top of page

Search Results

117 results found with an empty search

  • Tame the File Transfer Time Sink | GSA

    < News Tame the File Transfer Time Sink 23 Oct 2023 When asked “How could you get more done at work?”, most people are quick to respond: “Fewer meetings, please!” However, research has revealed that other hidden time sinks may be an even greater drain on our personal productivity. For example: the amount of time lost while team members manually share files and data between themselves. A recent report found that a typical desk worker now uses 11 different applications to complete their tasks. during the course of their working day. According to research by Productiv , most company departments use between 40 and 60 different applications. Company-wide, that number sprawls to more than 200 apps. IT tools are designed to enhance our collaboration and productivity. But when different parts of a business adopt different tools, with different file formats, it opens up a black hole of time-wasting file translation and transference across the entire organisation. So, how can we help our employees spend more time productively contributing to the organisation, and less time on the drudge work of wrangling files…? Ideally, we can work to rein in the proliferation of apps across our organisations, standardising on a common set of enterprise IT tools. But that can be easier said than done. It takes time – and even some business risk – to wean teams off their familiar tools and train them on new ones. Until then, a Managed File Transfer (MFT) solution can help . With GoAnywhere MFT, data can be translated to and from a variety of widely-used formats without having to write cumbersome scripts or programs. Its comprehensive Extract, Transform, and Load features enable data values to be mapped, formatted and modified between source and target files automatically. Even better, GoAnywhere's secure collaboration features make connecting and sharing between employees easier and faster - even when they’re mobile. Features include an intuitive browser-based web client for performing ad-hoc file transfers, enterprise file sync and sharing using GoDrive, and a handy mobile application for moving files quickly while on-the-go. The benefits of using an advanced MFT like GoAnywhere continue well beyond the point where your team has happily standardised on common enterprise tools. The same flexibility and automations that enabled your team to eliminate their internal productivity time sink are just as useful in improving your interactions with customers and supply chain partners. Time to Tame This Time Sink? If you’d like to discuss how GoAnywhere MFT could help boost your organisation’s productivity and bottom line, please feel free to contact me ( bradley@gensys.com.au ) for an obligation-free discussion, or read more at Generic Systems Australia . Bradley Copson Business Manager Generic Systems Australia Previous Next

  • Top Cyber Security Agency Reports on Most Common Cyber Threats to Businesses | GSA

