Вы находитесь на странице: 1из 7

(01)_05-0216 infocus_Rechtman_Layout 1 4/22/16 11:59 AM Page 16

In
FOCUS

Technology, Risk
Management, and
the Audit Process
Managing New Acquisitions in the Restarted Economy
By Yigal Rechtman and Guido Gabriele III

16 MAY 2016 / THE CPA JOURNAL


(01)_05-0216 infocus_Rechtman_Layout 1 4/22/16 12:01 PM Page 17

T
he recovery of the U.S. economy since the Great
Recession of 2007–2009 has been accompanied by
IN BRIEF exciting developments in technology. Many large com-
panies have profited from this tech surge, often re-
investing revenue instead of distributing it to shareholders in
As the U.S. economy continues to recover the form of dividends. Small and mid-sized companies have
experienced similar growth, albeit at a smaller scale. In par-
from the Great Recession, new technological
ticular, information technology and systems have enabled these
developments are once again accelerating, as companies to revitalize internal management and gain a com-
petitive advantage. Some businesses and not-for-profit orga-
is corporate adoption of those developments.
nizations have experienced organic growth, while others have
In this article, the authors discuss recent trends grown via acquisition of remaining competitors or strategic
partnerships, and the global economy has experienced similar
related to technological improvements, con- trends based on technological adoption and adaptation. As with
siderations in technology adoption and retire- any great opportunity, however, this new surge in technology
brings great risk.
ment, how to manage the attendant risks, and
the implications for human capital. The Risks of Investments in Technology
The technological booms and busts of the past two decades
represent a cautionary tale; investment in a new technology is

MAY 2016 / THE CPA JOURNAL 17


(01)_05-0216 infocus_Rechtman_Layout 1 4/22/16 12:02 PM Page 18

In
FOCUS

no less risky simply because one has investment in human capital is necessary Though it is appealing to think about
adhered to prior “best practices.” Less to make the best of new tools. an acquisition solely in terms of the new
mature technology presents new, possi- intellectual property and intangible assets
bly greater kinds of risks. For example, Technology Acquisition Risk added to the acquirer’s portfolio, there is
switching to cloud-based operations for As many business owners and managers more to the story. In buying another com-
employees or deployment of a mobile app have found, the most efficient way to grow pany’s assets and hiring its personnel, the
for customers may drive growth and pro- a business is by acquisition. In recent years, acquiring company must also internalize
vide a competitive edge, but it also mergers and acquisitions have been on its technology challenges. These challenges
expands the types of risk and potential the rise, especially “boutique acquisi- include varied integration issues and a
impact of those risks, from employees tions” under $100 million. Though some plethora of common technology headaches:
outdated servers, insecure configurations,
incompatible software, and differing regu-
latory compliance requirements. For exam-
ple, an otherwise healthy company may,
post-acquisition, find itself scrambling to
become Payment Card Industry (PCI)
compliant, needing to install new antivirus
Though it is appealing to think about an acquisition software on many workstations, or inher-
iting a bug list for internally developed soft-
ware that cannot interface with the
solely in terms of the new intellectual property and acquirer’s financial reporting system.
Simply discarding the acquired com-
pany’s hardware might seem like the
intangible assets added to the acquirer’s portfolio, easy answer, but such a break will like-
ly be challenging from a cash flow per-
there is more to the story. spective. In most cases, the acquiring
company must incorporate the worksta-
tions, servers, firewalls, and software of
the acquired company into its own infras-
tructure. The risk of internal unautho-
rized access to company data is therefore
sharply and suddenly elevated, and this
risk may reach outside the company to
suing for unpaid overtime to a breach of acquisitions are primarily about securing vendors and clients (e.g., through elec-
security perimeters that are now fully vir- talent and expertise, many also result in the tronic data interchange interfaces or cus-
tual. Still, many organizations that survived incorporation of technological intellectual tomer web portals). All of these
the Great Recession now have available property that is integrated into the acquir- technology risks are inherent to any
cash on hand to grow or compete, and thus ing company’s existing operations or acquisition and should not be ignored.
are driven to invest in technology. launched as “new” products (Jacob
Certain trends expected to manifest Mullins, “2015 Will Be the Year of the Software Specialization
will shape how companies can best direct Tiny Tech Acquisition,” Business Insider, Software specialization is another way
their technology investments. First, as Jan. 6, 2015, http://read.bi/2367PHq). for organizations to gain a competitive
new technology acquisition increases, the Behind the curtain, these companies advantage. For example, the healthcare
focus is likely to shift from generalized experience sudden growth in the com- industry has seen a marked increase in
technology to specialized applications. In plexity of their back-end systems as the the use of electronic medical records
addition, as new technology is acquired, new technology is integrated into the exist- (EMR) in the past five years. At their
an increased disposal or warehousing of ing infrastructure. With that increase in best, EMR systems have the potential to
old technology is likely to follow. complexity, the risk of unintended conse- deliver better patient outcomes and
Finally, and perhaps most important, quences also sharply rises. increased efficiency for providers. As a

