Search Results
88 items found for ""
- ‘Cyber Trust’ needed to tap EOFY splurge | GSA
< News ‘Cyber Trust’ needed to tap EOFY splurge 25 June 2024 Australians are shifting their End of Financial Year (EOFY) shopping focus to online deals and security, as they spend an estimated $10.1B in EOFY sales this month. New research from PayPal indicates that 38% of Australians plan to participate in EOFY sales this year. 42% of those say they will primarily shop online. Despite the growing trend of online shopping, almost all Australians (93%) are concerned about online security. Fake retail sites have begun to use generative AI to appear more convincing, and 40% of Australians are more concerned about their online security now than they were a year ago. Implications for Retailers Growing customer anxiety about e-commerce makes it more important than ever before for companies to establish trust in the security of their systems. With customers beginning to question the security of a company’s systems before handing over credit card and other information, companies need to be able to provide reassurance - and proof – that their transactions and personal data will indeed be secure. In fact, actively promoting the security of company systems may even become a point of positive marketing differentiation for companies that get ahead of these concerns. Earning Customer Trust A proactive and layered strategy for storing, transferring and securing data is essential for storing customer data, and effecting online transactions. Secure managed file transfer, secure content engines, secure digital rights management, and employee education combine to create the optimal way to prevent data theft and cyber breaches. At Generic Systems Australia , we recommend the class-leading secure managed file transfer solution, GoAnywhere MFT , to keep data safe - at rest, and in transit. Coupled with our Advanced Threat Protection Bundle , we enable organisations to safely store and transmit only the customer data they intend, without exposing their systems to malware. If you’d like to learn more about how to earn potential customers’ trust in your data handling practices through layered cyber defences, please feel welcome to get in touch with me, Bradley Copson ( mailto:bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, and even offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your Local Experts in Secure Managed File Transfer. Previous Next
- Fast OR Safe...? File Transfers can be both! | GSA
< News Fast OR Safe...? File Transfers can be both! 17 Mar 2024 Sending files externally...? Now it can be both Safe AND Easy! There was a time when ensuring your organisation’s file transfers were safe was a hassle… time-consuming, inconvenient, and requiring specialised technical skills. Thankfully, that’s no longer the case. Ensuring your precious data can be safely shared within your organisation and with your external trading partners need no longer be complicated. In fact, the best data technologies save you time and money, and make data exchange easy . Here’s how. The Fast and the Fraught Hitting “send” is an everyday routine for most employees. Sending files to suppliers and customers is as easy as a couple of mouse clicks. However, each of these thousands of daily data transactions is a potential target for cybercriminals. The more ad-hoc and varied the file transfers, the greater the risks. Too often, organisations only realise their need for a more robust approach after they’ve experienced a costly data breach. Other times, data vulnerabilities become apparent when organisations want to start trading with partners who employ more stringent data safeguards... particularly in industries where there are strict data compliance requirements, such as healthcare, finance, transportation and defence. Failure to adhere to an industry's data security regime can lead to hefty fines and sanctions for both parties to the transaction. Solving for Ease AND Security Solutions such as managed file transfer (MFT), data loss prevention (DLP), data classification, and email security can automatically secure your organisation’s data, while simultaneously keeping your business humming. Better still, by automating thousands of routine file transfers, the best solutions increase an organisation’s efficiency by saving employees’ time and enabling them to focus on higher value-added work. How to Get Started In our experience, few organisations begin with a completely clean slate and zero data protection measures in place. Usually, some enterprising individuals will have independently employed varying degrees of security using free or low-cost consumer file transfer tools. Other employees may believe – incorrectly – that they’re securing their data by simply applying files’ “read-only” settings. A few may have gone a step further and narrowly limited who has access to their department's data. Unfortunately – aside from the inherent risks of using multiple incomplete and incompatible security approaches – siloed security measures like these can also inadvertently remove resources that knowledge workers need to conduct business. As a result, organisational efficiency is impeded, with critical information becoming too slow or difficult to access. A Holistic Approach to Data Exchange At Generic Systems Australia we help organisations embrace a whole-of-business approach which reduces risk and makes data more secure while keeping your business operations and relationships running smoothly and efficiently. A good starting point is considering the impact security policies and practices have on your customer and vendor relationships: How would a data breach impact your business’s reputation, bottom