top of page

Search Results

192 results found with an empty search

  • Time for a Summer Software Deal? | GSA

    < News Time for a Summer Software Deal? 1 Dec 2023 It's December, and many Australian businesses will soon start winding down ahead of well-deserved holidays.But did you know, this can also be a great time to negotiate a sweet deal on an enterprise software solution?Much of the world's enterprise software is sold by US-based companies, who follow a calendar accounting year. December is the final month for them to achieve their full-year sales targets, stretch bonuses, etc . So: strike while the iron - and season - is hot... Use your negotiating advantage to squeeze a special deal on that new software solution you've been eyeing.Of course, if that solution happens to be GoAnywhere MFT - the world's leading Managed File Transfer solution - then reach out to me, and we can apply the summer squeeze together! 😉 Previous Next

  • 'Twas the Week Before Christmas... | GSA

    < News 'Twas the Week Before Christmas... 16 Dec 2024 Previous Next

  • Black 'Fileday' | GSA

    < News Black 'Fileday' 29 Nov 2023 Australian shoppers were tipped to spend $6.36B across the Black Friday weekend, according to the Australian Retailers Association.The surge in sales has in turn created a tsunami of data transfers, as businesses share orders, files and information with their supply chains.For some businesses, it will be a stressful period. But others - those who entrust their file transfers to GoAnywhere MFT - will surf the data tsunami with ease, as GoAnywhere conveys all their valuable files reliably and securely.(And of course, our local technical team at Generic Systems Australia will always be on hand to share our unparalleled MFT expertise with our customers.) Previous Next

  • Moving on from MOVEit | GSA

    < News Moving on from MOVEit 20 Oct 2023 Your Choice of MFT Matters Many organisations across the Asia-Pacific region are replacing their outdated MOVEit-based Managed File Transfer (MFT) systems with Forta’s advanced GoAnywhere suite . In this article, I’ll explain why. There are plenty of options when it comes to selecting a file transfer solution… from free, unsecure methods to the fully-featured marketplace leader. But as cybercrime has continued to surge, companies have increasingly realised how essential it’s become to secure their data transfers, maintaining a ‘circle of trust’ with their customers and supply chains. Additionally, companies have been searching for ways to boost their bottom lines through greater efficiency. The true cost – in terms of lost productivity - of outdated manual file transfer approaches has come into sharper focus. Business leaders are realising that their MFT solutions, which may have once met historic needs, are no longer enough . Superior Security Recent cybersecurity incursions make “Robust Security” top of mind for those seeking a better MFT solution. GoAnywhere MFT takes all aspects of data security seriously, protecting your sensitive data both “in motion” and “at rest”. Maintaining GoAnywhere’s security and compliance product leadership is a primary focus for its development team, who stay across the latest security standards to ensure up-to-date compliance with regulations, frameworks, and standards. Beyond Windows Organisations managing multiple operating systems soon encounter the constraints of MOVEit’s Windows-only solution. GoAnywhere flexibly supports any protocol, any platform, and any deployment, including Microsoft Azure, AWS, Linux, and more. The Need for Speed Included in GoAnywhere is GoFast, a file transfer acceleration protocol which can transmit data considerably faster than traditional FTP. The patented technology in GoFast takes the best of UDP’s speed and adds reliability and rate control, providing GoAnywhere with speed MOVEit can’t match. Drag & Drop Workflows Scripting – as required by MOVEit for some tasks - is clunky, time consuming and confusing for non-expert users. Through its breadth of Automated Workflows capabilities, GoAnywhere enables end users to quickly and easily build workflows. Manual and automated tasks can even be combined into one master workflow. Further, GoAnywhere provides easy reporting on partner Service Level Agreements, alerting you to any workflow issues before your trading partners do. Easy Centralised Control MOVEit requires you to install two products (MOVEit Automation and MOVEit Transfer) to enable full MFT functionality. Most users prefer GoAnywhere’s centralised, browser-based dashboard - an intuitive “one stop shop” for managing file transfers. Advanced Auditability GoAnywhere not only moves and shares data securely, it also provides full auditability of transfers. Logging full audit trails of all user events and file activity, it can also generate reports of file transfer activity, user statistics, and completed jobs – all from within its central management console. And.. Beyond the advantages above, former MOVEit users are often delighted to discover GoAnywhere’s advanced capabilities in: High availability and clustering, providing true active-active support and load balancing to distribute workloads across multiple systems; Remote agents - lightweight applications managed through the GoAnywhere interface which enable configuring and scheduling of file transfers throughout an enterprise; and Secure Forms - customised forms or files that which contain data other tasks can automatically process. Want to see a Better MFT in Action? If you’d like to discuss how GoAnywhere could help boost organisations’ security, efficiency and bottom line, please feel free to contact me ( bradley@gensys.com.au ) for an obligation-free discussion. Bradley Copson Business Manager Generic Systems Australia Previous Next