    < News Top Cyber Security Agency Reports on Most Common Cyber Threats to Businesses 3 Dec 2024 The latest annual report by Australia’s top cyber security agency – The Australian Signals Directorate (ASD) – contains sobering details about the challenges being confronted daily by Australian businesses. Describing the current cyber security strategy environment as “the most complex and challenging … since the Second World War”, the ASD says advancements in critical and emerging technologies dramatically improve the ability of cyber thieves targeting Australian organisations. Cyber Crime Increasing ASD received more than 36,700 calls to its Australian Cyber Security Hotline during the 2023-24 financial year - up 12% on the previous year. It responded to more than 1,100 cyber security incidents, and notified organisations of potential malicious activity on their networks more than 930 times. However, these numbers are merely the tip of the iceberg relative to the total number of attempted hacks. ASD characterised cybercrime as “a persistent and disruptive threat”. Contributing to the surge in cyber crime is the availability of new opportunities and technologies such as artificial intelligence. This is reducing the level of sophistication needed for cybercriminals to operate, and attracting new criminals to the field. Top Business Threats Compromised business email accounts (20%) and fraud (13%) were among the top self-reported cybercrimes for businesses and individuals in Australia during the last financial year. Online banking fraud accounted for a further 13% of incidents. Ransomware and data theft extortion (stealing data without encrypting their victims’ systems) also remained a pervasive and costly threat. The top 5 sectors reporting cybercrimes to law enforcement were: Retail trade (15%) Professional, scientific and technical services (13%) Construction (12%) Financial and insurance services (8%) Other services (7%) Average Losses by Businesses Interestingly, the average self-reported cost of cybercrime to Australian business fell slightly vs the previous financial year: Small businesses: $49,615 (down 8%) Medium businesses $62,870 (down 35%) Large businesses $63,602 (down 11%) However, it’s worth bearing mind recent research which shows a large number of businesses did not report ransomware payments in 2023-24. Cybercrime Reports by State and Territory Australia’s more populous states continue to report more cybercrime, with Queensland and Victoria reporting disproportionately higher rates of cybercrime relative to their populations. The highest self-reported financial losses were from victims in NSW (~$86,000 per cybercrime) followed by Victoria (~$66,000). Common Cybercrime Techniques The ASD says Credential Stuffing – using stolen usernames and passwords to access other services and accounts via automated logins – is one of the most common cyber attacks. Another common technique is Password Spraying - a brute-force attack where cybercriminals attempt to access a large number of accounts with commonly used passwords. Quishing - Quick Response (QR) phishing – is another growing threat. Cybercriminals use QR – for example, on a café menu, or a subtly altered public notice - to trick people into providing personal information or downloading malware onto their smart device. Combating the Threats In its report, ASD urges organisations to replace unsupported information and communications technology systems with secure-by-design products, and consider cyber security when implementing new technologies. Two great examples of secure-by-design protective technologies are those that we recommend at Generic Systems Australia. Managed File Transfer (MFT) is a technology which enables organisations to securely exchange data between systems and people in an automated, reliable and efficient way. Advanced Threat Protection adds a further layer of defence, seamlessly integrating your managed file transfers with adaptive data loss prevention to keep sensitive data secure. ASD also urges organisations to prepare a cyber security incident response plan and test it regularly to ensure an effective response and fast recovery. The process of developing such a plan will help an organisation understand the nature of its most valuable data, where it is stored, which systems and individuals have access to it, and how it is protected – or exposed to – malicious threats. Obtaining Expert Help At Generic Systems Australia , we have many years of experience helping Australian and New Zealand IT teams protect their valuable data with the very best MFT solutions. From the initial scoping of organisations’ legacy data transfer approaches, through zero-cost Proof of Concepts and hassle-free Migration Services , we help companies stay focused on running their business without disruption as we transition them to more secure approaches. If you’d like a to discuss how your cyber security can be boosted by MFT and layered defences, please feel welcome to contact me . I’m always happy to have an obligation-free discussion. Generic Systems Australia are your local experts in Managed File Transfer. You can view a full copy of The Australian Signals Directorate Annual Cyber Threat Report 2023-24 here . Previous Next