line and supplier relationships? Do the policies and tools you currently use hinder your employees’ effectiveness, efficiency and productivity? Could new technology speed up the actual delivery of critical information? Could new technology be simple enough to use that most employees could readily adopt it? The Human Factor The best data security measures are invisible and automated . We’ve found that the less organisations need to rely on employees to change their behaviour, the better the risk mitigation. But even so, educating employees on data security should be an element of an improved approach. Start by explaining why you need to put in place the new policies or tools. Employees who understand the high stakes of data theft and compliance breaches are much better disposed to taking ownership of managing data transfer risks. Then focus on education. By equipping your various department heads and business process owners with knowledge about secure data exchange approaches, you can help them make the right choices when they liaise with their various supply chain partners. A multi-phase approach, leveraging middle managers and key influencers in your organisation to champion best practices, is often best. Automatically Securing Everyday Data Ideally, we want our employees to be able to safely send and receive emails and attachments without the need for them to take any additional, time-consuming steps. MFT, DLP, data classification, and email security make that possible through advanced levels of automation. In combination, these technologies examine each data transfer event and thoughtfully apply policies such as encryption, auditing, user and recipient validation, redaction, etc. This way, employees do not have to manage any of those activities, and the data transfers are performed quickly, efficiently and securely. As workforces and their workplaces become physically more dispersed – sometimes in the office, sometimes from home, sometimes from a local café – this automated approach becomes more and more beneficial. Not only does it accelerate and streamline the process of transferring data, it also reduces the risk of human error. Out of Sight, Out of Mind? Data exchange is like the human circulatory system - unseen, but absolutely critical to your organisation’s ongoing vitality. Protecting and enhancing it is both necessary and worthwhile. At Generic Systems Australia, we’ve observed that moving to a more automated, secure and efficient approach can sometimes be stalled by the very “bloat” we discussed earlier. Taking out the too-many tools which have sprung up across an organisation’s silos can seem too complicated and time-consuming to tackle. However, there is an easy and relatively inexpensive way forward… A centralised tool, such as the class-leading GoAnywhere MFT with its dashboard-style interface, can provide a holistic approach. Rather than having separate tools for encryption, auditing, reporting and automating file transfers, GoAnywhere can handle it all. It even scales as your business grows. If you’d like to discuss making your organisation’s data transfers safer and easier, adding to your organisation’s productivity and bottom line, please feel free to contact our Business Manager, Bradley Copson, ( mail to: bradley@gensys.com.au ). He’ll be more than happy to offer you an obligation-free discussion, no-cost trial, or Proof of Concept. At Generic Systems Australia, we're your local experts in Secure Managed File Transfer. Previous Next
- Increased 3rd Party Data Sharing Increases Data Theft Risk | GSA
< News Increased 3rd Party Data Sharing Increases Data Theft Risk 29 July 2024 The inability to track, control and report sensitive content shared with external contacts is a substantial risk for modern enterprises. And that risk appears to be rapidly escalating, as two-thirds of organisations each exchange sensitive data with more than a thousand third parties. These are some of the key findings from a survey conducted recently by Kiteworks, a US-based data security firm. Sensitive Content Kiteworks defines “sensitive content” as the wide variety of content commonly targeted by cyberthieves. It’s content which poses a significant threat to an organisation once bad actors get their hands on it. Sensitive content includes the data of customers and employees — personally identifiable information (PII), protected health information (PHI), and payment card industry (PCI) data. It also includes an organisation’s intellectual property (IP), legal communications and documents, financials, mergers and acquisitions data, and other types of private and confidential information. Kiteworks says that the key problem with sensitive content is how it does not stay in one place. During daily operations, it is shared not only among employees, but also with partners, suppliers, contractors, legal counsel, accountants, auditors, and more. More Comms Channels = More Risk Efficient organisations are always searching for more “frictionless” ways to move their data. However, as their number of communication channels with external parties grows, so too does the potential opportunity for bad actors to intercept and steal the data. That escalating risk is borne out by Kiteworks’ analysis. They found that organisations with more than seven communication tools experience ten plus data breaches, which is 3.5 times higher than the aggregate of those experiencing one to ten breaches. File Size Limits Exacerbate Risks The file size limits imposed by many content communication tools are a key contributor to the risks of moving data. Frustrated employees simply trying to do their jobs will sometimes use insecure and unauthorised consumer-grade