Why Auditors Should Care About Security and What Is The Gold Standard?

Accountancy practice management software has come a long way. Today, features like automated billing and reconciliations are easily integrated into the day-to-day practice workflow of Wolters Kluwer Tax & Accounting UK customers.

Our employees work side by side with our customers to create and manage these solutions – driven by a deep understanding of their needs and addressing the rapid changes in their environment.

However, it’s often hard to look beyond improving performance in day-to-day operations. Amid Brexit, the COVID-19 pandemic and other disruptions, accountancy practices and their clients are dealing with an unpredictable economic landscape. Future business planning can appear daunting.

However, technology can support accountancy practices (and their clients) in making informed business decisions, and planning for the future. In the first part of our Accountancy Practice Management for Future-Fit Growth series, we’ll explore how they can use technology to define and easily track Key Performance Indicators (KPIs). Doing so gives practices closer control of performance tracking, and deeper insights that will inform strategic growth plans.

Saving Time

For several decades, business technology platforms have enabled practices to track performance metrics that they have customised. This highlights areas that qualify for improvement and underpins strategic planning.

Contemporary technology, such as CCH KPI Monitoring, makes setting up KPIs faster and easier for accountancy practices than ever before. This is vital today. The current business landscape demands that firms assess and amend KPIs more frequently, based on fresh market variables. KPIs such as client retention rate and business time-to-recovery have become increasingly prominent performance indicators in the past year. If clunky technology makes KPI management difficult, practices have less time and insight to plan future growth.

Reducing Risk
CCH KPI Monitoring makes it far easier to track KPIs and report on them. This is fundamental in minimising risk. For example, if a KPI is set to track and escalate debt filtered by overdue dates, the ability to easily set alerts and automatically generate reports is critical to practice performance management.

Some practices are manually running monthly reports to measure KPIs. Others are running real-time reporting engines, a key feature of CCH KPI Monitoring. This latter solution allows practices to review essential data at any time – covering both performance management and compliance requirements. They can do so remotely or on-premise.

This means that firms can assess issues before they become problems, and thus act proactively. Real-time reporting is a true asset in building a future-fit practice.

The Proof is in the Practice
A number of Wolters Kluwer customers have been using CCH KPI Monitoring for several years now. Our customers look to us when they need to be right. Ryecroft Glenton has successfully integrated CCH KPI Monitoring with its own system. This consolidates information from several sources, including CCH Central and CCH Practice Management.

“We can use the year end date to trigger a sequence of reminders. Have we asked for the books? Have they been received? If a request to a client has been outstanding for a certain period, the partner will receive an alert via email. For limited companies, we can monitor the corporation tax and Companies House filing deadlines – as well as the different deadlines for pension schemes”

– Ian Smith, partner at Ryecroft Glenton

Corporate events agency who benefited from greener graphics initiative

“Apogee are not just aprinting company, theyconsult with us and go onto deliver a full end to endservice from concept toinstallation. They go aboveand beyond and we lookforward to continuing ourjourney with them”

Corporate events agency who benefited from greener graphics initiative

“Apogee are not just aprinting company, theyconsult with us and go onto deliver a full end to endservice from concept toinstallation. They go aboveand beyond and we lookforward to continuing ourjourney with them”

Corporate events agency who benefited from greener graphics initiative

“Apogee are not just aprinting company, theyconsult with us and go onto deliver a full end to endservice from concept toinstallation. They go aboveand beyond and we lookforward to continuing ourjourney with them”

Corporate events agency who benefited from greener graphics initiative

“Apogee are not just aprinting company, theyconsult with us and go onto deliver a full end to endservice from concept toinstallation. They go aboveand beyond and we lookforward to continuing ourjourney with them”

While security is unlikely to be at the forefront of decision-makers at audit firms when adopting new technology tools, it is one of the most critical elements to consider when reviewing which vendor tools to incorporate into audits.

Confidence around the integrity of data in audits is vital, so practitioners must have full assurance that transaction data are accurate and complete, and haven’t been tampered with. Ultimately responsibility will lie with the partner signing off the job upon completion.

