-
Audit of annual and consolidated financial statements
Objectivity, expertise and experience are crucial when it comes to assurance services. And above all developing a strong working relationship with our clients is the foundation of our service approach.
-
Assurance related advisory services
Assurance related advisory services are based on the knowledge and expertise that are the staff of life of our auditors.
-
Global audit technology
We apply our global audit methodology through an integrated set of software Tools.
-
Accounting related consulting
Accounting in accordance with UGB, US-GAAP or IFRS is in constant motion. The integration of new regulations into their own accounting systems poses special challenges for companies.
-
Corporate Taxes
Experts at Grant Thornton Unitreu have many years of experience and provide the full spectrum of tax services. They are familiar with the specifics of the Austrian market in all aspects of tax and economic law. Tax consultants at Grant Thornton Unitreu take pride in developing and concluding effective and individual solutions.s.
-
International Tax
Our teams have in-depth knowledge of the relationship between domestic and international tax laws.
-
Transfer pricing
The laws surrounding transfer pricing are becoming ever more complex, as tax affairs of multinational companies are facing scrutiny from media, regulators and the public
-
Value Added Tax (VAT)
Experts at Grant Thornton Unitreu have many years of experience and provide the full spectrum of tax services. They are familiar with the specifics of the Austrian market in all aspects of tax and economic law. Tax consultants at Grant Thornton Unitreu take pride in developing and concluding effective and individual solutions.s.
-
Private Wealth
Our experienced Private Wealth Team distinguishes itself through its long-term and trustworthy advice to private clients, owner-managed companies and private foundations.
-
Real Estate Consulting
Real estate, buy-side tax due diligence when purchasing real estate by (i) acquiring shares in real estate companies (share deal) or by (ii) purchasing real estate directly (asset deal)
-
Global Mobility Services
Assignment management is a task with many aspects and many contact persons. For successful expatriate management you need not only a local tax consultant, but a network, which successfully cooperates across borders. Grant Thornton has member companies in more than 130 countries with Global Mobility experts who regularly exchange information.
-
Bookkeeping & Financial accounting
Financial accounting is the basis for many decisions in the company. Only those who prepare their figures clearly and get a good overview of their company can recognize weak points in time and react to negative developments. The use of state-of-the-art software (BMD) allows you to access your figures at any time. Digital document management and a document management system for data archiving are a matter of course. We take care of your financial accounting.
-
Preparation of annual & consolidated financial statements
Depending on the size of your company and the legal form chosen, you are obliged to prepare annual financial statements. In addition, shareholders, owners and management want to be provided with financial information on a regular basis. We support you in fulfilling your recording obligations and thus ensure that you present companies, the bank and other addressees with meaningful and reliable figures.
-
Payroll Services
Payroll services are among the subject areas that are changing rapidly and constantly gaining in complexity. This is where tax law, social security law, labour law, residence law and other legal matters come together. Our experts will help your team to stay up-to-date and solve complex issues. But we are also happy to take care of your entire payroll accounting.
-
Tax Compliance
Tax authorities keep entrepreneurs and freelancers constantly engaged with tax issues, so they play a central role in almost every business decision. Depending on your needs, our services range from the preparation of tax returns, the execution of tax calculations with a thorough review of the data as a basis for assessment, to international tax compliance for several countries.
-
Robotic Process Automation (RPA)
Robotic Process Automation (RPA) is a software-based technology that mimics a series of activities within and between systems based on a set of instructions typically to complete a process.
-
Valuation
Our business consulting services can help you improve your operational performance and productivity, adding value throughout your growth life cycle.
-
Transaction Support
We can support you throughout the transaction process – helping achieve the best possible outcome at the point of the transaction and in the longer term.
-
Merger & Acquisition
M&A, Merger & Acquisition
-
Restructuring & Going Concern Forecast
Recovery & Reorganization
-
IT Audit
Increasing networking and digitalisation are bringing about far-reaching changes in the business world. Modern accounting is no longer conceivable without complex IT systems. At the same time, however, this also increases the risks for companies, especially when handling data. Confidentiality, availability and integrity of data are central security requirements that must also be met with regard to the correctness of IT-supported accounting. Our IT auditors are experts in operational IT operations and develop targeted measures for you to counteract risks and to check the security and reliability of your IT systems.