  • Cyber Target Paris Prepares | GSA

    < News Cyber Target Paris Prepares 23 July 2024 As the attention of sports fans turns to Paris this week, so too are the nefarious attentions of the world’s cyber criminals. So: how will the world’s largest sporting event keep its data and systems secure…? Read on to learn more from those charged with defending the Summer Olympics’ IT systems. Miscreant Magnet Vincent Strubel, head of France’s national cybersecurity agency (ANSSI), warned that this year’s summer Olympics was facing an unprecedented level of cyber threats. Said Strubel: “There will be cyberattacks during the Games and the Paralympics... Some won’t be serious. Some will be serious, but won’t have an impact on the Games. And perhaps there will be some that are serious and liable to have an impact on the Games.” Franz Regul, head of the cyber team responsible for Paris 2024, said he expects the number of security events this year to be “multiplied by 10 compared to Tokyo”. There is a need to keep an exceptionally tight attack surface and tie up any loose ends like SSL misconfigurations, open ports, and privacy issues such as cookie consent violations. French anti-cybercrime units have classified the cyber threats in five categories: 1. Amateur Hackers As the “as-a-service” cybercrime economy develops, it’s become easier than ever for novice threat actors to launch more sophisticated attacks than their limited skillsets would otherwise have allowed. This lowered bar for entry will lead to a higher overall number of attacks. 2. Thrill-Seekers The sheer size and popularity of the Olympic Games will tempt those broadly inclined to create nuisance or show off their “cyber chops” to their peers. They’ll likely seek to exploit any security weaknesses in the websites or booking sites purposed for the event, including those of media organisations and sponsors. Common website security attacks such as cross-site scripting, SQL injection, and DDoS attacks will be their primary threat vector. 3. Hacktivists Activists passionate for their cause of choice are likely to attempt to hijack the world’s largest stage. 4. Black Hat Thieves The immense cashflow around the Paris Olympics makes them a potentially lucrative target for cyber thieves. Phishing attempts – expected to arrive in the form of unsolicited emails about the Games, lodging, tickets, or information followed by “helpful links” – will abound. Those who open the emails and click on the links may find their bank accounts quickly compromised. 5. Nation-State Actors The Olympics have long been a huge world stage on which global powers send political signals to countries, governments, and the world at large. As the Associated Press recently noted, “Among the most threatening cyber-adversaries are countries who might want to embarrass and exact costs on France and the International Olympic Committee.” Defending the Games French cybersecurity authorities are cagey about the significant precautions they’re taking to thwart cyber criminals. Revealing too much would give away a tactical advantage to blog-reading Black Hats. However, here’s what we know so far… 1. Ethical Hackers The ANSSI has hired ethical hackers to test the attack vectors on all Olympic websites. According to Strubel, 500 sites, competition venues and local collectives have all been put under “friendly fire”. 2. AI Artificial Intelligence is being employed to test for multiple threats across IT systems and websites. Regul said that AI was helping differentiate “between a nuisance and a catastrophe”. 3. Physical Security Transportation, supply chains, and surveillance systems are other potential targets for those seeking to compromise the Games. All have been included in the safety perimeter of the Paris 2024 cybersecurity preparations. 4. External Expertise The 2018 Winter Olympic Games were targeted by malware dubbed “Olympic Destroyer”, which aimed to disrupt the opening ceremony. Paris cybersecurity teams have tapped the knowledge and experiences of the consultants who detected and disabled that threat. A Bug Bounty program has also sought to attract the time and skills of independent IT practitioners. 5. Education & War Gaming During the past two years, ANSSI has been “war gaming” cyber incidents with the International Olympic Committees’ IT partners, and deploying cyber defence education programs across the thousands of people responsible for operating the Paris Games’ IT systems. No News will be Good News The final word on Paris’s cyber preparations belongs to Jérémy Couture, who helms the official cybersecurity hub of the Paris Olympic games. Couture said his dream for the Olympics is that technology and cybersecurity won’t be talked about - because that will mean they were a non-issue. Sports fans around the world will be hoping his dreams become reality. Need a Local Expert? If – like the Paris Games - you’d like to tap local expertise keep cyber criminals at bay, please feel welcome to contact me, Bradley Copson ( mailto:bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. #MFT #managedfiletransfer #securefiletransfer #sft #cybersecurity #datatransfer Previous Next

  • Rate Rise Should Spur Rethink | GSA

    < News Rate Rise Should Spur Rethink 13 Nov 2023 Following the Reserve Bank’s decision to further hike interest rates, it’s timely for business leaders to explore how they can minimise any negative impacts on their companies. Rowan Tracey, Partner at HLB Mann Judd , Australian businesses would need to “find efficiencies and cut operating costs”. “The Reserve Bank’s decision … will impact business margins, particularly small to medium businesses with high debt and low capital. The natural reflex for businesses is to raise prices to even out the balance sheet, which would be fine in a more buoyant economy. (But) rising fuel prices and cost of living already has many scrambling to find ways of cutting costs, including their current expenditure.” Rowan offers these alternative suggestions to businesses wanting to maintain margins without imposing price hikes: 1. Improve Productivity & Efficiency: Review processes and output and look at ways to improve or streamline your operations, such as automation of processes including business software. 2. Strategically Cut Costs: Review your current service providers and contracts and compare to the current market. 3. Revisit Your Banking & Financial Products: Look beyond the short-term and make sure the interest rate on your business loans is competitive. 4. Develop a Pricing Strategy : Look at ways to leverage or bundle existing goods and services. 5. Reconsider Your Supply Chain : Consider reducing risks by finding a domestic supplier to slash the costs of freight and storage. 6. Review Workforce Arrangements: Consider offering flexible work arrangements, nine-day fortnights, and training and development opportunities - particularly those subsidised by government. One way to address Item #1 (“Improve Productivity and Efficiency”) is to reconsider how your business transfers data. Moving data – between employees, with customers, and with your supply chain partners – is now a “core process” for every modern business. That makes it a target for improving efficiency and productivity. A Managed File Transfer solution, such as GoAnywhere MFT, is more cost-effective and efficient than having your staff waste time on old-fashioned and risky manual approaches. In fact, a study by Aberdeen Group found that businesses which invested a little in a professional Managed File Transfer solution had a median return of almost 500 times their investment! Generic Systems Australia are your local experts in file transfer technologies. Contact me if you’d like an obligation-free discussion , no cost trial, or Proof of Concept showing how GoAnywhere could boost your business’s productivity. Previous Next

