top of page

Search Results

125 results found with an empty search

  • Hidden Cost of "Free" File Transfers | GSA

    < News Hidden Cost of "Free" File Transfers 1 Nov 2023 The Hidden Cost of "Free" File Transfers With 329 million terabytes of data being created each day, the ability to transfer files quickly and dependably has become a core business process for every business. Surprisingly, some businesses continue to entrust this critical dependency to free file transfer software. But is this software truly “free”…? A study by Aberdeen Group identified hidden costs that businesses incur using “free” file transfer mechanisms. In fact, 80% of files sent through e-mail attachments or “free” file transfer services ended up costing organisations money in the long run. How…? It’s taking longer to move a lot of data around. For example, as our businesses are finding new ways to make use of the high-resolution cameras in our smartphones, video files growing exponentially in size. HD video – with files measured in gigabytes - is already the standard. But 4K videos – typically hundreds of gigabytes– will soon be the norm. Moving high-res movies around finds employees spending more time than ever before simply waiting for file transfers to complete. When your team is sitting around waiting for a file to arrive, there’s a significant reduction in their productivity. If it takes them 3 hours to send a file, that’s 3 hours where both they and their collaborator are without the file needed to work effectively. Multiply the number of hours by the salaries of both professionals in question and the “free” file transfer isn’t free anymore. How often have you tried to send a file, only to have the transfer crash out midway? It’s not just frustrating, it’s a further waste of time. When file transfers fail, the non tech savvy among us need to seek the help of their IT department. So, not only is their time being wasted, but there’s a labour cost in resolving the problem. Aberdeen’s study estimated that resolving each stalled file transfer required a cumulative 11 hours of team time. Even when files successfully transfer, there remain significant cybersecurity risks when sensitive files are sent via free services. In Aberdeen’s study, free service transfers were twice as likely to result in security breaches compared to those conducted with professional Managed File Transfer software such as GoAnywhere . Major security issues took an average of 16 business hours to resolve and cost companies millions of dollars. When files are too big to send as email attachments, employees turn to “free” transfer tools. However, the time spent finding such tools could have been better spent on their core responsibilities. There’s not only a better way to move data around your business and its supply chain… it’s also a more cost-effective way. Aberdeen’s study found that businesses which invested a little in a professional Managed File Transfer solution had a median return of almost 500 times their investment. When it comes to Managed File Transfer solutions, there is one acknowledged industry leader – GoAnywhere MFT . GoAnywhere automates and encrypts data between an organisation’s employees and with its trading partners, protecting from unnecessary vulnerabilities while vastly improving file transfer speed and quality. If you’d like to discuss how GoAnywhere MFT could improve your organisation’s productivity and bottom line, please feel free to contact me ( bradley@gensys.com.au ), or read more at the Generic Systems Australia website. Bradley Copson, Business Manager, Generic Systems Australia Previous Next

