Spreadsheet Fraud

To any company executive or business owner, the mere possibility of fraud can be enough to send alarm bells ringing – for good reason. In a prolonged recession, the last thing investors would want to discover is a huge, gaping hole where supposedly a neat profit should have been. Also to find out that such loss was brought about by deliberately falsified accounting and poor spreadsheet controls only makes the situation even more regrettable.

Why?

Because these losses would not have occurred had there been a stronger risk management program in place and more stringent quality control on critical data to begin with.

But given the nature of a spreadsheet system i.e. its sheer flexibility and easy accessibility, plus the fact that they were never intended to be enterprise-level tools, there are no hard and fast rules for auditing spreadsheets. Also because of the lack of internal controls for end user computing (EUC) applications, in this case spreadsheets, you can’t expect these systems to yield consistently accurate results.

In fact, most managers assume that major spreadsheet errors should result in figures that are blatantly out of touch with how things stand in the real world, making these errors easily detectable.

Well they assumed wrong. You’ll find cases where the losses ran to millions of dollars without anyone being the wiser.

In instances of fraud, the problem becomes more complicated as these errors are deliberately hidden and cleverly disguised, perhaps one erroneous cell at a time. Even if these cover-ups started out with smaller figures that may have had negligible impact on a company?s operation, the cumulative costs of these ?insignificant? errors multiply exponentially as the spreadsheets are reused and utilised as bases for other related reports.

While there is no generally accepted definition of the term ?spreadsheet fraud?, its quite easy to identify one when a case crops up. Fraud arising from spreadsheets are typically characterised by:

Fallacious inputs – correct figures are deliberately replaced with false values.

Erroneous outputs owing to data alteration – hyperlinks are linking to the wrong spreadsheets or cells; use of macros or special lines of code which are understandable only to the person who developed the code.

Concealment of critical information – can be done with easy ?tweaks? such as hidden rows and columns, using the same colour for both the font and the background, or hard coding additional values into a cell.

There is nothing really highly-sophisticated or technical in any of these methodologies. But without internal spreadsheet controls in place, it would take a discerning eye and a thorough review to catch the inconsistencies contained in a spreadsheet fraught with errors. Also, if these errors are knowingly placed there, the chances of finding them are close to nil.

Learn more about our server application solutions and discover a better way to protect your company from spreadsheet fraud.

More Spreadsheet Blogs


Spreadsheet Risks in Banks


Top 10 Disadvantages of Spreadsheets


Disadvantages of Spreadsheets – obstacles to compliance in the Healthcare Industry


How Internal Auditors can win the War against Spreadsheet Fraud


Spreadsheet Reporting – No Room in your company in an age of Business Intelligence


Still looking for a Way to Consolidate Excel Spreadsheets?


Disadvantages of Spreadsheets


Spreadsheet woes – ill equipped for an Agile Business Environment


Spreadsheet Fraud


Spreadsheet Woes – Limited features for easy adoption of a control framework


Spreadsheet woes – Burden in SOX Compliance and other Regulations


Spreadsheet Risk Issues


Server Application Solutions – Don’t let Spreadsheets hold your Business back


Why Spreadsheets can send the pillars of Solvency II crashing down

?

Advert-Book-UK

amazon.co.uk

?

Advert-Book-USA

amazon.com

Check our similar posts

Mobile Workforce Management in a nutshell

It is fairly common for businesses to have staff working across many different locations across the country or even the world.  Engaged in various activities like  door-to-door sales, delivery and installations, service maintenance, conducting inspections & investigations or even data collection.

Managing and co-ordinating tasks, scheduling activities, planning and monitoring activities and communicating can often be challenging.

Mobile Workforce Management is the automation of the entire end-to-end workflow management and operations of any field service workers. 

Mobile Workforce Management Synonyms

Mobile Workforce Management is also known as

  • Field Service Management
  • Job Scheduling Software
  • Job Management Software

Advantages of Mobile Workforce Management

It is increasingly clear that there needs to be a certain sense of discipline and streamlining of field operations and important to automate certain tasks within field sales and operations, primarily because it helps you to track your assets remotely and ensuring contact with your workforce when required. Enabling your team to get in touch when required.