file sharing services to bypass organisational limitations. Even for those employees who always follow the rules, the resulting workarounds can trigger significant waste of staff time. More than 30% of organisations surveyed by Kiteworks needed to implement workarounds due to file size limits for email, file sharing, and managed file transfers over 50 times per month. Around 10% said they must do so over 100 times per month. IT Teams Stepping Up Switched-on IT teams are increasingly focused on addressing their organisation’s need to protect sensitive content. A popular solution is to unify communication tools and channels to secure sensitive content communications. Their primary drivers for change may vary – from protecting intellectual property and corporate secrets to mitigating litigation, avoiding regulatory violations and protecting their brand reputation – but the way they are addressing these risks is similar… Control Through Consolidation Consolidating communication tools onto a single platform needs to be a foundational element of an organisation’s cyber defences. By reducing the number of disparate tools used for content communication, they can significantly lower the risk of data breaches and improve operational efficiency. Kiteworks’ survey shows that organisations with fewer communication tools experience fewer breaches. Tool consolidation significantly enhances security. MFT Consolidates, Automates, Improves Efficiency Managed File Transfer (MFT) software is a powerful technology which comprehensively addresses the risks and challenges of moving information within an organisation, and with external suppliers, partners and customers. MFT simplifies the complexities of data transfer by offering centralised control, encryption, and auditing capabilities. A significant advance on traditional approaches, MFT provides enhanced security protocols, ensuring data privacy during transmission and storage. And it does so via a user-friendly interface, which is easy to use for even non-technical employees. In addition to consolidating the plethora of disparate data exchange channels employees create during an organisation’s evolution, MFT technology provides an array of organisation advantages: Security: MFT employs robust encryption algorithms, reducing the risk of data breaches during transit. Features like Access Controls, and Multi-factor Authentication, safeguard sensitive information from unauthorised access. No Size Limit Straitjacket: The best MFT solutions enable organisations to set file size limits appropriate to their teams’ needs. They also offer “persistence protocols” which ensure large files are fully transmitted to their intended destinations. Efficiency: MFT automates repetitive tasks. This not only reduces human error, it saves significant staff time. Through scheduling of file transfers, monitoring of progress, and automatic error-handling, it enables a significant boost to operational efficiency. Compliance: In industries with strict regulatory requirements, MFT helps companies meet compliance standards (e.g. HIPAA and GDPR) by automatically maintaining detailed logs and audit trails. Scalability: Through its ability to handle large file transfers and an ever-growing number of users, MFT is able to grow in sync with an organisation's needs, while maintaining superior performance. Collaboration: In addition to improving business processes within an organisation, MFT facilitates seamless collaboration with external partners, suppliers, and customers, fostering strong relationships built on shared trust and reliability. The Best MFT At Generic Systems Australia, we recommend the industry’s class-leading MFT solution, GoAnywhere MFT . GoAnywhere is consistently declared by independent experts to be the best-in-class MFT solution. Besides achieving the highest overall score in the MFT category, GoAnywhere is also ranked highest for Vendor Capability Satisfaction, including the key dimensions of: • Business Value Created • Breadth of Features • Quality of Features • Product Strategy and Rate of Improvement • Useability and Intuitiveness • Vendor Support • Ease of Data Integration • Ease of Customisation • Availability and Quality of Training, and • Ease of Implementation GoAnywhere MFT's combination of versatility, security, ease of use, and budget-friendliness has propelled it to the top of the MFT market. Gain Expert Local Advice At Generic Systems Australia , we’re Australia’s and the Asia-Pacific region’s experts on MFT in general, and GoAnywhere in particular. If you’d like an obligation-free discussion about how we could help you keep your organisation’s sensitive content safe, please feel welcome to get in touch . We’re always happy to have an obligation-free discussion, and even offer a free Proof of Concept. Previous Next
- Migration Services make upgrading easy | GSA
< News Migration Services make upgrading easy 17 Mar 2024 Are you attracted to the security and efficiency of a Managed File Transfer solution… but a little worried about the potential disruption of installing one? You needn’t be! Our technical experts at Generic Systems Australia have decades of experience migrating clients from handwritten scripts, outdated integration packages and other legacy software - and everything in between. So it’s no surprise that many of our clients prefer to leave the changeover to us and our Migration Services. Our technical experts can quickly and efficiently install GoAnywhere MFT – the world’s leading file transfer solution – and then configure it to replace all your existing scripts, integration packages and other file transfer middleware. You and your team can keep on doing what you do best – free of distractions – while we do what we do best. Once you have GoAnywhere MFT installed, you may be pleasantly surprised at just how simple it is to set up further automated file transfers into the future. GoAnywhere features an easy-to-understand drag-and-drop interface to create automatic file translation and transfer workflows. In fact, configuring workflows is so easy that most users quickly learn to do it themselves, freeing up your technical staff to focus on other important work. If you’d like to discuss how your organisation’s file transfers can be made more efficient and secure, please feel free to contact our Business Manager , Bradley Copson (mail to: bradley@gensys.com.au ). He’s always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. Generic Systems Australia Your Local Experts in Secure Managed File TransferMore Resources at: www.gensys.com.au (Covering Post by Bradley a few days later) Talking to clients, I sometimes sense they’re worried about the perceived complexity of moving from their existing ad-hoc file transfers to a modern, secure and efficient Managed File Transfer solution. I reassure them that they needn’t be concerned. Our technical experts at Generic Systems Australia have decades of experience migrating clients from handwritten scripts, outdated integration packages and other legacy software - and everything in between. This article explains the benefits and advantages of using our Migration Services . #MFT #managedfiletransfer #securefiletransfer #sft #cybersecurity #datatransfer Previous Next
- Ditch Your File Transfer Scripts | GSA
< News Ditch Your File Transfer Scripts 10 Sept 2024 More and more companies across the Asia-Pacific region are realising they have a pressing need to eliminate their use of outdated file transfer scripts. A Key Vulnerability A recent survey found that our region is on the frontline, subject to more cyber attacks than any other. 72% of local organisations experienced four or more cybersecurity incidents in the past year - 20% more than the global average. Manual scripts – often written by employees to reduce the repetitive burden of manually transferring files – are a key vulnerability. Not only are file transfer scripts risky, they’re also inefficient and prone to failure. MFT: safer, more efficient Managed File Transfer (MFT) is a powerful technology which comprehensively addresses the risks and challenges of moving information, both within an organisation, and with external suppliers, partners and customers. It simplifies and secures data transfer by providing centralised control, encryption, enhanced security protocols and auditing. Unsurprising then that more and more IT departments are using MFT to replace their outdated manual file transfer scripts. Reasons to Ditch Scripts Scripts don’t play well with new tech. For example, cloud-based computing environments require file transfers to be integrated with cloud-based solutions, and platforms such as Azure and AWS. Scripts lack advanced features. For example, automating file transfers – say, with FTP - requires you to add a second solution, which is time-consuming and complex. Scripts are also challenged to detect and implement automatic “re-try” features in the event of failure, or prevent employees mishandling sensitive data. Scripts are time consuming. Developing, maintaining, and troubleshooting scripts takes time, distracting valuable IT staff from more important tasks. Worse, if the author of a script isn’t available when it fails, bottlenecks can occur in your workflow. Scripts don’t offer built-in reporting. Logging needs to be manually added to scripts. Accessing those logs – say, when you need to prove audit compliance, or meet other regulatory reporting requirements – is time consuming and difficult, requiring an effective filter and search tools. Scripts aren’t secure. As explained above, scripts don’t offer the security features necessary to keep cyber thieves at bay. User credentials aren’t encrypted, there’s no in-built key management, no access controls, and they’re unlikely to use up-to-date security protocols. Why MFT is Better than Scripts As well as increasing the security of your file transfers, ditching scripts offers your organisation many other compelling advantages. Centralised Control. Instead of using multiple different tools, programs, and scripts to encrypt, send, and automate your file transfers, MFT can enable all of these from a single interface. That significantly streamlines day-to-day operations and reduces wasted tool maintenance time. Automate. No matter the volume of files to be transferred across your business and supply chain, the best MFTs enable your team to spend time focusing on other things. Save Money. Clients are often surprised how many employee-hours they’re spending creating, maintaining and resolving problems with file transfer scripts. These ongoing hidden costs can really mount up. (And that’s without considering the potentially catastrophic cost to your business of a data breach enabled by an insecure script!) Flexible Scalability. The best MFTs scale fluidly – horizontally and vertically - as file transfer loads increase. They make redundant tedious and uncertain processes of buying, deploying and understanding gateways, load balancers and other expensive network devices and hardware. Cloud-friendly MFT tools also exploit new cloud and virtualisation capabilities to scale up quickly to meet demand. They can even be “failed over” to a DR site in the event of an outage. Regulatory Compliance. By logging file transfers and access across your organisation, the best MFTs ensure your compliance with legal requirements, such as data privacy and encryption. Logs are also readily accessible if you’re called on to demonstrate your compliance during an audit or need to conduct forensics after an internal security breach. The Best MFT Independent analysts agree that that GoAnywhere MFT is the industry’s leading Managed File Transfer solution. GoAnywhere not only enables your data to be moved securely - both internally and externally – it also enhances your team’s productivity. Asia-Pacific’s MFT Experts No-one better understands local MFT needs and best practices than Generic Systems Australia. Our local team has decades of experience helping businesses replace outdated and risky scripts with the world’s leading MFT solution, and our Migration Service makes the transition easy. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably transition from risky scripts to an advanced MFT solution, please feel welcome to get in touch . Previous Next
- Best Practices for Cloud MFT | GSA
< News Best Practices for Cloud MFT 30 Jan 2024 Best Practices for Cloud Managed File Transfer Data is the lifeblood of modern business. And most modern organisations rely to some extent on the Cloud as they transfer files between employees, trading partners, and customers. To help you guard against cybercrime, here are best practices for safeguarding your data on its way to, from and in, the Cloud. Some Clouds are Better than Others Cloud computing comes in three basic flavours… Public, Private, and Hybrid. Each offers differing degrees of security and risk. Of the three, a Self-Hosted Private Cloud solution offers considerable advantages through enhanced levels of control and protection. It: Is ring-fenced inside your organisation’s security perimeter, enjoying the same protections and security posture as the rest of your IT environment. Can be integrated into your network with AWS VPN / Azure Express route links. Has access to your internal systems through appropriate firewall controls to better suit interfacing requirements (aka “lateral movement of data”). Ensures internal file and data transfers never leave your secure local network. Public and Hybrid Clouds Permitting your precious data to go “off-prem” inherently increases the risk it may be intercepted or accessed by cybercriminals. However, leading MFT solutions - in combination with a trustworthy Cloud provider, appropriately configured - can mitigate these risks, and provide MFT-as-a-service. Choosing with the Best Cloud Provider Cloud providers come in all sizes, capabilities … and risk profiles. Ensure your Cloud provider uses robust security protocols and safeguards. Do they utilise the latest encryption protocols, and offer strong user authorisation and access controls? Do their data transmission and storage approaches meet the regulatory requirements for your industry? What performance levels does your Cloud provider commit to? Can they quickly and reliably receive, store and transmit your business-essential files? Can your Cloud provider easily integrate with your existing systems? Can your Cloud provider offer an appropriate level of technical support when you need it? At Generic Systems Australia , we would be happy to share with you our significant experience with and expert perspective on locally-available Cloud providers, detailing and how well they meet the requirements for safe, efficient and effective MFT. Meet Industry Compliance Requirements Some industries are subject to heightened regulatory requirements regarding data storage and transfer. Even when using an “off-prem” Cloud provider, you remain responsible for meeting those requirements. Failing to utilise an appropriately compliant Cloud environment can lead to fines, law suits, loss of customers, loss of supplier trust, and reputational damage. Maintain Control and Data Sovereignty Governments increasingly require organisations to maintain authority and control of data within their jurisdictional boundaries – aka, “data sovereignty”. Private and Hybrid Cloud environments provide inherently greater authority over where data is stored, access permissions, and retention policies. In this way, they enable organisations to better navigate myriad data sovereignty mandates and evolving compliance standards. Utilising Managed File Transfer as a Service (MFTaaS) MFTaaS is an approach which can help organisations streamline their file transfer processes, while offering robust security, scalability, reliability, anywhere access and cost-effectiveness. However, be sure to confirm your MFTaaS solution offers robust encryption and security protocols, can scale grow with your organisation's needs, and complies with the industry regulations relevant to your business. Technical Best Practices for Cloud File Transfers Ensure secure and efficient transmission of data in a Cloud environment by observing these technical requirements: Data Encryption at Rest and in Transit: Utilise encryption protocols like SSL/TLS for data in transit and encryption solutions provided by your Cloud provider for data at rest. In private Cloud settings, you can also leverage approaches like Bring Your Own Key (BYOK) or Hold Your Own Key (HYOK). Data Loss Prevention (DLP): A robust DLP solution helps prevent unauthorised data transfers and leakage by monitoring data in real-time and preventing it from being transmitted outside of your organisation. Intrusion Detection Systems (IDS): By monitoring and alerting IT security teams to any suspicious file transfer behaviour, IDS helps nip security breaches in the bud. Employee Best Practices Having your team follow best practices is also essential to secure data transfer and storage. Staff Training: Teach your employees to recognise data security risks, and how to avoid them. Place special focus on phishing and