18 MAY 2016 / THE CPA JOURNAL


(01)_05-0216 infocus_Rechtman_Layout 1 4/22/16 12:02 PM Page 19

result, healthcare institutions are now work- software packages. In all cases, this trend and user should be discrete and sequen-
ing to integrate EMR into their already- has affected both large and complex hos- tially responsible for their individual roles
complex enterprise resource planning pital networks and smaller medical prac- during the implementation process. Either
(ERP) systems (Mari M. Nakamura, tices. in an attempt to launch new software
Marvin B. Harper, and Ashish K. Jah, This search for differentiation and quickly or by simple inattention, high-level
“Change in Adoption of Electronic competitive advantage through highly cus- managers often fail to implement such a
Health Records by US Children's tomized, highly integrated software is not segregation of duties. As a result, even flag-
Hospitals,” Pediatrics, vol. 131, no. 5, May limited to the healthcare industry; it also ship, mission-critical software products may
2013, http://bit.ly/1SUKYq3). ERP soft- exists in the communications, healthcare, lack basic quality and roll into production
ware has one key function—to get the right government, not-for-profit, construction, with potentially destructive bugs unnoticed.
information to the right person at the right and logistics sectors, to name just a few. Even if the development team follows
time. To achieve this goal with the maxi- And as with any burgeoning technology, best practices, other risks associated with
mum amount of EMR integration, some with growth comes increased complexity specialized software may remain. More so
hospitals and similarly complex entities and increased risk. Risk from specialized than off-the-shelf software, internally
have turned to developing their own pro- software first develops when a company developed or customized software pack-
prietary software internally or through a fails to adhere to best practices during ages may not be created with sufficient
third-party development team. Some of development or customization. Proper seg- documentation or implemented with suf-
these proprietary ERP software packages regation of duties among the develop- ficient testing. In addition, third-party
are written from scratch; others are craft- ment team members is vital: the analyst, developers may functionally abandon
ed from highly configurable third-party programmer, quality control department, commissioned software after moving on

Terri Johnson
Managing Partner
tjohnson@capstantax.com
Your best choice for e
tax solutions designed
maximize deductions an
QHZ EUDQG UHÀHFWV RXU
and strong partnerships

Bruce Johnson
Visit www.capstantax.com to learn more.
Founding Partner
bjohnson@capstantax.com Then call 215-885-7510 or email bjohnson@capstantax.com.