Most importantly, engineers, sales representatives and customer care executives can easily send information, scan receipts, Invoice customers and retrieve other crucial information in a standardized and streamlined manner. Assisting in regulating your business and also bringing some order to what is usually a very chaotic mode of working.

Why choose Mobile Workforce Management

Work Force Management tools help you to stay in control. They assist in automating what can and should be automated leaving only the crucial human-human interactivity. Helping you to keep a record of all interactions and important data within a database, without you having to manually go through sales receipts, complaint slips and other such details.

A Field Force Management tool is a time-saver and efficiency tool for companies. Moreover, these tools help to automate several aspects of your day to day operations, leading to an increase in productivity and motivation.

Streamlining operations, will also ensure that important stakeholders are well informed and management visibility is enhanced. Helping your business to make smarter decisions and help serve your customers better.

Field Force Management is similar to an Enterprise Resource Planning (ERP) solution but is vastly different. It is specifically targeted at staff that work on the field and is intended to make their and your work more streamlined, transparent and easy to track.

Cloud based solutions help you automate

 Field Force Management is usually cloud based which means all data is stored and accessible on secure cloud servers. There is no question of losing important data or not being able to retrieve something important. If something goes missing, there will usually be a backup available. Field force management tools include the software, the hardware and also the kind of training that is required for users to use it efficiently.

The software usually helps in saving and processing information while the hardware helps employees to enter important data into devices while they are on the job. Sometimes, field force solutions can also be a mobile app which negates the need for a specific or special device.

This is very important when it comes to field jobs as carrying different devices can prove to be a cumbersome job. At the end of the day, field force solutions are meant to reduce the burden on staff and not actually inadvertently increase it.

Denizon?s FieldElite Mobile Workforce management application provides significant improvements in efficiency and service with a switch to digital working and the elimination of paperwork.

All the information that is stored on the cloud can be run through analytics software so that you get the kind of reports that you are looking for to improve your business.

Field Force Management Process

A field force management tool helps you to remain in contact with your staff while they are at work on the field. This helps you to track your personnel in real time. Field personnel or your staff can log in and enter their attendance using a smartphone. You can assign that particular day?s task remotely using a web console or your own smartphone.

Next, they can carry out whatever duties they need to while you get all the alerts that you set to receive. This helps to increase transparency. You can choose to receive alerts on your phone or on your desktop.

Finally, staff can tag completed tasks with audio and images, instead of they having to type reports. This helps to focus more on the job than on job reporting. Last but not the least, location tags help you to ensure that the job is done at the right place. Your staff will not be able to take your generosity for granted.

All in all, a field force management tool helps you to track and control your staff without you having to be physically present with them and this is the beauty of this tool.

Summary

Field Force Management helps companies to reduce administration expense and improve productivity. This helps to automate data integration which is usually done with the help of cloud servers. Moreover, you can set invoice parameters that help you to also keep track of stocks, inventories and engage in P.O. and task management.

A number of field force management users also use it as a tool to engage in credit management. Banks and insurance companies particularly find this tool helpful as payments can be received on the job, instead of asking customers to pay online or offline. This also helps in building valuable customer relationships and enhance loyalty.

Thirdly, a field force management tool helps to increase planning efficiency. This means, you will be able to allocate tasks and optimize routing. All this helps to increase your ROI at the end of the day and get back the money you invest on field force management.

Finally, you will have more control over productivity and sales thanks to automation of data collection. You will also have more control over the execution of tasks and that will invariably make your company leaner and smarter.

Authentication and Access Control

Threats to your data can come from external or internal sources.

  1. There are individuals who don’t have the authorisation but are driven by malicious intentions to gain access to certain information. This may refer to individuals who already belong to your organisation (but don’t have the necessary access rights) as well as those who don’t.
  2. There are individuals who have both the authorisation and, unfortunately, the malicious intentions over certain information.
  3. Finally, there are individuals who have the authorisation, no malicious intentions, but have accidentally exposed the information in question to those without the proper authority.

While curbing threats 2 and 3 would require other methods, threat #1 can be countered if the right authentication and access control systems are in place.