-
Internal Audit
Internal Audit helps companies and organisations to achieve their goals by analysing and evaluating the effectiveness of risk management, controls and management and monitoring processes. Internal Audit focuses on independent and objective audit (assurance) and consulting services that improve the value creation and business activities of your company.
-
Special Attestation
At present, practically all types of IT services can be outsourced to service providers. Advancing technological developments, especially the possibilities for virtualizing server systems, are a major driver for companies to increasingly outsource IT services. Frequently, nested outsourcing structures can also be found in which service companies outsource certain IT services to subcontractors.
-
Expert dispute resolution & advisory
Grant Thornton Austria offers comprehensive services in the field of business-oriented expert services with a broad range of competencies from banking to communication. The core activity of experts is the objective recording of findings and the preparation of expert opinions - regardless of all external circumstances. Our experts Gottwald Kranebitter and Georg H. Jeitler, as sworn and court-certified experts, ensure that the highest professional standards and the principle of objectivity are observed.
-
Crisis Management
Crisis Management
-
Blockchain & Crypto-Assets
Blockchain as a carrier technology for crypto currencies and smart contracts, among other things, is becoming increasingly important. Grant Thornton Austria offers comprehensive audit and confirmation services for block chain technologies and business models.
-
Corporate & Brand Strategy
We can support you throughout the transaction process – helping achieve the best possible outcome at the point of the transaction and in the longer term.
Businesses have ploughed billions of dollars into technology that promises to keep cyber threats at bay. Gartner claims that end-user spending for the information security market is estimated to grow at a CAGR of 8.5% between 2017 and 2022, reaching $170bn.
While technology undoubtedly plays a major role in combating digital threats, other areas have been neglected. Tellingly, mid-market business leaders surveyed in Grant Thornton’s International Business Report (IBR) say that over-reliance on software is their weakest point in managing cyber and privacy-related threats.
It’s encouraging that business leaders acknowledge this. But now they must act, by improving their employees’ awareness and specialist skills in cyber security.
This doesn’t necessarily mean spending more money. In many cases, companies will be able to taper technology spending as they strengthen and invest in their business acumen, processes and in-house skills.
Customer trust is built on more than technology
“It is essential that businesses understand that investing in technology alone is not the only answer to reducing digital risk, and it will not protect them from losing customer trust should the worst happen” says Mike Harris, cyber security services, Grant Thornton Ireland. “A key starting point for companies is understanding the type of business they’re in, and the value they deliver to the customer”.
Once this is understood, companies will have a clearer idea of the potential impact a breach would have on that relationship, and can better work out how to mitigate this, through a range of measures. Internal governance, processes and people are the other crucial ingredients here.
Take a casino chain as an example. Many casino customers are high-net-worth individuals, who take the security of their financial data – such as transaction history and payment information – extremely seriously. The casino can have the best technology systems in place to protect this data, but it is not enough in isolation.
The company must have robust governance procedures, customer relationship managers and trust policies in place to complement the technology and to protect the company’s reputation in the event of a breach. In this example, the value the casino provides to its customer revolves around customer service, trust and entertainment – with technology acting simply as an enabler to make this happen. Therefore, the company’s approach to digital risk must mirror this – with robust trust procedures around in place, complemented by top-class technologies.
Boosting awareness of human risk management
Understanding that there is more to managing digital risk than relying on technology is just the first step. Companies must then take a number of non-tech measures to protect themselves.
New ways to raise awareness
Companies might be investing in sophisticated cyber security technology, but that won’t necessarily prevent the human error that’s behind many cyber breaches. After all, it’s the human workforce that responds to phishing emails and installs unauthorised software.
Managers can address this by increasing awareness of cyber security issues across the business. But how to do this effectively? Businesses have been running cyber security webinars and mandatory training programmes for many years, yet human error continues to open them up to cyber attack. A new form of education is necessary.
Christos Makedonas, technology risk leader at Grant Thornton Cyprus, says that shorter training formats would help. “No one has time to watch hour-long training videos,” he says. “They should be shortened to a maximum of two minutes. You also need visual reminders – such as banners around the office and messages on screens – to remind people of best practice.
