Spreadsheet Woes – Limited Features For Easy Adoption of a Control Framework

Like it or not, regulations are here to stay and for a company to comply with them, its IT and financial systems will have to be equipped with a suitable control framework. One common stumbling block to such an implementation is a company?s over-reliance on spreadsheets.

Why is it so difficult to adopt controls for a system that’s reliant on spreadsheets? To understand this, let’s pinpoint some of the strongest, most powerful attributes of these User Developed Applications (UDA).

By nature, spreadsheets are the epitome of simplicity: easy to develop, easily accessible and easily altered. All computers in your workplace will most likely have them and everyone in your organization may be sharing them, making their own versions, and storing them in personal folders.

Sad to say though, these strengths are also control weaknesses and constitute the very reasons why spreadsheets require effective risk management.

Easy to develop. Being easy to develop, most spreadsheet systems are created by non-IT users who have limited knowledge on best control practices. Being constantly under time pressure, these ?developers? may also relegate documentation, security, and data verification to the back burner in favour of coming up with a timely report.

Easy to access. Information in a spreadsheet can be opened by practically anyone within the organization?s network. Who accessed what? And when? If anything goes wrong, it would be difficult to identify the culprit, and the failure to pinpoint responsibility for erroneous data could lead to bigger, more costly mistakes.

Easy to alter. Lastly, if the information is easy to access, then it can also be easily altered, consequently making reports more prone to both accidental errors and fraudulent modifications.

The rise of multimillion dollar scandals due to accidental and intentional spreadsheet errors have prompted regulatory bodies to publish guidelines for mitigating spreadsheet-associated risks. These controls include:

  • Change control
  • Version control
  • Access control
  • Input
  • Security and data integrity
  • Documentation
  • Development life cycle
  • Backup and archiving
  • Logic inspection/Testing
  • Segregation of duties/roles, and procedures
  • Analytics

In theory, these controls should be able to bring down risks considerably. However, because of the inherent nature of spreadsheets, such controls are rarely implemented effectively in the real world.

Take for example Security and Data Integrity. One of the most common causes of spreadsheet error is due to ?hardwiring?. This happens when values are inadvertently entered into a formula cell, naturally changing the logic of the spreadsheet.

As a way of control, cell locking can be applied on the formula cells to prevent users without the proper authority from making any changes. However, when reporting deadlines approach drawing spreadsheets to the forefront of data processing, more people are given access rights to the locked cells. Ironically, it is during these crunch times, when errors are most likely to happen.

Because the built-in features of a spreadsheet support none of the controls mentioned above, some companies are tempted to purchase control-enabling programs for spreadsheets just to continue using them for financial reporting. But although these programs can integrate the required controls, you?d still be interacting with the same complex and outdated interface: the spreadsheets.

Thus, these band-aid solutions may not suffice because the root cause of these problems are the spreadsheets themselves.

Learn more about our server application solutions and discover a better way to implement controls.

More Spreadsheet Blogs


Spreadsheet Risks in Banks


Top 10 Disadvantages of Spreadsheets


Disadvantages of Spreadsheets – obstacles to compliance in the Healthcare Industry


How Internal Auditors can win the War against Spreadsheet Fraud


Spreadsheet Reporting – No Room in your company in an age of Business Intelligence


Still looking for a Way to Consolidate Excel Spreadsheets?


Disadvantages of Spreadsheets


Spreadsheet woes – ill equipped for an Agile Business Environment


Spreadsheet Fraud


Spreadsheet Woes – Limited features for easy adoption of a control framework


Spreadsheet woes – Burden in SOX Compliance and other Regulations


Spreadsheet Risk Issues


Server Application Solutions – Don’t let Spreadsheets hold your Business back


Why Spreadsheets can send the pillars of Solvency II crashing down

Advert-Book-UK

amazon.co.uk

Advert-Book-USA

amazon.com

Check our similar posts

Authentication and Access Control

Threats to your data can come from external or internal sources.

  1. There are individuals who don’t have the authorisation but are driven by malicious intentions to gain access to certain information. This may refer to individuals who already belong to your organisation (but don’t have the necessary access rights) as well as those who don’t.
  2. There are individuals who have both the authorisation and, unfortunately, the malicious intentions over certain information.
  3. Finally, there are individuals who have the authorisation, no malicious intentions, but have accidentally exposed the information in question to those without the proper authority.

While curbing threats 2 and 3 would require other methods, threat #1 can be countered if the right authentication and access control systems are in place.

Here’s what we can do for you:

  • Work with your key personnel to determine who gets access to what.
  • Help you decide whether a single factor or a two-factor authentication (2FA) is appropriate for your organisation and recommend which factors are most suitable. Login methods may include but are not limited to the following:
    • biometric devices
    • Kerberos tickets
    • mobile phones
    • passwords
    • PKI certificates
    • proximity cards
    • smart cards
    • tokens
  • Install the necessary infrastructure needed for the factors chosen. For instance, if you opt to use biometrics, then biometric scanners will be installed. We’ll make sure that the authentication terminals are situated in places where achieving optimal traffic and work flow has been taken into consideration.

Other defences we’re capable of putting up include:

Fine-tuning your Operations and keeping our staff Happy with FieldElite

They are the engine that drives your operations, but are you really giving you value for your money? How much time is spent by your personnel on lengthy paperwork and record-keeping, as opposed to actually providing the service to your customers? Manual tasks create bottlenecks and slow your operations, which in turn affects service delivery and customer satisfaction. You want to reach more clients and boost your brand image, growing your market share and generating more revenue. Field Service Management (FSM) software comes in optimise the operations of your mobile workforce, cut down resource wastage, and enhance your productivity as a firm, by actually enabling your field staff to get more done, thus achieving their individual goals. In fact, according to a report published by Fortune Business Insights?, the global FSM market- which stood at $2.29 billion as recently as 2018, will have expanded to $7.27 billion by 2026. What does this mean for your employees, and how do they benefit from FieldElite?