  • New Cyber Laws Passed – What Australian Businesses Need to Know and Do | GSA

    < News New Cyber Laws Passed – What Australian Businesses Need to Know and Do 27 Nov 2024 Earlier this week, the Australian Parliament passed a suite of legislative reforms designed to enhance Australia’s cyber security. The reforms include a raft of new requirements and obligations on Australian businesses. About the Legislation Based on recommendations by the Parliamentary Joint Committee on Intelligence and Security, the new legislation addresses a number of proposals initially set out in Australia’s 2023 – 2030 Cyber Security Strategy, and spans three separate Acts: 1. the Cyber Security Act 2024 (Cyber Security Act); 2. the Intelligence Services and Other Legislation Amendment (Cyber Security) Act 2024 ; and 3. the Security of Critical Infrastructure and Other Legislation Amendment (Enhanced Response and Prevention) Act 2024 (SOCI Amendment Act). Mandatory reporting of ransom payments, and the introduction of a new voluntary information sharing regime, will have the most immediate impact on organisations. Mandatory Reporting of Ransomware Payments Ransomware attacks are rife across Australia. The Australian Signals Directorate (ASD) reported that this form of cyber extortion accounted for 11% of all cyber incidents to it in 2023-2024, up from 8% in the previous year. The Government had previously pursued a ban on ransom payments. However, its position has since moderated somewhat. The Cyber Security Act only requires organisations to report ransomware payments to the Department of Home Affairs and the ASD. This new reporting obligation will commence at latest six months after the Act receives royal assent (potentially earlier by proclamation) and applies broadly to: · organisations which are a responsible entity for a critical infrastructure asset; and · other private sector organisations which conduct business in Australia with an annual turnover exceeding a threshold (to be specified - likely to be A$3M). Ransomware reports are required to be made within 72 hours of making a payment (not the receipt of a demand or the discovery of a ransomware attack). Difficult Decisions The requirement to report payments will need to be taken into account by Boards when considering whether to pay a ransom. The Government’s general view on ransoms continues to be that organisations should not pay them. It reasons that payments don’t guarantee the recovery or confidentiality of stolen data, but do encourage cyber attacks to proliferate. Organisations in receipt of ransom demands are left to ponder several competing considerations… · Paying a ransom could potentially contravene sanctions (such as the one imposed on Aleksandr Ermakov, the individual responsible for the 2022 Medibank data breach) or anti-money laundering laws. · Company Directors fulfilling the duty of care to act in the best interests of their organisation will need to balance the risks of payment - commercial damage, incentive to re-target, uncertainty of data recovery – against the risks of not paying - loss of systems data, reputational damage, third party claims, lost customers and business disruption. If a ransom payment is made, then the new mandatory reporting obligation will be in addition to other applicable reporting requirements an organisation is subject to. These could include the Privacy Act 1988 , the SOCI Act , and continuous disclosure obligations under the ASX Listing Rules and CPS 234. In fact, it’s important that Cyber Incident Response plans developed by organisations specifically address these overlapping requirements, taking into account the various regulators and timeframes of each. Be aware that, for any entities regulated under the SOCI Act , it’s also conceivable that the Government could use its directions power to direct an entity to pay - or not pay - a ransom. An organisation which fails to comply with mandatory ransom reporting will incur a civil penalty of 60 penalty units (currently A$93,900). Voluntary reporting regime A new National Cyber Security Coordinator (NCSC) is being established under the Cyber Security Act to lead a whole-of-government response to significant cyber security incidents. The Act provides a framework for the voluntary disclosure of information by any organisation operating in Australia, or any responsible entity under the SOCI Act , to the NCSC relating to cyber security incidents. However, it imposes various limitations on how the NCSC may further use and disclose information voluntarily provided by entities, depending on the significance of the incident. Non-significant cyber security incidents: Information can be used for limited purposes such as directing the reporting entity to assistance services, coordinating a government response, and informing Ministers. Significant cyber security incidents: Information can be used for broader ‘Permitted Cyber Security Purposes’. These include preventing or mitigating risks to critical infrastructure or national security, and supporting intelligence or enforcement agencies. A cyber security incident is deemed “significant” if: there is a material risk that the incident has seriously prejudiced, is seriously prejudicing or could reasonably be expected to prejudice the social or economic stability of Australia or its people, the defence of Australia or national security; or the incident is, or could reasonably be expected to be, of serious concern to the Australian people. Information voluntarily provided by organisations to the NCSC is subject to limited use protections similar to those which apply to information disclosed as part of a ransomware payment report. The new voluntary reporting regime and corresponding limited use protection has come into immediate effect. Limited use protection The Cyber Security Act outlines how businesses should work with the NCSC and other government agencies to obtain assistance and guidance when responding to cyber incidents. It also provides businesses with certain limited use protections when collaborating with the government’s cyber security agencies - a legislative foundation for the CISA Traffic Light Protocol government agencies have recently offered when assisting organisations. Such protections were requested by business lobby groups. They provided