  • Small-to-Medium Businesses the Big Targets for Cybercrime | GSA

    < News Small-to-Medium Businesses the Big Targets for Cybercrime 17 Mar 2024 While cyberattacks on large corporates make the headlines, it’s small to medium businesses who are being hit the hardest. The 2024 Sophos Threat Report found that the sophistication of cyberthreats faced by small to medium organisations is often on par with those used to attack large enterprises. Apparently, while the amount of money that can be stolen is less than that available from a larger organisation, cybercriminals more than make up the difference in the volume of thefts. More vulnerable, greater impact Sophos say that organisations with fewer than 500 employees are not only more vulnerable to cybercriminals, they also suffer more proportionally from the results of cyberattacks. The greater vulnerability is due to a lack of experienced security operations staff, underinvestment in cybersecurity, and smaller information technology budgets. And, when these businesses are hit by cyberattacks, the expense of recovery forces many to close. Attractive Ransomware Targets 90% of the world’s businesses are small- and medium-sized. In Australia, these businesses contribute more than 60% of the nation’s overall GDP. According to The Institute for Security and Technology’s Ransomware Task Force, 70% of ransomware attacks target small to medium businesses. Other Prevalent Threats Beyond Ransomware, a variety of other cyberthreats also pose an existential threat to small and medium businesses. Data theft is the focus of most malware targeting small and medium businesses. Password stealers, keyboard loggers, and other spyware make up nearly half of malware detections. Credential theft through phishing and malware can expose small businesses’ data on cloud platforms and service providers, and network breaches can be used to target their customers as well. Web-based malware distribution — through “malvertising” or malicious search engine optimisation — is also on the rise. Unprotected devices connected to organisational networks — including unmanaged computers without security software installed, improperly configured computers and systems running software fallen out of support by manufacturers — are a primary point of entry. Attackers are increasingly abusing device drivers — both vulnerable drivers from legitimate companies, and malicious drivers that have been signed with stolen or fraudulently obtained certificates. Email attacks have begun to feature more active engagement with targets over email, using a thread of emails and responses to make their lures more convincing. Attacks on mobile device users, including social engineering-based scams tied to the abuse of third-party services and social media platforms, have grown exponentially, affecting individuals and small to medium businesses. Your Data is Their Target The greatest cybersecurity challenge facing organisations of all sizes is data protection. More than 90% of attacks reported to Sophos involved data or credential theft, with methods ranging from ransomware attacks, to data extortion, unauthorised remote access, and simple data theft. Compromised business email userids are also a substantial problem for small to medium businesses, and the next most prevalent threat after ransomware. Stolen credentials, including browser cookies, can be used to compromise business email userids, provide unauthorised access to third-party services such as cloud-based finance systems, and entry to internal resources. Turning Your Own Tech Against You Sophos said that, as 2023 progressed, they observed an increase in the use of remote execution of ransomware. Unmanaged devices on an organisation’s own network were hijacked to encrypt files on other systems via network file access. Ransomware and other malware developers are increasingly using cross-platform languages to build versions for not only Windows, but also macOS and Linux operating systems. Small and medium businesses also need to be concerned about the security of the services they depend upon to manage their business. Attacks against managed service providers became an enduring part of the ransomware playbook in 2023. How to Protect Your Business Criminal syndicates count on smaller organisations to be less well-defended and to not have deployed modern, sophisticated tools to protect their users and assets. The key to successfully defending against their threat is to use a multi-layered strategy that includes robust data transfer protection, staff education, and multifactor authentication. A Secure Managed File Transfer solution such as the class-leading GoAnywhere MFT addresses the many risks of ad hoc techniques through a holistic approach to security, including: Automatic authentication, encryption and decryption User access controls Auditing and Reporting, and Industry standards compliance. If you’d like to beef up your organisation’s defences against the increasing threats posed by cybercriminals , please feel free to contact me , Bradley Copson (mail to: bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, and explain how we can quickly and affordably transition you from your existing approaches without disrupting your business. I’ll even offer you a zero-cost Proof of Concept. Bradley Copson Business Manager Generic Systems Australia Your Local Experts in Secure Managed File Transfer #MFT #managedfiletransfer #securefiletransfer #sft #cybersecurity #datatransfer Previous Next

  • Summer Software Sales | GSA

    < News Summer Software Sales 10 Dec 2024 It's December, and the thoughts of many in business will no doubt be turning to closing out the year ahead of well-deserved holidays. But did you know this can also be a great time to negotiate a sweet summer deal on enterprise software…? Much of the world's enterprise software is sold by US-based companies, who follow a calendar accounting year. December is the final month for them to achieve their full-year sales targets, stretch bonuses, etc. So: strike while the iron - and season - is hot! Use your negotiating advantage to squeeze a special deal on that new software solution you've been eyeing. Of course, if that solution happens to be GoAnywhere MFT - the world's leading Managed File Transfer solution - then reach out to me, and we can apply the summer squeeze together! 😉 #MFT #SFTP #managedfiletransfer #goanywhere #enterprisesolution Previous Next