  • Skipping the paperwork with end-to-end automation

Filing reports, keeping track of equipment used, working on the Excel sheets for multiple jobs on a daily basis, all through to the routing and billing- it can be a logistical nightmare. It’s not just about the hours spent poring through documents and typing away at calculators. Manual work exposes you to the risks of human error. Missing records, inaccurate assessments of the situation on the ground due to the overwhelming data streaming in, putting the head office staff under strain- it all hampers the productivity of the company. 

Take scheduling for instance. You have different employees, and various jobs that need their attention, at different locations. It can be a plumbing company whose clients have water filters that need to be repaired, gas boilers inspected, leaking pipes fixed, and others who need new installations to be set up. Assigning your personnel to the different situations will need to take into account the type of job, and the amount of time that it will require, aspects such as the location and the crew that is closest to it. At the head office you will want to keep tabs on the jobs that are in progress, pending, complete, those on hold, and even those that have been cancelled. Running all these through traditional manual processes is enough to drive you to the edge. What’s more, tasks that slip through your fingers amidst the confusion will result in negative feedback from your customers- which you don’t want hitting your brand.

With a field service job management software like FieldELite, you get to handle it all from one dashboard. Optimise your service delivery using the accurate scheduler, that allows you to account for the location of your employees, the status of the job- from the urgent ones like emergency tasks, to the normal duties such as routine maintenance, and low-priority tasks. The field service scheduling software comes with a real-time location feature that allows you to determine the employees closest to the client’s premises who will be appropriate for the job, map out the service areas and give you a birds-eye view of all the operations on the ground, while being updated with the progress of each specific task. Less time is spent travelling to- and from the central office, and more on actually tending to your client’s needs. You can even have situations where you can assign end-of-day tasks to employees who will be passing on that route on their way home.

  • Enhanced resource utilisation that promotes personal and professional development

Skill is key across the industries- from electrical services, solar panel installation, landscaping, home remodelling, pest control, plumbing, HVAC system maintenance, to construction and property management. For the job to be done appropriately and make your clients happy, you want to assign the task to an employee who is particularly proficient at it. This tends to be glimpsed over during manual scheduling since the personnel at the head office will be swamped with so many files, and will pick the first one that comes close to fitting the job description, leading to overlapping of roles. Sure, they may get it done, having seen their colleagues do it and even helping them out when they worked together before on similar projects- but will it be up to the required standard? On the other hand, the FSM allows you to ensure that you get the right technician for the task- who will be more motivated, boosting their performance.

What about accidents? Your employees want to feel safe as they go about their mandate. Many of the field service jobs are hazardous- such as electrical repair jobs, window cleaning tasks at high rise buildings, to elevator repair jobs where a slight glitch can lead to severe ramifications. Field service management software also comes in handy here, where the head office can be notified of any emergency the moment it occurs, and arrange for the necessary action to be taken immediately. That way, your employees will not feel neglected while they are out in the field, showing them that their safety is a priority to your business- which in turn increases their morale. 

  • Readily available knowledgebase and feedback system

When the employees have been assigned a specific job, they will require certain information about it. This includes the scope of the task, history of previous repairs or maintenance that was carried out, accompanying images if needed, risk assessment, any hazards or contaminants that they will need to prepare for, to notes left by technicians who had handled it. Having to keep checking their email, or picking up documents at the office for the day’s job and walking around with them all day as they tend to one customer after another, will slow things down, and not to mention frustrate them. However, the FSM system is directly accessible by the employees via app on their phones. The information needed for each specific task will thus be at their fingertips, speeding up the process and ensuring that they will be ready for each project being handled. 

While carrying out the job itself, the employees will use the very same app to update the system on how it is progressing, chat with the staff at the head office, update the inventory and even place orders for extra parts if necessary. Since mobile service management software apps like FieldElite also work in offline mode, the photos, reports and other entries that are made are collected by the app and saved on the device. Once a network connection is established, they are then updated to the central database- thus ensuring that the job can proceed regardless of the location. 

Once the job is completed, the customer input is also taken, registered in the system through their e-signature. A signoff comment included gives the customer the opportunity to indicate their experience with the job, and the feedback that they would like to provide. In case the job has not been completed, then the scheduling software kicks in, putting it in queue for another appointment to take care of the task, or resolve the issue that had caused it not to be completed the first time. The completed tasks head right to invoicing, which is also handled within the field service management platform, making it a seamless task for the head office staff.

IT Security and the Threats from Within

When the economy makes a downturn, companies, then eventually, employees suffer. Now, I’m sure you’re wary of frustrated laid-off employees stealing valuable data. Who knows? That information might end up in the hands of your competitors. Then as if that threat weren’t enough, there may be jobless IT specialists who turn to rogue activities either to earn a quick buck or simply out of lack of anything productive to do.

That’s not all, as we’ve got more news for you. When we think of IT Security, what instantly comes to mind are hackers and acts laced with mal-intent. However, a recent worldwide survey on IT security showed organisations were more inclined to expect data leakage as a result of accidental exposure by employees (45%) than of anything maliciously performed by an external entity (15%).

If you’re not aware of this, you’ll be focusing your spending on protection against incoming attacks while exposing your innards through accidental leakages. Our solution? While we’ll naturally provide your data with protection from outside threats, we’ll also put special attention in protecting it from the inside.

The defences we’ll put up include:

  • Data Loss Prevention
  • Network Security
  • Firewalls
  • Malware
  • Authentication and Access Control
  • Mobile Security
  • Forensics

Ready to work with Denizon?