feedback during the public consultation period that disclosing information about a data breach could risk exposing an organisation to further regulatory or enforcement action, adverse publicity and litigation. Further, if disclosing a cyber incident was determined to be against an organisation’s best interests, its directors could potentially be in breach of their duties in approving the disclosure. That could in turn expose directors to enforcement action from ASIC. Counterweighing these concerns, the Government believes that sharing information on current threats and incidents can help other organisations avoid similar incidents. In balancing these competing interests, the Cyber Security Act limits the purposes for which information contained in a ransomware payment report or voluntarily report provided to the NCSC can be used or disclosed. The NCSC (and any Government agency it coordinates with) cannot record, use or disclose the information provided for the purposes of investigating or enforcing or assisting in the investigation or enforcement of any contravention of a Commonwealth, State or Territory law. An important exemption from the limited use protections are that crimes and breaches of the limited use protections created by the Act. In this way, the protections stop short of being a full “safe harbour”. Information provided under these protections isn’t admissible in evidence against the disclosing entity, including criminal, civil penalty and civil proceedings (including a breach of the common law). And the provision of information to the NSCS does not affect any claim of legal professional privilege over the information contained in that information. These limited use protections will be of value to organisations disclosing information to the Government about cyber incidents. However, directors should bear in mind the notable gaps in the protection they provide. For example: Information provided can’t be used or disclosed for the purposes of investigating or enforcing any contravention by the reporting entity of another law (whether federal, state or territory), other than a law that imposes a penalty or sanction for a criminal offence. This means that if the ransomware report indicates that a payment was made in breach of relevant sanctions laws, then the limited use protection will not prevent the use of the report in a subsequent investigation or enforcement action. While information provided to the NCSC cannot be obtained from the NSCS by regulators or government agencies, the protection offered under this Act does not prevent regulators from obtaining the underlying information through other means, including via regulatory investigatory powers or where provided under other mandatory reporting regimes, such as those in the Privacy Act 1988 , the SOCI Act, the Telecommunications Act 1997 and the ASX Listing Rules continuous disclosure obligations. So, cyber incident notifications provided to the ACSC under the SOCI Act are not captured by the limited use protection, even if that information is also voluntarily provided to the NCSC or detailed in a mandatory ransomware report. A similar limited use protection has been introduced via the Intelligence Services and Other Legislation Amendment (Cyber Security) Act 2024 for cyber incident information voluntarily shared with the ASD. Other Inclusions in the Legislation This article has focused on developments within the new Cyber Security legislative reforms which will most impact companies and organisations. However, in the interests of completeness, here is a brief overview of other key developments covered in the legislation: Mandated Security Standards for Internet of Things (IOT) Devices. These standards will be detailed in legislative rules, with suppliers required to provide a statement of compliance for devices supplied to the Australian market. New Cyber Incident Review Board. This independent advisory body will be empowered to conduct no-fault, post-incident reviews of significant cyber security incidents and provide recommendations and information to both the private and public sector. It will have the power to compel entities to provide information about significant cyber security incidents. Critical Infrastructure definition expanded. Data storage systems which hold business critical data have been added to the definition of critical infrastructure assets. This closes a gap in the regulations which became apparent in the aftermath of the Optus and Medibank data breaches. Expanded Incident Response Powers. The Government will now have the power to direct an entity to take, or not take a specific action, in the event of a cyber incident affecting critical infrastructure. Security and incident notification obligations moved from the Telecommunications Act 1997 to the SOCI Act , consolidating the cyber obligations of telecommunication carriers and carriage service providers under a single piece of legislation. What Organisations Should Do Cyber security response plans should now be reassessed and upgraded to ensure they align to the new mandatory ransomware reporting requirements. Playbooks and procedures should take account of how an organisation plans to engage with cyber security authorities, bearing in mind the extent - and limitations - of the defined limited use protections. Focus on preventing cyber incidents - not just responding to them . A Managed File Transfer (MFT) solution such as GoAnywhere MFT can encrypt data at rest and in transit, complying with the highest data security standards. It manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols and encryption to protect your data. Advanced Threat Protection and Adaptive Loss Prevention add a further layer of defence. SFT Threat Protection facilitates safe collaboration with external parties, helping to prevent malware from entering an organisation, and reducing the risk of employees losing or mishandling sensitive data. Finally, organisations should seek professional legal counsel in determining and responding to their obligations and responsibilities under the new Cyber Security legislative reforms. The information provided in this article has been general in nature, and the interpretations and advice outlined above should not be interpreted as professional legal advice. Previous Next