MAY 2016 / THE CPA JOURNAL 19


(01)_05-0216 infocus_Rechtman_Layout 1 4/22/16 12:03 PM Page 20

In
FOCUS

to new projects, making updates or bug that most technology can be considered technology is ultimately determined by the
fixes more difficult to come by. In high- obsolete after only 18 months. In a people interacting with that technology.
ly regulated environments—especially period of accelerated growth, older tech- Technology is at once harmless and use-
those that may require audits of operational nology is discarded even more quickly. less until it is operated by a person, regard-
software—these risks can be significant. Such discarded technology introduces the less of that person’s job description and
Finally, failure to develop or customize risk of data loss or unauthorized distri- position. As such, managers and auditors
software according to best practices may bution of confidential data. Hard disks, must assess the risks of human use and
pose a risk that financial reports from the workstations, servers, multifunction misuse of any technology, both intention-
production side of the business will be inac- copiers, mobile devices, and many al and unintentional.
curate, as well as a risk that that these inac- other technologies all may have sensi- For example, many businesses are
curacies will not be not caught by the tive data stored in their memory when turning to remote access and telecom-
accounting and finance cycle managers in discarded. For example, a recent study muting in hopes of increasing produc-
a timely fashion. In an effort to cut costs, performed on used hard disks bought tivity and accommodating alternative
a business may not spend the time and from eBay revealed that many contained work schedule needs. Though most
money required to add audit functionality data from the previous owners (Lucas regard this as a positive development,
telecommuting is fraught with risks of
unauthorized data access. Remote work-
ers might store sensitive data on personal
machines, share workstations with fam-
ily, leave passwords in full view, or
expose the business’s assets to their unse-
As software and hardware security controls pro- cured personal networks. Businesses
must therefore assess the risk of their
remote workers’ failure to comply with
tecting businesses’ complex information systems company security policies and enhance
security accordingly. Tools such as
encryption and training must be utilized
have improved, intruders have recognized that to ensure that controls over authentica-
tion (knowing who is accessing data) and
authorization (ensuring that the user
people are the most vulnerable link in the chain. has access to the right data and nothing
more) are effective.
Technology professionals often express
the opinion that people are not good at
keeping data safe. As software and hard-
ware security controls protecting busi-
to its internally developed software, leav- Mearian, “Survey: 40% of Hard Drives nesses’ complex information systems have
ing it entirely reliant on software that can- Bought on eBay Hold Personal, improved, intruders have recognized that
not be tested for accuracy. As a result, there Corporate Data,” Computerworld, people are the most vulnerable link in the
is a real risk that profitability may be over- Feb. 10, 2009, http://bit.ly/1UQNph8). chain. Technology has become more com-
stated (risk of failure) or understated (risk Businesses must recognize the risks asso- plex, but human brains keep making the
of lost opportunities). ciated with decommissioning technolo- same mistakes. Rather than attempt to
gy and ensure that the technology they break encryption or find unpatched holes
Discarding Technology discard is properly cleared of sensitive in software, hackers have turned to social
The discarding of obsolete technolo- data before it is disposed. engineering methods like phishing to trick
gy is a byproduct of acquiring new tech- workers into giving up information that
nology. Though many businesses hold Human Capital would help them bypass security (Jack
on to technological assets far past their The degree of risk associated with Wallen, “10 Social Engineering Exploits
expiration date, it is generally accepted acquisition, adaptation, and disposition of Your Users Should Be Aware of,”