  • How MFT Monitors and Protects Your Organisation’s Vulnerable Edge Devices | GSA

    < News How MFT Monitors and Protects Your Organisation’s Vulnerable Edge Devices 11 Mar 2025 The Australian Signals Directorate (ASD) has urged Australian organisations to ensure they employ effective logging and monitoring to detect potential threats on network edge devices. Edge Devices Edge devices are critical network components positioned at the periphery of an organisation’s internal network (i.e. "the edge"). They’re the critical interface between the organisation and the internet, performing essential functions such as managing data traffic, enforcing security policies and enabling seamless communication across network boundaries. The most common edge devices across enterprise networks include enterprise routers, firewalls and VPN concentrators. Every organisation with a connection to the internet has at least one edge device. Edge Vulnerability Because edge devices they can access other assets on the organisation’s network, they’re an appealing target for cyber criminals. Failing to secure them is like leaving a door open from the internet to internal networks. Once inside, hackers can access sensitive data and disrupt business operations. As they perform their important task in the background, it can be easy to overlook the security vulnerabilities that edge devices present. And the more edge devices an organisation uses, the greater the potential “threat surface”, and the greater challenge for IT staff to keep them secure. Compromised edge devices can lead to data loss, intellectual property loss, financial loss, business disruption, reputational damage and legal liabilities. Maintaining The Edge The ASD says that, to protect their edge devices, organisations should focus on: • capturing high-quality logs • centralising logging in real time, and • securing event log storage. Automated Logs, Auditing and Reporting Managed File Transfer (MFT) technology has a key role to play in monitoring data transfers, both within an organisation and to the outside world. Leading MFT solutions such as GoAnywhere MFT automatically compile comprehensive audit reports of file transfer activity. All file transfer activity is securely stored and easily searched. Reports and alerts can be automatically emailed to cyber security staff, who can instantly check files are only being sent where they should go, and by people appropriately authorised to send and receive them. Further, any organisations required to report on file transfer activity can use GoAnywhere’s logs to comply with their industry’s cyber regulations. Heeding the ASD’s Advice At Generic Systems Australia, we have decades of experience helping Australian and New Zealand organisations take advantage of the security and efficiency that MFT provides. And our Migration Service makes the transition even easier for busy businesses who’d rather spend their time focusing on their customers than their IT systems. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch . Previous Next

  • Black 'Fileday' | GSA

    < News Black 'Fileday' 29 Nov 2023 Australian shoppers were tipped to spend $6.36B across the Black Friday weekend, according to the Australian Retailers Association.The surge in sales has in turn created a tsunami of data transfers, as businesses share orders, files and information with their supply chains.For some businesses, it will be a stressful period. But others - those who entrust their file transfers to GoAnywhere MFT - will surf the data tsunami with ease, as GoAnywhere conveys all their valuable files reliably and securely.(And of course, our local technical team at Generic Systems Australia will always be on hand to share our unparalleled MFT expertise with our customers.) Previous Next