  • Use APIs to accelerate your MFT’s ROI | GSA

    < News Use APIs to accelerate your MFT’s ROI 26 Nov 2024 Leveraging APIs alongside your Managed File Transfer (MFT) solution is a great way to boost the return on investment from your MFT, and scale its deployment more broadly across your organisation. Here’s how to use APIs to add further automation, integration, scalability, and customisation to your MFT. APIs…? APIs (Application Programming Interfaces) help software applications communicate with another. Enabling APIs with a robust MFT solution is a simple way to add new functionality to your data transfer software, and accelerate the productivity and efficiency gains it offers. APIs will help you integrate your organisation’s data transfers with the many applications your organisation already use daily - CRM platforms, business intelligence tools, ERP systems and more. In doing so, you can synchronise data across your organisation and provide your team with more secure collaboration. Flexible MFT solutions that support APIs also enable you to further customise and automate your file transfers for your unique business and operational needs. Enhanced Security Of particular value is the way APIs can boost an organisation’s cyber defences by integrating their MFT solution with other data-centric security systems. For example, Generic Systems Australia’s Advanced Threat Protection Bundle layers an organisation’s protective measures with the security features of Fortra’s GoAnywhere MFT to further secure sensitive data. The added flexibility to evolve and scale as your needs change can be a game changer for IT teams seeking to maximise user experience and organisational ROI. Better Workflows Automated file transfer workflows can be “supercharged” using APIs. Here are seven specific API features and techniques organisations can leverage to maximise the value they derive from their managed file transfer solution. In each of these examples, we’ll feature API integration with GoAnywhere, the independently-assessed class-leading MFT. GoAnywhere not only provides APIs, it can also consume third-party APIs, and act as middleman, or API gateway, between other applications. 1. RESTful API An interface used by two computer systems to securely exchange information over the internet, REST (Representational State Transfer) can be used to manage users, groups, triggers, projects, and schedules. This simplifies new user onboarding and migrating systems and environments. For example, you can use the REST API to create a new web user programmatically and eliminate the manual tasks often needed for on-boarding new trading partners. You can also start/stop file transfer jobs and query the status of active jobs. 2. REST Enable a Secure Form Within the GoAnywhere dashboard you can select REST Enable Secure Forms to trigger more complex API calls on the backend of Advanced Workflows . Then, using standard REST calls you can invoke the secure form and its underlying project. Rest Enabled Secure Forms can also act as a REST API gateway to computing resources normally not available to public internet users. The GoAnywhere server can be deployed on the secure network and the solution’s Secure Gateway can act as the link to the public internet in the DMZ. An administrator can enable curated access to internal REST APIs that would normally be available only via VPN or by a dedicated network connection. Comprehensive audit logs and fine-grained user access controls can turn GoAnywhere MFT into a complete API gateway. The Method createPayload (GET https://localhost:6443/rest/forms/v1/ticket/payload ) will insert the payload. The Method uploadAttachments (POST https://localhost:6443/rest/forms/v1/ticket/payload/ :payloadId /file ) will upload one attachment at a time. The Method submitPayload (POST https://localhost:6443/rest/forms/v1/ticket/payload/ :payloadId /submit ) will submit the payload. The Method downloadAttachment (GET https://localhost:6443/rest/forms/v1/ticket/payload/ :payloadId /file/ :fileId ) will download one attachment at a time. 3. GoAnywhere HTTPS You can use GoAnywhere HTTPS project tasks to automate file transfers, create Secure Mail Packages, or programmatically place files in Secure Folders for uploading or downloading For example, if you need to send a large, automatically generated report to a user, you can enable the GoAnywhere HTTPS Send Package task in GoAnywhere. Simply create a project to automatically pick a file (or files) and send a package as a link via Secure Mail. You can protect that package with a password, track the number of downloads, or prevent further downloads after 24 hours. Another GoAnywhere HTTPS task is the ability to set up programmable uploads to GoDrive, a solution which provides Enterprise File Sync and Sharing (EFSS) services for employees and partners. 