“Businesses should then simulate phishing attempts, and the employees that respond to them can then be given further training. We’ve found these sorts of training programmes to be much more successful than conventional webinars.”
Identify vulnerabilities first, invest later
Businesses need to understand where they are vulnerable to cyber attacks and data-protection breaches before investing in preventive software. This requires specialised skills that most cyber security functions don’t have.
“Businesses need cyber security and privacy-related skillsets to help map out their data and understand their regulatory requirements – particularly in a cloud environment,” says Mike Harris, partner, cyber security services, Grant Thornton Ireland. “They also need cyber technology skills around the technologies they are using.
“For example, if you are using cloud services provided by Amazon or Azure, you need to have the security skills in house to work out what they will and will not do regarding cyber security. That skills component is often overlooked.”
Advanced analytical tech needs advanced analytical minds
Many businesses have invested heavily in advanced analytical cyber security technologies that help identify new threats and vulnerabilities. But these are only as good as the workforce that can interpret the results and implement corresponding changes.
“Lots of people look to technology as a silver bullet, but it isn’t,” says James Arthur, partner, head of cyber consulting, Grant Thornton. “Many companies spend a lot of money on AI-driven, behavioural analytics cyber security software, which can be really useful in some circumstances. However, you normally need to spend an awful lot of human time training it to ensure it delivers useful insights. Then, you need a human at the end of that chain who can look at the output and make/approve changes.”
Insure against the inevitable
“There are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again.”
These are the words of former FBI director Robert Mueller back in 2012.His message is clear – and just as relevant today as it was seven years ago: a breach is inevitable. It makes a strong case for investing in insurance as another way to manage digital risk.
“Any reasonable cyber security programme has to have an element of detection, response and insurance, because cyber events will happen,” says Harris. “We see increased adoption of insurance that covers both cyber attacks and data privacy regulatory breaches. But while it’s imperative and its use is increasing, the majority of businesses still don’t have this type of insurance or aren’t protecting the right data assets.”
Understand your most valuable data assets and protect accordingly
Businesses should undertake a structured programme to assess and understand their data assets, using a categorisation and classification process. Then, they can identify their ‘crown jewels’ and invest in appropriate insurance cover.
But how do you do this? One way to identify your most critical data is to think like a hacker and then consider the maximum damage they could cause. “The current data security environment is consistently evolving with new threats and vulnerabilities,” says Harris. “Leaders have to be willing to step into the shoes of cyber criminals, understand the threats these groups pose and come up with proactive strategies to protect their business’ interests.”
Which email threads could a former employee leak to embarrass their former managers? What intellectual property and trade secrets would be of interest to a foreign power? And how might a cyber criminal use your data to try to extort money from your business? These are just some of the questions you need to ask before purchasing insurance as part of your digital risk management plan.
Five recommendations for balanced cyber risk management
- Companies must understand that the increasing amount of data that customers share with brands means that trust is more important than ever. It’s essential that businesses understand the necessity of trust management, and that digital risk policies and procedures go a long way to ensuring this.
- Traditional approaches to cyber training are not working. Businesses should develop shorter, more frequently distributed training videos and simulate phishing attempts to better educate their workforces.
- Businesses need to identify and map out their digital vulnerabilities. They need to recruit staff with specialised cyber skills that complement cyber security technical skills. This will ensure that their investment in preventive software is focused on the right areas.
- All businesses will suffer a cyber attack – no matter how much they invest in preventive software. Investing in insurance can bolster your risk management but it is crucial to insure your most valuable data assets and explore specific insurance that covers both cyber attacks and data-privacy breaches.
- Once insurance is secured, businesses must be vigilant about adhering to the terms and conditions. If they fail to install updates, it could nullify the insurance.
These recommendations must be implemented in the context of businesses’ specific digital risk environments. The first step for business leaders is to understand their specific vulnerabilities and threats. Only then can they implement the most relevant technologies, training initiatives and insurance coverage.
If you would like to discuss any of the areas raised in this article, please contact our Business Risk expert Georg H. Jeitler