  • Top 10 Tips for Advanced MFT Workflows | GSA

    < News Top 10 Tips for Advanced MFT Workflows 7 Feb 2024 Improve Business Processes with GoAnywhere’s Advanced Workflows One of the most advanced features of GoAnywhere MFT is also one of its most popular – Advanced Workflows. Workflows (also called “Projects”) expand and unlock superior automation for your file transfers. They enable you to enhance encryption, strengthen security capabilities, and run tasks seamlessly without human intervention. Those already using Advanced Workflows know how much time and effort this feature can save. It takes the drudgery out of moving data between applications, between employees, and within their supply chain ecosystem. Whether you’re in search of new tips and tricks, or just getting started with Advanced Workflows, this article will help you tap the potential of GoAnywhere MFT. 1. Create Projects with No Programming Skills You don’t need to be a technical genius or have any programming skills to create Advanced Workflows. GoAnywhere’s Project designer window couldn’t be any easier to use. It’s drag-and-drop interface puts over 100 unique tasks – copying, translating, moving, backing up, alerting, reporting, etc - at your fingertips. No clunky scripting is needed. 2. Configure Advanced Worksflows Resources Resources are an essential function and act as GoAnywhere’s “arms” or “client”. Configuring resources to network locations, email servers, and file transfer servers saves you time as you create your Advanced Workflows. Do it once, and you can use those resources in all your Projects. There are more than 20 different resource types for GoAnywhere to connect to, such as Amazon S3 Buckets, Azure Blob Storage, and SSH servers (SFTP, SCP, SSH). These pre-defined connections for internal servers, as well as external trading partners and locations, make it simple to build Projects which manipulate and move files. 3. Translate Data into Different Formats Advanced Workflows comes with 15 tasks for data translation. They enable you to read and write files in multiple different formats, and seamlessly translate between them. They include: Read/write CSV, Excel, Fixed-Width-XML, JSON Read flat file SQL query output to various formats Modify RowSet 4. Automate File Encryption/Decryption With cybercriminals increasingly targeting company data, most businesses believe it’s critical to encrypt data when its being transferred. GoAnywhere makes this as simple as it is important. With Advanced Workflows you can completely automate the process of encryption and decryption, for everything from documents to digital signatures and verifications. All of it is done with the robust Open PGP standard. 5. Create and Use Conditional Statements Conditional statements offer excellent control of Workflows within your Projects. Using common “if/else” logic and loops, they can parse through variables or lists of files. By chaining Advanced Workflows tasks together, they perform their tasks when the Workflow runs and prior conditions are “true.” 6. Reference Projects as a Common Function Projects you create can be called or referenced by multiple Projects. This enables commonly performed tasks to be utilised in multiple Projects in the manner of a common function or utility. 7. Run Workflows in Debug Mode Running Workflows in Debug Mode enables easy testing and troubleshooting of individual Projects. Users can interactively execute tasks one step at a time, and enable the job log and variable values to be monitored during each step. At each break in time, the values of the variables can be altered before the next task is executed. 8. Schedule and Automate GoAnywhere Reports Advanced Workflows can be used to schedule and automate reports. Reports can be generated and delivered, and email and text notifications sent. GoAnywhere’s built-in scheduler can be used to execute Workflows at future dates and times. Projects can be scheduled to run on a one-off basis, or with a recurring frequency. 9. Control Data Security with Triggers Triggers enable you to control the security of your data. They can automate Projects, send notifications based on user actions in GoAnywhere, and much more. Triggers can be defined to monitor for certain events such as an account being disabled, a download failing, or a successful login. A triggered event can initiate a response such as receiving an email when a file is uploaded by a trading partner or automatically removing a partial file from a folder if the file upload is unsuccessful. 10. Monitor Files for Determined Events Advanced Workflows can do file-based monitoring for certain events. These events include: Created Modified Deleted, and Exists. If you’d like to explore how your organisation can improve its efficiency through GoAnywhere ’s Advanced Workflows, feel free to contact our Business Manager, Bradley Copson (mail to: bradley@gensys.com.au ). He’s always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. Generic Systems Australia Your Local Experts in Secure Managed File Transfer Previous Next