20 MAY 2016 / THE CPA JOURNAL


(01)_05-0216 infocus_Rechtman_Layout 1 4/22/16 12:03 PM Page 21

TechRepublic, Jan. 27, 2016, http://www. cycles. The risk of poor development or auditor to reduce the extent and nature
techrepublic.com/blog/10-things/10-social- configuration of new software can be of the auditing procedures and perform
engineering-ploys-your-users-should-be- reduced with policies and procedures that such procedures well before the year end.
aware-of). To make matters worse, employ best practices in change manage- The risks from new technology can
information extracted from these meth- ment. Security risks can be reduced by also be relevant for understanding the
ods (which include collection and aggre- proactively auditing information technolo- growth opportunities associated with dif-
gation of data from public sources) is gy and shared by obtaining cyber-security ferentiation (or lack thereof), depending
compiled and made available in online insurance. (For a detailed discussion of upon the company’s degree of adapta-
black markets. Human capital may cybersecurity for CPA firms, see Yigal tion. As such, a sophisticated auditor can
increase technological risk, but the work- Rechtman, and Kenneth N. Rashbaum, be in a position to develop better
force need not be replaced with robots just “Cybersecurity Risks to CPA Firms,” The expectations and come up with fewer
yet. A business that is aware of these risks CPA Journal, May 2015.) Auditors can false positives when performing analyt-
can work to mitigate them, and the first measure the effectiveness of these controls ical procedures. When evaluating inter-
step is, of course, a proper risk assessment. in a Service Organization Controls (SOC) nal controls—either for testing or simply
Type 2 report, providing assurance to man- to understand the company’s opera-
Risk Management agement about the compliance of infor- tions—it is helpful for auditors to under-
In recent years, there have been an mation technology with certain criteria and stand the level of adaptation to new
alarming number of high-profile security allowing the company to share the risk with technology (e.g., new software, integra-
breaches, including at such large corpora- the auditors who write the SOC reports. tion of mobile computing, a switch to
tions as Target, Home Depot, Wyndham, Proper policies and procedures, along with cloud-based services) in light of risks
Anthem Health, and T-Mobile. These regular training and reminders, can also associated with human interaction with
breaches are particularly troubling because mitigate the risks associated with both new that new technology. This understanding
these companies presumably had the and existing technology. can assist auditors in complying with
resources and opportunity to conduct a risk GAAS, in identifying situations where
assessment and take steps to mitigate their Technology Risk and the Audit Process IT-based controls such as authentication
data risks. It should be clear that the right U.S. GAAS (AU section 150, and authorization can be improved, and
time for a business to determine whether “Generally Accepted Auditing in providing the company—with cer-
it is exposed to such a breach is always Standards,” http://bit.ly/1qbSfbp) requires tain limitations—consulting services that
“now,” and certainly not “after a breach.” auditors to assess the risk of financial aim to improve such deficiencies.
Managers and data owners should con- misstatement, especially as it arises from The current period of economic
sider the probability of an adverse event the application and use of technology. growth in the United States has ushered
and project its estimated financial impact. The standards are general enough to in a wide range of technological oppor-
Risk can then be managed in one of four include both the technology underlying tunities. At the same time, managers and
ways: avoid the activity that creates the internal controls in place for the prepa- auditors are well advised to consider
risk, reduce the risk by mitigation, reduce ration of the financial statements and that the risks associated with these techno-
the risk by sharing the consequences underlying the company’s operations, logical developments and apply their skill
with others, or accept the risk. (For a com- provided that such technology is related and knowledge to mitigate and manage
plete discussion of risk management to the production of financial results. these risks for overall organizational and
framework, see Yigal Rechtman, “Book The classes of risks listed above can practice success. q
Review: Guide for Conducting Risk have a significant effect on an auditor’s
Assessments: Information Security,” The assessment of risks. For example, if a Yigal Rechtman, CPA, CFE, CITP, CISM,
CPA Journal, March 2013.) company has properly segregated duties is a senior manager for litigation support
Risk management is often partially con- with regard to the system development and forensic accounting at Grassi & Co.,
trolled by cost-benefit calculations. life cycle (SDLC) of a core system, then as well as an adjunct professor at the Lubin
Managers must always contend with lim- the risk associated with the system’s School of Business, Pace University, New
itations on time, funds, and technology to design can be assessed as low. Tests of York, N.Y. He is a member of The CPA
manage risk within reason. The risk of new internal software development controls Journal Editorial Board. Guido Gabriele
technology acquisition can be managed are likely to pass in such entities, and the III, Esq., is a litigation supervisor and tech-
with testing and slow implementation reasonable reduction of risks enables the nology consultant at Grassi & Co.

MAY 2016 / THE CPA JOURNAL 21


Copyright of CPA Journal is the property of New York State Society of CPAs and its content
may not be copied or emailed to multiple sites or posted to a listserv without the copyright
holder's express written permission. However, users may print, download, or email articles for
individual use.

Вам также может понравиться