There are several different security certification standards worldwide which broadly align with similar principles, with just a few nuances.

It’s worth taking the time to understand why security is important and what to look for from vendors, as this will de-risk audits and be critical when weighing up which audit software vendors to work with.

What is security?
Data security covers three critical tenets: confidentiality, integrity and availability.

1. Confidentiality
Business software needs to maintain the data they handle confidentially to stop it from falling into the wrong hands and to give purchasers the confidence that data will not be misappropriated.

Failure to do so exposes business users to litigation risks and damage to brand reputation. Listed companies can be particularly affected by this due to adverse movements in their share price.

2. Integrity
Integrity in the context of data security means users must be able to rely on the accuracy and validity of data processed by business software.

Data needs to be accurate and consistent over its lifecycle, as failure to do so means companies cannot rely on it.

3. Availability
Availability is critical to data security, as systems and applications need to make data available whenever users need it.

Software must be sufficiently robust to withhold denial of service attacks so that users can access data uninterrupted at all times.

How These Principles Of Security Meet The Needs Of Auditors
Security should be a key consideration in vendor selection for auditors. These principles are foundational elements for software security controls that support internal controls for financial statement auditing.

Auditors need to rely on these security controls to complete jobs with the relevant levels of assurance. For example, they need to put complete reliance on the integrity of bank balance confirmations at year-end to prove that the balances have been reconciled correctly.

Failing to have confidence in the security of data used in these processes impairs the ability of partners to sign off audits.

It’s also essential for audit firms to be able to rely on the security of their software vendors to use automation to assist and complement the efforts of staff. If audit partners can’t be confident of the underlying security of the tools used, jobs will have to rely on more manual and human efforts and will take up additional staff resources. They will also take longer to deliver, eroding profit margins.

The Gold Standards To Look Out For
To satisfy security requirements, at a minimum, audit firms should adopt vendors with an Information Security Management System (ISMS) that is broad and complete in its scope. This must address all the risks and threats related to confidentiality, integrity and availability.

Similarly to the assurance standards of financial statements, there are international certifications for security. Adopting vendors with these in place should give auditors extra comfort that they are abiding by the highest security levels. The most widely used standards are SOC2 (more prevalent in the US) and ISO 27001 (more commonly used in Europe). Both certifications will ensure the highest levels of security are met.

Review The Security Of Your Existing Vendors today
If you already work with audit technology providers, review their approach to security to make sure it is sufficiently fit for purpose. If formal accreditations aren’t held, reach out to suppliers and ensure they have an ISMS in place.

At Circit, our security meets the highest standards for ourselves and our clients. As well as being formally ISO 27001 certified, the platform is fully GDPR compliant, and all our content is encrypted. We are currently undergoing SOC2 accreditation.

Security of data is bolstered by the creation of a comprehensive and immutable audit trail, between all parties, including audit firms and their clients, that embeds timestamps IP addresses and end-user information.

‍Learn more about our approach here.

Apr 2023

Better together: 3 reasons automation is reviving not replacing your resource managers

As the war for talent continues, accounting firms are having to do more with less: less resources, less time, and less budget. This puts increasing pressure on existing teams to become more productive and streamline their processes. However, many firms have missed a trick.

Introduce business print into your sustainability strategy

When formulating your ESG strategy, business print is a vital area to address – and sustainability, cost-efficiency, and maximum device uptime can all be attained through refurbished print devices.

How is AI driving the progress of the accountancy industry?

AI will be crucial for better understanding user intent, automating routine processes, analysing and simplifying large data sets, and streamlining how accountancy firms manage information, according to Ville Somppi, Vice President of Industry Solutions at M-Files

Be the king of customer care this spring

This spring is more than just a sea of tulips and daffodils and longer evenings, it’s also awash with five public holidays as Easter, the May bank holidays and the King’s Coronation herald welcome time-off for much of the nation.  But these extra holidays, especially when savvy employees tag them onto longer breaks, can cause serious operational challenges.