  • Cybersecurity Insiders Reveal Their Top Fears | GSA

    < News Cybersecurity Insiders Reveal Their Top Fears 29 May 2024 A survey by Fortra has revealed cybersecurity insiders’ top concerns for the remainder of 2024. Top Concern: Phishing and Smishing (81%) Phishing is tricking individuals into clicking on malicious links in emails or on the web to steal logins, passwords, or personal information. Smishing is a text-based version of phishing, with scammers posing as trusted companies to get individuals to reveal sensitive or personal information such as credit card numbers or passwords. Concern 2: Ransomware and Malware (76%) Ransomware is software designed to hold information hostage until a payoff is made. Malware is intrusive software hackers use to steal data or to damage computer systems. Concern 3: Accidental Data Loss or Leakage (63%) Concern 4: Social Engineering (55%) Social Engineering is the tactic of manipulating, influencing, or deceiving a victim to gain control over a computer system, or to steal personal and financial information. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information. Concern 5: Third-party exposure (52%) Industry insiders are also increasingly concerned about cybercriminals leveraging Artificial Intelligence to bolster their efforts. Proactive, Layered Defences Organisations with a proactive strategy for storing, transferring and securing their data are best-placed to keep cyberthieves at bay. And those which take a layered approach - secure file transfer, secure content engines, secure digital rights management, and employee education – are leading the way in preventing data breaches. At Generic Systems Australia, we recommend the class-leading secure managed file transfer solution, GoAnywhere MFT, to help organisations tackle the risks that can come with exchanging data. When coupled with our Threat Protection bundle, organisations can more safely collaborate without exposing systems to the risks of malware even entering your organisation in the first place. Here’s how SFT Threat Protection helps mitigate risks: Stops malware from entering your environment by scanning all inbound file transfers: GoAnywhere’s anti-virus protection delivered through the Secure ICAP Gateway is unique in its ability to deny the file ever being written to disk if it contains malware. Blocks files with sensitive data from being shared: Files containing PII (personally identifiable information) or other sensitive data identified by the organisation’s policies are prevented from being transferred. Redacts sensitive data from being shared: Embedded malware, triggered executables, or macros that could hold sensitive data hostage are detected and automatically stripped out of content to be shared via MFT. Content “sanitised” in this way is then permitted to be transferred so that business continues uninterrupted. On-Prem, in the Cloud… and in Between 64% of cybersecurity insiders surveyed said that hybrid cloud was their preferred IT operating environment. A combination of an on-premises/private data centre, and public cloud service provider, is seen by many to provide the best of both worlds. Utilising this approach, the most sensitive data can be maintained inside the organisation. In fact, some organizations are bound by compliance requirements to maintain an on-premises footprint to some degree. Unfortunately, not all cloud-first developed solutions can deftly manage the interface between on-premises and cloud transfers. A comprehensive secure file transfer solution, GoAnywhere MFT is deployment-flexible, executing the on-premises/cloud interface seamlessly. It maintains security and control of data transfers between organisations and their trading partners. --- If you’d like to discuss how a secure Managed File Transfer solution can help you keep the cybercriminals at bay, please feel welcome to contact our Business Manager, Bradley Copson ( mail to: bradley@gensys.com.au ). He's always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. At Generic Systems Australia, we’re your local experts in secure Managed File Transfer. Previous Next

  • "Flip the Scripts" ... and Transfer Files Efficiently | GSA

    < News "Flip the Scripts" ... and Transfer Files Efficiently 20 Oct 2023 Replace Risky File Transfer Scripts with GoAnywhere MFT Once upon a time, writing scripts to partially-automate the transferring of files was “good enough”. However, technology has moved on. With cybersecurity threats multiplying and businesses focused on improving productivity, script-based file transfers just aren’t cutting it anymore. Why Replace File Transfer Scripts? Scripts aren’t secure . For example, user credentials aren’t encrypted, putting your entire system at risk. Scripts lack advanced features . For example, automating file transfers with FTP requires adding a second solution, a time-consuming and complex prospect. It’s also difficult to build in re-try features, and lock down how users interact with sensitive data. Scripts don’t play well with new tech . For example, modern cloud-based computing environments require file transfers to be integrated with cloud-based solutions, and platforms such as Azure and AWS. Scripts can be time consuming . Developing, maintaining, and troubleshooting scripts takes time, distracting valuable support staff from more important things. Worse, if they’re not available when a script fails, it bottlenecks your workflow. Scripts don’t have logging built in . All logging needs to be built into your scripts. Accessing those logs can be time consuming and difficult, requiring an effective filter and search tools. The Benefits of Replacing Homegrown Scripts As well as increasing the security of your file transfers, moving away from scripts provides your organisation with many other advantages: Centralise workflow . Instead of using multiple different tools, programs, and scripts to encrypt, send, and automate your file transfers, GoAnywhere MFT enables all of these from a single interface. That significantly streamlines day-to-day operations and reduces wasted tool maintenance time. Automate . No matter the volume of files to be transferred across your business and supply chain, GoAnywhere enables your team to spend time focusing on other things. Comply with regulations . By logging file transfers and access across your organisation, GoAnywhere MFT proves your compliance with legal requirements, such as data privacy and encryption. Those logs are also very handy if you’re conducting an audit, or forensics on an internal security breach. The Far Better Alternative GoAnywhere is the industry’s leading Managed File Transfer solution. It ensures data is transferred securely - both internally and externally – and accelerates your team’s productivity. If you’d like to learn more about how GoAnywhere MFT could add to your organisation’s bottom line, please feel free to contact me ( bradley@gensys.com.au ), or read more at the Generic Systems Australia website . Bradley Copson, Business Manager, Generic Systems Australia Previous Next

