal information to carry out consumer and market research, compile demographics and perform other research and analysis so that we can develop and implement initiatives to improve our services, improve the design, construction and operation of our products and identify people likely to be interested in our products and services. You can opt-out of receiving marketing communications from us at any time by following the “unsubscribe” link in any communication (or sending a return email with “un subscribe in the Subject line” from us or contacting us using the contact details below. Unsubscribing from marketing communications will not stop service-related communications from us, such as administrative alerts in relation to your account. De-identification We may de-identify information about you so that the information can no longer be used to identify you (anonymisation). We may use and disclose de-identified information in the course of our business (including in any promotional or marketing material). Aggregation We may aggregate information on the use of our products and services (including our website) in such a way that the information can no longer be related to identifiable individuals. We may use and disclose aggregated information in the course of our business (including in any promotional or marketing material). Who we disclose personal information to We may disclose your personal information to: your representatives, advisers and others you have authorised to interact with us on your behalf; controlled entities within our corporate group; our team members and third parties including business partners, consultants, contractors, suppliers, service providers, professional advisers and agents who need the information to assist us with conducting our business activities; prospective purchasers of all or part of our business or shares in our company or a related entity; government agencies or authorities, regulators, law enforcement agencies and other parties where authorised or required by law who ask us to disclose that information and to which we are legally required to disclose your personal information; parties identified at the time of collecting your personal information or as otherwise authorised by you. How we maintain and secure your personal information Security is a priority for us when it comes to your information. We take reasonable steps to ensure that any of your personal information which we hold is accurate, complete and up to date. These steps include promptly updating personal information when we are advised that personal information has changed, checking our contact lists for accuracy, and providing individuals with a simple means to update their personal information. On rare occasions, we also keep hard copy records of this personal information in physical storage facilities. We use a range of physical and technical security processes and procedures to protect the confidentiality and security of the information that we hold, and we update these from time to time. These measures include: implementing physical and technical access and security controls to our physical and electronic databases, such as security procedures for access to our business premises; and technological security procedures including password protection, network firewalls, encryption, intrusion detection and site monitoring where practicable to do so. We also take steps to monitor access to and modification of your information by our team members and contractors, and ensure that our team members and contractors are aware of and properly trained in their obligations for managing your privacy. However, the internet is not a secure environment and no matter what physical and technical security processes and procedures are used we cannot guarantee the security of your personal information. You also play an important role in keeping your information secure by maintaining the confidentiality of any usernames and passwords you use with our products and services (including our website). How long we store your personal information for Personal information is only retained for as long as it is needed for the purpose for which it was collected or as required by law. After the expiry of this period, we will take reasonable steps to make sure its de-identified or destroyed. The criteria used to determine appropriate retention periods for personal information include: the length of time we have an ongoing business relationship with you; the amount, nature and sensitivity of the personal information; whether we have a legal obligation to retain personal information; and whether retaining the personal information is necessary to resolve legal disputes (including the establishment, exercise or defence of legal claims). Your rights Depending on where you are located, you may have a right to: request a copy of your personal information. In relation to personal data you have supplied to us, and which is held by us for the purpose of entering into a contract between us or on the basis of your consent, you may be entitled to ask us for a copy of this information in a structured, commonly used and machine readable format so that you can reuse it or share it with other organisations; object to our processing of your data and ask us to restrict the use of your information and to delete it; or correct or rectify any personal information that is out-of-date, incorrect, incomplete or misleading. Such requests should be submitted to us in writing using the contact details below. We may ask you to verify your identity before responding to your request. We will respond to your request in a timely manner and action your request in accordance with applicable data protection laws. You have a right to withdraw your consent where you have previously given us consent to use your personal information (e.g. to receive marketing communications). You can do this by contacting the Privacy Officer using the contact details below or, where the consent relates to marketing, by unsubscribing using the link in any of our communications. Complaints If you have a concern about your privacy or how we have collected or handled your personal information, please contact our Privacy Officer using the contact details below. If you wish to make a complaint, you should forward a written complaint to our Privacy Officer using the contact details below. In the complaint, please include your contact details (such as email address, name, address and telephone number) so we can contact you for further information and clearly describe the complaint. We will respond to your query or complaint within a reasonable time and in accordance with applicable data protection laws. If you are not satisfied with our response, you may contact us to discuss your concerns or may raise a complaint with your local data protection authority through their official channels. In Australia it is the Office of the Australian Information Commissioner, in New Zealand it is the Privacy Commissioner. Contact us If you require further information this Privacy Policy or Generic Systems Australia’s management of your personal information please contact us via the following contact details: Privacy Officer Phone: +61 2-9959-2239 Email: info@gensys.com.au