  • Secure Your Email with these 6 Steps | GSA

    < News Secure Your Email with these 6 Steps 16 Apr 2024 Secure Your Email in 6 Steps Email continues to be the world’s most frequently-used tool for collaboration. In fact, research group Radicati predict 376 billion emails will be sent by 4.5 billion users by the end of next year. Email’s enduring popularity makes it a prime target for cyber criminals. Phishing attacks, spam, and viruses, as well as compromised business emails being used as a gateway to other forms of data loss, can turn email from a collaboration tool into a weapon used against you. Balancing risk vs restraint With so much at stake, IT teams need to carefully balance the minimisation of email risks against the potential for placing draconian restraints on their organisation’s ability to efficiently conduct business. Secure Email Gateways –– such as the Clearswift Secure Email Gateway –– help organisations achieve the right balance for them, enforcing protective email policies without overburdening IT departments, email administrators and messaging teams. Handle with Care Email attachments continue to be a particular risk, and so, managing their transmission warrants particular care. A secure alternative to emailing files, such as the Secure Mail module in GoAnywhere MFT, enables employees to easily send files to other individuals via a secure link with a specific expiry date. Because it is much more secure than traditional email, Secure Mail doesn’t limit the size or types of files being transmitted –– a drawback of many email clients such as Outlook and Gmail. 6 Steps to Secure Email From our many years of helping organisations protect their valuable data, we recommend IT teams define robust email security policies and determine what’s required from their email security defence, by following these six easy steps: 1. Define which data needs to be protected 2. Be clear about the dangers 3. Establish a robust and sustainable email security policy 4. Close the zero-day window 5. Encrypt sensitive data 6. Monitor behaviour and performance --- If you’d like to discuss how your organisation’s email can be made more secure –– without impeding your team’s efficiency ––p lease feel free to contact me , Bradley Copson (mail to: bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, explain how we can transition you from your existing approaches hassle-free, and offer you a zero-cost Proof of Concept. Generic Systems Australia Your Local Experts in Secure Managed File Transfer #MFT #managedfiletransfer #securefiletransfer #sft #cybersecurity #datatransfer Previous Next

  • What to Look for in a Managed File Transfer Solution | GSA

    < News What to Look for in a Managed File Transfer Solution 3 Mar 2025 Contributing to independent enterprise buying intelligence platform Peerspot , tech blogger Janet Staver has shared very useful advice on what to look for in a Managed File Transfer (MFT) solution. “If file transfers are an integral part of your business, it is crucial to implement an MFT solution,” she said. But how to choose which of the many MFT's on offer are best for your organisation...? Janet recommended you use the following key evaluation criteria: Security Ease of Use Data Analytics Authorisation and Validation Secure file governance Encryption and Decryption Regular Updates Automation Antivirus Visibility Budget-Friendly Customisation Security Highlighted by Janet as the “first and foremost” consideration – Janet observed that “not all secure MFTs are created equal.” In addition to assessing MFT solutions’ integrated security protocols, she advised intending purchasers to look for virus scans and the ability to quarantine to isolate malware. “MFTs with strong authorisation and validation are preferable as they can help with compliance requirements,” she said. Ease of Use For Janet’s second key consideration, she recommended businesses choose an MFT solution which improves productivity without requiring you to write scripts for data transfer. Data Analytics A useful tool to “gather data about your data”, Janet noted that data analytics were also useful for meeting compliance standards and optimising file management. Similarly, the best MFT solutions provide a high-level view of your system, including a CISO dashboard and SIEM (Security Information and Event Management) enabling reports on total access, locations, transfers, and threats. “A good MFT will include secure file storage and governance tools that don’t compromise security,” Janet said. “Flow authoring access controls (to work with advanced workflows), granular file access roles and user policies, and regular logging are some of the basic features you should look for.” Advanced Workflows, Regular Updates Janet noted that some MFTs offer automation capabilities, including agents to complete complex tasks at scale. Regular updates are also important to keep a company’s data safe from hackers, Janet said. (Her full advice can be read here . ) Independent Analysis To get you started comparing MFTs, you might want to consult the findings of respected independent tech analysts Info-Tech. They recently performed a comprehensive analysis of MFT solutions, using data sourced from real end users. Their recommendation…? GoAnywhere MFT . Besides achieving the highest overall score in the MFT category, GoAnywhere also ranked highest for Vendor Capability Satisfaction, including the key dimensions of: “Business Value Created” “Breadth of Features” “Quality of Features” “Product Strategy and Rate of Improvement” “Useability and Intuitiveness” “Vendor Support” “Ease of Data Integration” “Ease of Customisation” “Availability and Quality of Training”, and “Ease of Implementation” Tap Australia’s and NZ’s MFT Experts No-one better understands local MFT needs and best practices than Generic Systems Australia. Our local team has decades of experience helping businesses implement the world’s leading MFT solution. Our Migration Service makes the transition even easier for busy businesses who’d rather spend their time focusing on their customers than their IT systems. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch . At Generic Systems Australia , we’re your local experts in MFT. Previous Next