  • Email Overload Creating Cyber Complacency in Australia | GSA

    < News Email Overload Creating Cyber Complacency in Australia 23 Oct 2024 Australians send and receive 8.1 billion emails each day. That makes us the 10th most prolific emailers in the world. And that’s a problem . It’s not just the inbox clutter we’re experiencing (or perhaps, contributing to). It’s the cyber security complacency it’s creating. You see, email continues to represent the single biggest threat to your organisation’s cyber security. The more emails we receive, the greater the risk that a cybercriminal will gain access to your organisation’s data and secrets. Proven Danger Real world tests have proven that the threat posed by Australians’ “email encumbrance” is real. Proofpoint conducted 183 million phishing simulations earlier this year. They observed that almost one in six recipients of a suspicious phishing email failed to protect their organisation’s valuable data. Recipients variously clicked malicious links, succumbed to a bogus password reset, or downloaded ransomware. What leads employees to fall for phishing and malware…? It’s “breach fatigue” – employees who have become complacent and careless about cybersecurity. Cyber Complacency Professor Sanjay Jha, UNSW Lead of the Cybersecurity Cooperative Research Centre, said: “It’s human nature that you start to just get used to certain things. (But) phishing attacks continue. In fact they are getting ever more innovative.” He urged companies to do more to keep personal data safe from hackers. “The problem is that ICT systems are very complex and every day new applications are deployed, and new information is stored and exchanged.” Whole-of-Enterprise Email Protection With escalating email volumes creating a high and persistent risk of cyber incursion, organisations need a systematic way for employees to securely and reliably exchange files and emails with external third parties. Thankfully, there are technical safeguards you can put in place to prevent your employees from accidentally - or negligently, or maliciously - allowing cyber criminals in. Not only will they help protect your organisation from cyber criminals, as a bonus, they’ll also improve your employees’ efficiency. Our SFT Threat Protection Bundle enables your organisation’s email system to automatically detect and prevent phishing links and other malware from entering your organisation. Better still, it can also automatically detect and prevent employees from sharing malware or sensitive information. Active Threat Protection If an employee - knowingly or unknowingly - attempts to share a file containing malware, the files are intercepted and “sanitised”. That is to say: their malicious elements are automatically removed. The SFT Threat Protection Bundle can also go a step further and automatically detect and prevent employees from sharing sensitive information. For example, let’s say a folder has Word or PDF documents, or Jpeg images, which contain Personally Identifiable Information. If an employee attempts to transmit any of these files, a secure ICAP gateway will automatically inspect and block the transfer. Or if you prefer, the gateway can be configured to automatically redact (i.e. mask out) sensitive information from documents and image files while still permitting the remainder of the file to be shared. Free Demonstration If you’d like to see first-hand how our SFT Threat Protection Bundle can help keep your organisation’s data safe, and help beleaguered employees keep their guards up, why not get in touch and have an obligation-free chat with me? At Generic Systems Australia , we’re your local experts in secure managed file transfer. PS: In the three minutes it took you to read this article, almost a billion new emails were sent around the world - many of them to and from Australians! Previous Next

bottom of page