Here’s what we can do for you:

  • Work with your key personnel to determine who gets access to what.
  • Help you decide whether a single factor or a two-factor authentication (2FA) is appropriate for your organisation and recommend which factors are most suitable. Login methods may include but are not limited to the following:
    • biometric devices
    • Kerberos tickets
    • mobile phones
    • passwords
    • PKI certificates
    • proximity cards
    • smart cards
    • tokens
  • Install the necessary infrastructure needed for the factors chosen. For instance, if you opt to use biometrics, then biometric scanners will be installed. We’ll make sure that the authentication terminals are situated in places where achieving optimal traffic and work flow has been taken into consideration.

Other defences we’re capable of putting up include:

Knowing the Caveats in Cloud Computing

Cloud computing has become such a buzzword in business circles today that many organisations both small and large, are quick to jump on the cloud bandwagon – sometimes a little too hastily.

Yes, the benefits of the cloud are numerous: reduced infrastructure costs, improved performance, faster time-to-market, capability to develop more applications, lower IT staff expenses; you get the picture. But contrary to what many may be expecting or have been led to believe, cloud computing is not without its share of drawbacks, especially for smaller organisations who have limited knowledge to go on with.

So before businesses move to the cloud, it pays to learn a little more about the caveats that could meet them along the way. Here are some tips to getting started with cloud computing as a small business consumer.

Know your cloud. As with anything else, knowledge is always key. Because it is a relatively new tool in IT, it’s not surprising that there is some confusion about the term cloud computing among many business owners and even CIOs. According to the document The NIST Definition of Cloud Computing, cloud computing has five essential characteristics, three basic service models (Saas, Paas and Iaas), and four deployment models (public, community, private and hybrid).

The first thing organisations should do is make a review of their operations and evaluate if they really need a cloud service. If they would indeed benefit from cloud computing, the next steps would be deciding on the service model that would best fit the organisation and choosing the right cloud service provider. These factors are particularly important when you consider data security and compliance issues.

Read the fine print. Before entering into a contract with a cloud provider, businesses should first ensure that the responsibilities for both parties are well-defined, and if the cloud vendor has the vital mechanisms in place for contingency measures. For instance, how does the provider intend to carry out backup and data retrieval operations? Is there assurance that the business’ critical data and systems will be accessible at all times? And if not, how soon can the data be available in case of a temporary shutdown of the cloud?

Also, what if either the company or the cloud provider stops operations or goes bankrupt? It should be clear from the get go that the data remains the sole property of the consumer or company subscribing to the cloud.

As you can see, there are various concerns that need to be addressed closely before any agreement is finalised. While these details are usually found in the Service Level Agreements (SLAs) of most outsourcing and servicing contracts, unfortunately, the same cannot be said of cloud contracts.

Be aware of possible unforeseen costs. The ability of smaller companies to avail of computing resources on a scalable, pay-as-you-go model is one of the biggest selling points of cloud computing. But there’s also an inherent risk here: the possibility of runaway costs. Rather than allowing significant cost savings, small businesses could end up with a bill that’s bound to blow a big hole in their budget.

Take for example the case of a software company cited on InformationWeek.com to illustrate this point. The 250-server cluster the company rented from a cloud provider was inadvertently left turned on by the testing team over the weekend. As a result, their usual $2,300 bill ballooned to a whopping $23,400 over the course of one weekend.

Of course, in all likelihood, this isn’t going to happen to every small and midsize enterprise that shifts to the cloud. However, this should alert business owners, finance executives, and CEOs to look beyond the perceived savings and identify potential sources of unexpected costs. What may start as a fixed rate scheme for on-demand computing resources, may end up becoming a complex pricing puzzle as the needs of the business grow, or simply because of human error as the example above shows.

The caveats we’ve listed here are among the most crucial ones that soon-to-be cloud adopters need to keep in mind. But should these be reasons enough for businesses to stop pursuing a cloud strategy? Most definitely not. Armed with the right information, cloud computing is still the fastest and most effective way for many small enterprises to get the business off the ground with the lowest start-up costs.

Contact Us

  • (+353)(0)1-443-3807 – IRL
  • (+44)(0)20-7193-9751 – UK

Ready to work with Denizon?