4. Quick Uploads Enabling Quick Uploads in HTTP Service enables you to turn GoAnywhere into a REST endpoint for file exchange. Quick Uploads (which requires a POST Method with Authentication) allows the solution to upload files to GoAnywhere via REST, effectively turning your GoAnywhere Secure Folders feature into a REST-enabled file exchange gateway. REST-enabled file exchange is very useful for other applications to have a place to store and exchange files. The end users don’t really know what is happening under the hood, but it allows application developers to provide lots of flexibility and build easy-to-use applications. 5. Project Run Mode You can start a project in the background in the dashboard's triggers, schedules, and within the project designer’s Call Project task. For example, if you need to start a long-running job, you simply start a job in Batch mode, which will run in the background, and the system will be automatically notified when it is finished. Need to copy a huge file set? Then run a Job that spawns multiple Batch Jobs. For example, every sub folder in your file set could be sent as separately spawned batch jobs. Running multiple jobs in the background in parallel will help optimise your computing resources, increase your throughput, and spread the workload to other nodes in your GoAnywhere cluster. In addition to setting the run mode, you can also set the priority and the job queue. For example, some long-running CPU intensive jobs, such as archiving or backup, can be set to run on a lower priority status or on a lower priority queue so that your core MFT operations remain more responsive. 6. Consume Third-Party APIs Consuming APIs is the process by which an application developer accesses the various APIs that are exposed by the API provider and then uses those APIs to develop one’s own software applications and products. Within GoAnywhere you can use HTTP/HTTP Post and GET Project tasks or Webservices REST tasks to call third-party APIs. For example, once a file is uploaded, you can create a trigger that will automatically import the file into third-party applications, such as a CRM or trouble ticketing system. Additionally, GoAnywhere offers Cloud Connectors to the most popular applications in the industry. (If you cannot find a cloud connector for the application you need, use the Project Webservices or HTTP/HTTPS POST Project tasks to connect via REST to the application of your choice.) 7. Promote Features Continuous Integration and Delivery CI/CD functions are important in every large IT Project. GoAnywhere delivers the ability to promote every user, project, schedule, trigger, secure form etc, from development to staging to production. You can use “Promote” REST API calls to automatically migrate your configurations from development to staging to production. Working on a live production system presents additional challenges. Even the most diligent administrators can make mistakes and accidentally delete or rename configurations which take an entire system offline. Using GoAnywhere’s Promote features, either via GUI or as an API call, is required to maintain maximum system stability and reliability. If you do not have a test system yet, consider deploying one to minimise the risk of human error. API Options to Boost Automation GoAnywhere offers many powerful API options that can seamlessly automate basic file transfer tasks for IT teams and users. You can mix and match the seven techniques above to create a next-generation automation framework that goes far beyond standard MFT functionality. Need Help? It’s Here - Locally! If you’d like help using APIs to boost your MFT’s ROI and your team’s productivity, please feel welcome to get in touch with me . I’m always happy to have an obligation-free discussion. At Generic Systems Australia , we’re your local experts in Secure Managed File Transfer. Previous Next