  • New “Threat Brain” keeps Cyber Security Briefed and Vigilant | GSA

    < News New “Threat Brain” keeps Cyber Security Briefed and Vigilant 10 June 2025 What if your enterprise IT systems were constantly informed of the latest emerging cyber threats, so they could proactively protect your precious data from cyber thieves? That’s what Fortra’s new Threat Brain does for GoAnywhere , the world’s leading Managed File Transfer (MFT) solution. Threat Brain provides a unique threat intelligence advantage over other MFT solutions. It aggregates indicators from a deep portfolio of cybersecurity solutions to continuously identify and block IPs with bad reputation or malicious intent before those threats enter your organisation. Other MFTs can only react to cyber threats. GoAnywhere proactively avoids them. Threat Intelligence With access to data from Fortra’s deep portfolio of cybersecurity products and vast customer network, Threat Brain continually aggregates, in real-time, risk information across all attack vectors so that GoAnywhere MFT. Generic Systems Australia is a long-term distributor of GoAnywhere across the Asia-Pacific region. Threat Brain’s enhancements to GoAnywhere enable our customers to benefit from: · Consistent re-verification : With lesser MFTs, once an IP address has been allowed, there’s no ongoing monitoring. With GoAnywhere however, IP reputations are checked with every new session to ensure they remain safe. GoAnywhere is the only solution in the marketplace that makes this proactive and consistent security feature available to all customers within the solution. · Massive threat intelligence database : Threat Brain continually aggregates threat intelligence from Fortra’s broad cybersecurity portfolio and its vast, worldwide (anonymised) customer database. No other MFT vendor offers such integrated cybersecurity tools capable of tapping into this collected threat data. · Layered protection : Fortra’s deep portfolio of cybersecurity intelligence and protection adds an additional layer of protection to customers’ sensitive data. Combined with Advanced Threat Protection , GoAnywhere sets the bar for protecting sensitive data in motion and at rest. Proactive Security GoAnywhere taps Threat Brain to perform on-demand IP reputation checks for incoming HTTP/S connections, AS2, and AS4 protocols. These checks are executed on the GoAnywhere Web Client and via API and API endpoints. GoAnywhere automatically blocks IPs with low reputation scores. This IP blocking can be fine-tuned through adjustable sensitivity settings, while provisioning allows for exceptions in case of false positives. When an IP address has been blocked due to low reputation, a system administrator can add an exception to permit the IP address to be accessed. Whenever GoAnywhere takes action to protect your systems and data, it’s recorded in an audit log detailing what was blocked and the reason it intervened. Stay in the Know When it comes to cyber security, it’s critical to be proactive vs reactive. While Brute Force or Denial-of-Service attacks may be detected automatically by traditional MFTs, this happens only after the system has been attacked. Local Expertise at the Ready If you’d like help tapping GoAnywhere’s proactive capabilities for your organisation, please feel welcome to contact me . I have decades of experience as a long term distributor of GoAnywhere in Australia and New Zealand, and I’m always happy to have an obligation-free discussion and demonstrate its impressive capabilities. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. Previous Next

  • Migration Services make upgrading easy | GSA

    < News Migration Services make upgrading easy 17 Mar 2024 Are you attracted to the security and efficiency of a Managed File Transfer solution… but a little worried about the potential disruption of installing one? You needn’t be! Our technical experts at Generic Systems Australia have decades of experience migrating clients from handwritten scripts, outdated integration packages and other legacy software - and everything in between. So it’s no surprise that many of our clients prefer to leave the changeover to us and our Migration Services. Our technical experts can quickly and efficiently install GoAnywhere MFT – the world’s leading file transfer solution – and then configure it to replace all your existing scripts, integration packages and other file transfer middleware. You and your team can keep on doing what you do best – free of distractions – while we do what we do best. Once you have GoAnywhere MFT installed, you may be pleasantly surprised at just how simple it is to set up further automated file transfers into the future. GoAnywhere features an easy-to-understand drag-and-drop interface to create automatic file translation and transfer workflows. In fact, configuring workflows is so easy that most users quickly learn to do it themselves, freeing up your technical staff to focus on other important work. If you’d like to discuss how your organisation’s file transfers can be made more efficient and secure, please feel free to contact our Business Manager , Bradley Copson (mail to: bradley@gensys.com.au ). He’s always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. Generic Systems Australia Your Local Experts in Secure Managed File TransferMore Resources at: www.gensys.com.au (Covering Post by Bradley a few days later) Talking to clients, I sometimes sense they’re worried about the perceived complexity of moving from their existing ad-hoc file transfers to a modern, secure and efficient Managed File Transfer solution. I reassure them that they needn’t be concerned. Our technical experts at Generic Systems Australia have decades of experience migrating clients from handwritten scripts, outdated integration packages and other legacy software - and everything in between. This article explains the benefits and advantages of using our Migration Services . #MFT #managedfiletransfer #securefiletransfer #sft #cybersecurity #datatransfer Previous Next