social engineering – two of the most prevalent cybercriminal threats. Multi-Factor Authentication (MFA): Enforce MFA for file transfers, and utilise phishing-resistant techniques. Access Control: Restrict access to files and systems, and provide users with only the minimum level of access necessary to perform their role. Implement a regular cycle of access permission reviews. Audit, Backup and Recovery Best Practices Continuous monitoring and auditing of Cloud file transfers not only maintains the security of your data, it also helps identify and mitigate potential threats, while monitoring on-going compliance. Log Analysis and Security Information and Event Management (SIEM) proactively monitor transfers, and enable your IT team to react quickly to emerging threats and incidents. Data backup and disaster recovery are the final critical components of your comprehensive safeguards against data loss in Cloud file transfers. They ensure that, if a disaster occurs, your organisation can provide business continuity by maintaining the availability and integrity of data. Making the Cloud Safe for File Transfers By following these best practices, the Cloud can be an efficient, reliable and secure element within your organisation’s overall data transfer approach. At Generic Systems Australia , we use and recommend the class-leading (link) managed file transfer solution, GoAnywhere MFT , for the way it integrates with the Cloud and embeds best practices. Providing peace of mind, by securing sensitive files in transit and at rest, GoAnywhere automates and encrypts data between an organisation and its trading partners, protecting it from unnecessary vulnerabilities while improving efficiency and reducing costs. If you’d like to learn more about GoAnywhere MFT , check out our resources at Generic Systems Australia. Our Business Manager, Bradley Copson ( bradley@gensys.com.au )would also be happy to offer you an obligation-free discussion , a no cost trial, or even a Proof of Concept for your business. Simon Keunstner, Senior Technical Consultant, Generic Systems Australia “Local Experts in Secure Managed File Transfer” Previous Next
- Survive the Cyber Security Staff Drought | GSA
< News Survive the Cyber Security Staff Drought 3 Sept 2024 Australian organisations are still struggling to recruit and train sufficient cyber security specialists to keep their valuable data safe. A report by government-funded industry body AustCyber predicted that Australia would need an extra 4800 cyber security workers each year to avoid a significant shortfall by 2030. It warned that the local industry is lagging those of other countries, urging further private sector investment in the area. AustCyber found that 74% of cyber security professionals were being impacted by non-availability of suitably qualified staff. Only 8.8% rated Australia’s cyber security sector as “highly competitive”, while 21% rated the local industry as “not competitive” compared to other global markets. 20% Positions Vacant The Australian Government’s 2023 Skills Priority List shows cyber security roles as among the highest-ranked skills with a national shortage. According to AustCyber, cyber security architects are the most in-demand cyber security role, followed by engineers and analysts. While there were ~51,300 dedicated cyber security workers in Australia last year, a staggering 12,500 jobs had remained vacant. The workforce needs to grow by 66% to reach the total of 85,000 who would be required by 2030. Speaking to The Australian Financial Review earlier this year, the RMIT’s Research Director from the Centre of Cyber Security, Matthew Warren, said: “We cannot run before we walk, and right now the Australian cyber security industry does not have the depth of dedicated, skilled cyber security workers required to strengthen Australia’s security posture against the increasing sophistication, ferocity and prevalence of cyber security threat actors.” AustCyber chief executive Chris Kirk said that cyber security was now a “non-negotiable, impacting every Australian”. Early Education + a Wider Funnel While there’s been a 30% year-on-year growth in the number of people studying cyber security at university, the funnel for future workers needs to be wider for AustCyber’s target to be met. Said Kirk: “We really need to get cyber into the education system quite early, like primary school. And, at the speed of which the industry moves, your skill set can be severely challenged very quickly. So it’s extremely important we upskill and keep globally relevant the professionals in these jobs.” Surviving Staff Shortfalls Organisations struggling to recruit cyber security specialists should consider how automation can augment and relieve the load being carried by their existing cyber security specialists. For example, advanced Managed File Transfer solutions, such as GoAnywhere MFT , can centrally manage and secure file transfers organisation-wide. Recognised for its class-leading features, GoAnywhere frees up your cyber security specialists, working in the background to comprehensively mitigate the risks of storing and moving your data, both within and outside your organisation. Through its centralised control, encryption, and auditing capabilities, GoAnywhere replaces risky traditional approaches and improves productivity. Its versatility, security, ease of use, and budget-friendliness have made it a must-have solution for organisations committed to protecting their information assets. Expert Local Advice On Hand At Generic Systems Australia , we’re Australia’s and the Asia-Pacific region’s experts on Managed File Transfer solutions. If you’d like a no-cost, no-obligation discussion about how we could help you augment your cyber security team’s efforts, please feel welcome to get in touch . Previous Next