  • Top MFT for 7th Straight Year | GSA

    < News Top MFT for 7th Straight Year 5 Mar 2026 It’s not just that customers have declared GoAnywhere MFT to be the #1 Managed File Transfer solution for 2026 on respected review website G2. It’s that customers have been consistently declaring GoAnywhere MFT the Leader for 7 years running! Independent experts agree. Info-Tech Research Group has rated GoAnywhere #1 MFT for four years running. If you’re an IT leader, architect, or security owner responsible for how your organisation moves sensitive data, I’m standing by to help you join the thousands of customers globally leveraging GoAnywhere’s class-leading capabilities, flexibility and overall value. My tech team are Australia’s and NZ’s most experienced GoAnywhere specialists. And they’re right here - your market, your time zone - ready to support you. They – and the many customers they’ve supported over decades – are why Generic Systems Australia is A/NZ’s Top Fortra MFT Partner. Previous Next

  • Balancing Cyber Security with Frictionless Customer Experience | GSA

    < News Balancing Cyber Security with Frictionless Customer Experience 17 June 2025 Cyber thieves are stealing more from businesses than “just” data and money. They’re stealing customer trust. Research shows that customers are increasingly worried about how well companies are protecting their data. And those worries are hurting companies’ bottom lines. Fears Realised Nearly 2 in 5 customers have been the victim of two or more data breaches, according to S&P Global Market Intelligence. A third of the victims of identity theft have experienced it within the past three years. Stuart Vaeth, SVP of strategic business development at Trua, said cyber theft incidents weaken customer trust and brand reputation. “The result can be lost business. It absolutely impacts the reputation of the service provider,” he said. “Obviously, it erodes trust. People may not come back to your site if your data has been breached.” Research by S&P Global Market Intelligence shows that more than three-quarters of customers are concerned about the risk of trying digital experiences or products that require sharing personal data online. This is a serious challenge for businesses who recognise that customer data is essential to providing personalised purchasing experiences. Cyber Security Integral to Customer Experience The safety of customer data is as much a customer experience issue as it is a cyber security one. Sheryl Kingstone, research director of customer experience and commerce at S&P Global Market Intelligence, said that a mistake many businesses make is to look at their customer data “in a silo”. “When we do take a look at things like what CISOs want or what privacy experts want versus what marketing and customer experience teams want, it becomes very complicated, because we need to mind the gaps,” Kingstone said. “There are trade-offs between compliance and the customer experience.” “Security compliance teams look at ensuring risk and compliance. CX leaders want to reduce customer friction points,” she said. Businesses need to balance customer experience with risk and compliance. Vaeth said that, while CX leaders generally aim for zero friction to prevent drop off, some friction can be beneficial. Collecting customer data directly or asking customers for verification can provide reassurance and need not impact drop off rates. Earning Customer Trust One way to earn customer trust and assure customers you take data protection seriously is to show them your credentials. For example, you can display them on your website and in marketing materials. Another way to demonstrate your “cybertrustworthiness” is to let your customers know when you’re investing in new technologies, improving processes and gaining certifications. It demonstrates you’re on a path of continual improvement that can differentiate you from your competitors. Protecting Customer Data Stepping up to the needs of customer data guardianship requires both technology solutions and sound business practices. Layered defences, with integrated solutions that address encryption, threat protection, and data loss prevention, enable safe collaboration without risking malware, mishandled data, breaches and non-compliance. Given most breaches involve a human element, technology solutions need to be automated and easy for employees to use. Software needs to be able to manage: How access to data is granted; How access is authenticated; How access is tracked and controlled; and How access can be speedily revoked, when needed. Layered Protection A standalone managed file transfer (MFT) solution – such as GoAnywhere MFT - is a great first layer of defence. It provides security for files at rest and in-transit. However, integrating Threat Protection as an additional layer enables you to take appropriate action when there’s customer data moving in and out of your organisation. Based on rules you predefine, Generic Systems Australia’s Advanced Threat Protection Bundle can mask, remove, or permit customer data to be moved within your organisation and beyond, via a Secure ICAP Gateway. On Hand to Help At Generic Systems Australia we’re the Asia-Pacific region’s experts in deploying Managed File Transfer and Advanced Threat Protection. We’ve assisted dozens of organisations to protect their customer data and secure their file transfers, while keeping their businesses running smoothly. If you’d like to discuss how we can help you, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how simply we can help you maintain your customers’ trust. Attribution: This article includes quotes from an interview originally published on cybersecuritydive.com . Previous Next