  • "Flip the Scripts" ... and Transfer Files Efficiently | GSA

    < News "Flip the Scripts" ... and Transfer Files Efficiently 20 Oct 2023 Replace Risky File Transfer Scripts with GoAnywhere MFT Once upon a time, writing scripts to partially-automate the transferring of files was “good enough”. However, technology has moved on. With cybersecurity threats multiplying and businesses focused on improving productivity, script-based file transfers just aren’t cutting it anymore. Why Replace File Transfer Scripts? Scripts aren’t secure . For example, user credentials aren’t encrypted, putting your entire system at risk. Scripts lack advanced features . For example, automating file transfers with FTP requires adding a second solution, a time-consuming and complex prospect. It’s also difficult to build in re-try features, and lock down how users interact with sensitive data. Scripts don’t play well with new tech . For example, modern cloud-based computing environments require file transfers to be integrated with cloud-based solutions, and platforms such as Azure and AWS. Scripts can be time consuming . Developing, maintaining, and troubleshooting scripts takes time, distracting valuable support staff from more important things. Worse, if they’re not available when a script fails, it bottlenecks your workflow. Scripts don’t have logging built in . All logging needs to be built into your scripts. Accessing those logs can be time consuming and difficult, requiring an effective filter and search tools. The Benefits of Replacing Homegrown Scripts As well as increasing the security of your file transfers, moving away from scripts provides your organisation with many other advantages: Centralise workflow . Instead of using multiple different tools, programs, and scripts to encrypt, send, and automate your file transfers, GoAnywhere MFT enables all of these from a single interface. That significantly streamlines day-to-day operations and reduces wasted tool maintenance time. Automate . No matter the volume of files to be transferred across your business and supply chain, GoAnywhere enables your team to spend time focusing on other things. Comply with regulations . By logging file transfers and access across your organisation, GoAnywhere MFT proves your compliance with legal requirements, such as data privacy and encryption. Those logs are also very handy if you’re conducting an audit, or forensics on an internal security breach. The Far Better Alternative GoAnywhere is the industry’s leading Managed File Transfer solution. It ensures data is transferred securely - both internally and externally – and accelerates your team’s productivity. If you’d like to learn more about how GoAnywhere MFT could add to your organisation’s bottom line, please feel free to contact me ( bradley@gensys.com.au ), or read more at the Generic Systems Australia website . Bradley Copson, Business Manager, Generic Systems Australia Previous Next