- Cyber Target Paris Prepares | GSA
< News Cyber Target Paris Prepares 23 July 2024 As the attention of sports fans turns to Paris this week, so too are the nefarious attentions of the world’s cyber criminals. So: how will the world’s largest sporting event keep its data and systems secure…? Read on to learn more from those charged with defending the Summer Olympics’ IT systems. Miscreant Magnet Vincent Strubel, head of France’s national cybersecurity agency (ANSSI), warned that this year’s summer Olympics was facing an unprecedented level of cyber threats. Said Strubel: “There will be cyberattacks during the Games and the Paralympics... Some won’t be serious. Some will be serious, but won’t have an impact on the Games. And perhaps there will be some that are serious and liable to have an impact on the Games.” Franz Regul, head of the cyber team responsible for Paris 2024, said he expects the number of security events this year to be “multiplied by 10 compared to Tokyo”. There is a need to keep an exceptionally tight attack surface and tie up any loose ends like SSL misconfigurations, open ports, and privacy issues such as cookie consent violations. French anti-cybercrime units have classified the cyber threats in five categories: 1. Amateur Hackers As the “as-a-service” cybercrime economy develops, it’s become easier than ever for novice threat actors to launch more sophisticated attacks than their limited skillsets would otherwise have allowed. This lowered bar for entry will lead to a higher overall number of attacks. 2. Thrill-Seekers The sheer size and popularity of the Olympic Games will tempt those broadly inclined to create nuisance or show off their “cyber chops” to their peers. They’ll likely seek to exploit any security weaknesses in the websites or booking sites purposed for the event, including those of media organisations and sponsors. Common website security attacks such as cross-site scripting, SQL injection, and DDoS attacks will be their primary threat vector. 3. Hacktivists Activists passionate for their cause of choice are likely to attempt to hijack the world’s largest stage. 4. Black Hat Thieves The immense cashflow around the Paris Olympics makes them a potentially lucrative target for cyber thieves. Phishing attempts – expected to arrive in the form of unsolicited emails about the Games, lodging, tickets, or information followed by “helpful links” – will abound. Those who open the emails and click on the links may find their bank accounts quickly compromised. 5. Nation-State Actors The Olympics have long been a huge world stage on which global powers send political signals to countries, governments, and the world at large. As the Associated Press recently noted, “Among the most threatening cyber-adversaries are countries who might want to embarrass and exact costs on France and the International Olympic Committee.” Defending the Games French cybersecurity authorities are cagey about the significant precautions they’re taking to thwart cyber criminals. Revealing too much would give away a tactical advantage to blog-reading Black Hats. However, here’s what we know so far… 1. Ethical Hackers The ANSSI has hired ethical hackers to test the attack vectors on all Olympic websites. According to Strubel, 500 sites, competition venues and local collectives have all been put under “friendly fire”. 2. AI Artificial Intelligence is being employed to test for multiple threats across IT systems and websites. Regul said that AI was helping differentiate “between a nuisance and a catastrophe”. 3. Physical Security Transportation, supply chains, and surveillance systems are other potential targets for those seeking to compromise the Games. All have been included in the safety perimeter of the Paris 2024 cybersecurity preparations. 4. External Expertise The 2018 Winter Olympic Games were targeted by malware dubbed “Olympic Destroyer”, which aimed to disrupt the opening ceremony. Paris cybersecurity teams have tapped the knowledge and experiences of the consultants who detected and disabled that threat. A Bug Bounty program has also sought to attract the time and skills of independent IT practitioners. 5. Education & War Gaming During the past two years, ANSSI has been “war gaming” cyber incidents with the International Olympic Committees’ IT partners, and deploying cyber defence education programs across the thousands of people responsible for operating the Paris Games’ IT systems. No News will be Good News The final word on Paris’s cyber preparations belongs to Jérémy Couture, who helms the official cybersecurity hub of the Paris Olympic games. Couture said his dream for the Olympics is that technology and cybersecurity won’t be talked about - because that will mean they were a non-issue. Sports fans around the world will be hoping his dreams become reality. Need a Local Expert? If – like the Paris Games - you’d like to tap local expertise keep cyber criminals at bay, please feel welcome to contact me, Bradley Copson ( mailto:bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. #MFT #managedfiletransfer #securefiletransfer #sft #cybersecurity #datatransfer Previous Next
- GoAnywhere declared "Best MFT" | GSA