  • Protect Your Business from Phishy QR Codes | GSA

    < News Protect Your Business from Phishy QR Codes 29 Aug 2025 It’s National Scams Awareness Week . But it’s always a good time to guard against one of the most common forms of phishing. Research by the Anti-Phishing Working Group (APWG) shows that scam QR Codes are becoming the attack vector of choice for cyber criminals attempting to infiltrate your organisation. Each day, millions of emails are sent containing QR Codes that link employees and consumers to bogus websites. Code for Criminals QR code attacks occur when a cyber thief creates a bogus QR code which “socially engineers” their intended victim to a phishing website. There they’re tricked into disclosing system credentials, making a false payment or purchase, or downloading malware. QR codes are an increasingly popular phishing tactic due to their crim-friendly features. Free QR Code generators make it inexpensive for cyber criminals to attempt phishing attacks. Free QR Code tend to have few resources dedicated to takedowns of legitimate service abuse and other malicious activity.   QR codes can be combined with URL shorteners to mask the true destination of URLs. Stop the Scams Our SFT Threat Protection Bundle enables your organisation’s email system to automatically detect and prevent phishing links and other malware from entering your organisation. Combining the layered strengths of GoAnywhere MFT and Clearswift, it means your team can receive and share information securely, without impairing their productivity. Seamlessly integrating managed file transfer with advanced threat protection and adaptive data loss prevention, SFT Threat Protection not only prevents malware from entering your organisation, but it also prevents employees from losing or mishandling data. For example, if an employee knowingly –– or unknowingly –– attempts to share any files containing malware, those files are sanitised by having the malicious elements automatically removed. It can also automatically detect and –– if you configure it to do so –– prevent employees from sharing sensitive information. Local Help on Hand Generic Systems Australia has decades of experience helping Australian and New Zealand organisations protect themselves against phishing and other cyber attacks by leveraging the power of the world’s leading MFT solution. Our Migration Service makes the transition even easier for organisations who prefer to use their resources building their businesses rather than improving their IT plumbing. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch with us. At Generic Systems Australia, we’re your local experts in Secure Managed File Transfer. Previous Next