  • Aussie cyber staff “world’s most stressed”: survey | GSA

    < News Aussie cyber staff “world’s most stressed”: survey 9 Oct 2024 Aussie cyber security workers are the world’s most stressed, according to a survey by international tech professional association ISACA. For its State of Cybersecurity 2024 report, ISACA surveyed 1,868 cyber security professionals from 102 countries, including Australia. They found that Australian cyber security workers are feeling more stressed in their jobs than their counterparts in any other country. Overly Complex, Under Resourced Respondents attributed the rising stress to Australia’s “increasingly complex threat landscape” and “continual under-resourcing” of their cyber security departments and roles. They reported lower budgets, higher hiring and retention challenges, and a more significant lack of prioritisation of cyber security risks than their global peers. Nearly half of all respondents believed their company’s cyber security budget was inadequate, and only a third expected it to be increased in the year ahead. As a result, most said they didn’t feel ready to combat the growing risk of a cyber-attack on their organisation. Burnout In a further worrying sign for Australian businesses, many cyber security professionals said the stress of their role had become so significant that they were considering moving on from their current organisation. Of those who had already left, 60% cited “stress” as the primary reason. ISACA’s Director of Professional Practices and Innovation, Jon Brandt, urged Australian employers to better mitigate the stress of their cyber defenders. “Employers (should) explore ways to support staff before burnout and attrition occur,” he said. ISACA said the increasing complexity of cyber attacks required additional effort, energy and intelligence from cyber professionals. It characterised the need to stay ahead of new technologies and digital weapons as “all-consuming”, and this explained why cyber pros in Australia were feeling the effects of increased stress in their roles. Most Australian respondents said they expected a cyber attack on their organisation during the next year. However, only 32% had a high degree of confidence in their team’s ability to detect and respond to the attack. Cyber Stress Relief Companies can take some of the load off their beleaguered cyber security staff by adopting automated, proactive and layered cyber defences. The goal is an always-on system which automatically secures, stores and transfers data, repelling cyberthieves before they gain access to company systems. The foundation of such an approach is a technology called “Managed File Transfer” (MFT). Paired with secure content engines and secure digital rights management, MFT is an optimal way to prevent data theft and cyber breaches. An MFT solution such as the class-leading GoAnywhere MFT keeps your organisation’s valuable data safe - at rest, and in transit. Coupled with an Advanced Threat Protection Bundle, it enables organisations to safely collaborate without exposing their systems or team to the risks of malware. This automated defence system protects your organisation’s data in three key ways: 1. It prevents files containing malware from being received, by scanning all inbound files and automatically stripping out embedded malware, triggered executables, scripts, or macros. 2. It blocks sensitive data from being shared, by inspecting file contents and stopping protected data from being shared, based on policies you define. 3. It redacts sensitive information from files before they are transferred, detecting and/or removing geotags, document properties, email addresses, and other metadata from documents. Local Help Available As your company’s stressed cyber professionals are signalling, today’s interconnected business environment makes cyber attacks inevitable. However, foiling these attacks no longer requires draining manual cyber surveillance. At Generic Systems Australia , we’ve helped hundreds of business leaders and IT teams across the Asia-Pacific region rest easier, knowing that their valuable data is protected by the automated sentries of GoAnywhere with Advanced Threat Protection. We can do the same for you. It’s surprisingly affordable, and our Migration Services mean you can keep running your business without disruption as we you transition to a more secure approach. In fact, we’re so confident that the capabilities and business case for installing an MFT solution stack up that we’ll even offer you a zero-cost Proof of Concept. If you’d like to help take the load off your cyber security team, and explore how your organisation can automate its data transfer security, please feel welcome to contact me . I’m always happy to have an obligation-free discussion. At Generic Systems Australia , we’re your local experts in Secure Managed File Transfer. Previous Next

  • $21T at stake as Medibank pursued over cyber breaches | GSA

    < News $21T at stake as Medibank pursued over cyber breaches 6 June 2024 Australia’s privacy watchdog has announced it will take legal action against Medibank Private for allegedly failing to protect the medical details of 9.7 million Australians. Russian cybercriminals hacked and then sold the deeply personal medical details of some Australians in 2022. The Office of the Australian Information Commissioner alleges Medibank “failed to take reasonable steps to protect personal information it held given its size, resources, the nature and volume of the sensitive and personal information it handled, and the risk of serious harm for an individual in the case of a breach.” Contraventions of section 13G of the Privacy Act for each of Medibank’s 9.7 million customers could attract a maximum civil penalty of up to $2,220,000 each – that’s $21 trillion in total. Medibank has said it will defend the proceedings. The potential size of the claim shows the watchdog’s intention to warn other companies about their responsibility to protect citizens’ data they collect. “Organisations that collect, use and store personal information have a considerable responsibility to ensure that data is held safely and securely. That is particularly the case when it comes to sensitive data,” Privacy Commissioner Carly Kind said. “This case should serve as a wake-up call to Australian organisations to invest in their digital defences to meet the challenges of an evolving cyber landscape. Organisations have an ethical as well as legal duty to protect the personal information they are entrusted with and a responsibility to keep it safe.” If you’d rather prevent cybertheft than defend it in court, consider how a Managed File Transfer solution can help protect your data in transit, at rest, and in the cloud. Our free resources are a good starting point, and our Business Manager Bradley Copson is always happy to have an obligation-free discussion and provide a free Proof of Concept. Previous Next

bottom of page