< News GoAnywhere declared "Best MFT" 6 Nov 2023 GoAnywhere judged to be Best Managed File Transfer Solution Transferring data is the lifeblood of a modern organisation. Securely sharing critical information between employees, suppliers and customers is essential to efficient operations. Last year, respected tech analysts Info-Tech evaluated the most popular MFT software and vendors. Their analysis, which took into account vendor experience and capabilities, product features and customer satisfaction, found GoAnywhere to be the top MFT solution. So, what led Info-Tech’s judges to recommend GoAnywhere for businesses seeking a secure and efficient file transfer solution…? Unmatched Versatility: GoAnywhere MFT offers an all-encompassing platform for secure file transfers, automation, and seamless cloud integration. Some competitive offerings don’t support Cloud Deployment. GoAnywhere’s versatility and extensive feature set impressed Info-Tech's evaluators, leading them to conclude it was the ideal choice for businesses with diverse transfer needs. User-Friendly Efficiency : User-friendliness is key element of efficient in business operations, and Info-Tech found that GoAnywhere MFT really delivers on this front. From IT specialists to non-technical professionals, the platform's intuitive design streamlines file transfers, task scheduling, and security management. Fortified Security: In this era of increased data breach risk, GoAnywhere’s robust encryption and access controls keep sensitive data protected. Stellar Customer Reviews : 93% of GoAnywhere reviewers said they would likely recommend the solution. The solution’s composite review score was 8.9 out of 10. Budget-Conscious Investment : Info-Tech found GoAnywhere MFT to be a supremely cost-effective solution, with attractive pricing strategies. Responsive Support and Ongoing Updates : Info-Tech applauded GoAnywhere for its responsive customer support and regular updates, ensuring business continuity. Market Leader – for a reason GoAnywhere MFT's combination of versatility, security, ease of use, and budget-friendliness has propelled it to the top of the MFT market, as recognised by Info-Tech. For businesses on the quest for a comprehensive and reliable file transfer solution, GoAnywhere MFT is the smart and strategic choice. Want to Learn More? Generic Systems Australia is the Asia-Pacific region’s leading provider of secure MFT solutions. If you’d like to explore how your organisations’ efficiency and bottom line could be boosted through MFT technology, please feel free to contact our Business Manager , Bradley Copson , for an obligation-free discussion, or read more on our website . Previous Next
- Data Breach Costs Escalate in 2024 | GSA
< News Data Breach Costs Escalate in 2024 14 Aug 2024 $4.26M! That’s the average cost of a data breach in Australia in 2024, according to new research released by IBM. The figure – a record high – represents a whopping 27% increase since 2020. However, while the average cost of a data breach continues to escalate, the types of cyber breaches experienced by Australian organisations continue to be the usual suspects. Under Attack IBM’s research found that Phishing continues to be the most common type of attack vector , with 22% of breaches starting this way. Stolen or compromised credentials were the second most common, accounting for 17% of breaches. Malicious insiders were responsible for the most costly attacks, at 8% of incidents. It took Australian companies on average 266 days to identify/contain cyber incidents. This lengthy period contributed to high detection and escalation costs , which remain the most expensive aspect of a breach, with post-breach response and lost business the second most costly. Almost a third of data breaches involved data stored across multiple environments : public cloud, private cloud, and on-premises systems. Breaches across multiple environments took 13% longer to identify and contain. Organisations with too few cybersecurity staff paid the heaviest price, with an average cost per breach $2.7M higher than organisations with less exposure. However, involving law enforcement saved some ransomware victims as much as $1.5M in costs. Automated Defences Help Companies which didn’t use security AI and automation experienced significantly higher breach costs ($5.21M) than those which did, and it also took them an additional 99 days to identify and contain breaches. The research found that 65% of surveyed Australian organisations leveraged these technologies. However, attackers too are exploiting new opportunities presented by AI. For example, increasingly convincing deepfakes are enabling ever more effective social engineering attacks. Avoiding Costly Cyber Breaches To protect an organisation’s valuable data, it must be protected when it’s stored and while it’s “in motion”. As the research found, automation can ensure this takes place with the entirety of an organisation’s data transfers. Managed File Transfer (MFT) solutions such as the class-leading GoAnywhere MFT encrypt data at rest and in transit, complying with the highest data security standards (including the US’s and Europe’s HIPAA, HITECH, PCI DSS, SOX, and GDPR). MFT manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols such as SFTP, FTPS, and AS2 to send files securely, and encryption standards such as Open PGP and AES to protect data in transit and at rest. Advanced Threat Protection and Adaptive Loss Prevention add a further layer of defence. SFT Threat Protection enables safe collaboration with external parties, preventing malware from entering your organisation, and reducing opportunities for employees to lose or mishandle sensitive data. Local Expertise Ready to Help Generic Systems Australia are your local experts in Managed File Transfer and Advanced Threat Protection. We’ve assisted hundreds of organisations across the Asia-Pacific region to secure their data and keep cybercriminals at bay. If you’d like to discuss improving your cybersecurity, please feel welcome to contact me , Bradley Copson. I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. Previous Next