  • Keeping Ahead of Competition in Commercial Real Estate | GSA

    < Case Studies Keeping Ahead of Competition in Commercial Real Estate Decades of experience helping Asia-Pacific customers have established Generic Systems Australia as our region’s local experts in secure managed file transfer. In this case study, we share the many ways in which an international commercial real estate firm leverages the flexibility of GoAnywhere MFT . One commercial real estate company has a mission to redefine their industry with long-term investments in people and technology that deliver actionable insights and create the best customer experience. They’ve also made it their mission to ensure any data they’re transferring is transferred securely. This corporation is an industry-leading commercial real estate company that offers a robust suite of services to its multifamily and commercial property clients. They offer services in commercial real estate investment sales, mortgage banking, and mortgage servicing. They now operate worldwide, have over 1,000 employees, and have closed billions of dollars in production volume. GoAnywhere MFT plays a key role in their success. Retiring REST A Senior Engineer provided some insight into the company’s three-year usage of GoAnywhere. Originally, when they needed to wire SFTP files to the bank, they used a homegrown tool, built internally and solely for the purpose of SFTP transfers to wire payments. However, because processes were taking too much time, they decided to look elsewhere for a better solution. What they found exceeded their original expectations. Prior to implementing GoAnywhere MFT, the process of keeping data consistent was a challenge. Stated the Senior Engineer: “Before GoAnywhere, we used the same REST call and put data in the SQL Server, but I was having a hard time with Windows vs. AWS and Azure and getting the same data repeatedly.” With GoAnywhere, Windows can grab data easily and consistently. Daily Deliveries Once the Senior Engineer learned the product, which didn’t take long, they were an expert in GoAnywhere. Now, more than 1,715 jobs are run each day. Most of the file transfers are B2B, moving from the company to a financial institution of some sort. “We wanted something that could go to a database seamlessly. We must get files to the bank in a very timely matter. Every wire file goes to the Federal Reserve and must get a Federal Reserve number before it can be funded to the bank. That all takes time. You don’t want to be at a standstill at 5:00 pm on a Friday trying to figure out why you can’t get a wire file to a bank! They’re funding loans that are $40 million!” Now the Senior Engineer can set up new transfers in just two minutes once they have all the information and can execute transfers in 10 seconds. If it clears, transfers start and stop in about one second! “Currently, we have 63 projects running in the GoAnywhere scheduler. We started with 15 and it has grown from there.” Mortgage Rate Magic Aside from the daily deliveries, the company also utilises GoAnywhere to stay one step ahead of their competition and offering the best mortgage rates possible. Mortgage rates update every minute. Because the company is committed to offering the best interest rate in the steep pool of competition, they avoid offering one single rate per day, as some of their competitors do. It’s especially important for them to pull the data in real time because even a couple of points in an interest rate change can make a big difference. GoAnywhere MFT helps the company’s competitive edge thrive and delivers an advantage by allowing real-time interest rate comparison. “We use MFT to get the latest mortgage rates available,” the Senior Engineer said. “We have several applications that use these rates. Each time you pull the rates, it costs money. Instead of having each application pull rates, we have MFT make a REST call to grab the rates and push them into a SQL Server, for all of our on-premises dotnet applications to use.” All applications that need the updated rates call the SQL Server to get the rates in real time. From there on, the rates are formatted into a JSON file and sent to AWS, where the rest of their cloud-based apps can use them. All applications have the same data source that is updated at the same time; therefore, they only need one outbound call to grab the rates. All the apps in the AWS environment can also get the necessary rates at the exact same time. It doesn’t matter which application connects; it should get the same rate. Exceeding Expectations Among transferring files securely, upgrades and updates for GoAnywhere MFT have served as an additional, yet unexpected benefit for the company. They have been easy to complete, and the Senior Engineer was able to successfully conduct their company’s annual disaster recovery (DR) test without fail. Overall, the Senior organization is very satisfied with their experience using GoAnywhere MFT. At this commercial real estate company, GoAnywhere’s flexibility is exploited for a great many time-saving projects, allowing valuable staff and system time to be directed to other areas. Although the company is typically using GoAnywhere MFT to transfer daily B2B files to financial institutions and provide competitive mortgage rates to their clients, their Senior Engineer said they often find new ways to leverage the product. “In meetings when someone has an idea, or has been doing something manually repeatedly, I know that GoAnywhere can take care of it and do what’s being requested. I always say, ‘We can do that! They can do this!’” Previous Next

bottom of page