-
Audit of annual and consolidated financial statements
We place particular emphasis on customized solutions and international service and adapt our services to your needs.
-
Assurance related advisory services
Assurance related advisory services are based on the knowledge and expertise that are the staff of life of our auditors.
-
Global audit technology
We apply our global audit methodology through an integrated set of software tools known as the Voyager suite.
-
Accounting related consulting
Accounting in accordance with UGB, US-GAAP or IFRS is in constant motion. The integration of new regulations into their own accounting systems poses special challenges for companies.
-
Corporate Tax
We are your problem solvers for corporate tax issues
-
Restructuring, Mergers & Acquisition
Expertise and creativity for the perfect structure
-
International Tax
We are here, whenever our clients require our assistance
-
Transfer pricing
We are your experts for an optimal transfer pricing structure
-
Indirect Tax & Customs
We take care of your indirect taxes so you can take care of your business
-
Private Wealth
We are your competent partner in the field of Private Wealth Tax Services
-
Real Estate Tax
We are a valuable partner at every stage of your property's life
-
Global Mobility Services
Local roots and global networking as a secret for successful assignment management
-
Advisor for Advisor
As advisors for advisors, we support in complex situations
-
Accounting & Tax Compliance Services
Grant Thornton Austria - Your Partner for Experts for Accounting & Tax Compliance Services. In an evolving regulatory landscape, efficient accounting, tax compliance, and financial statement preparation processes are crucial for maintaining an accurate and up-to-date view of your company’s financial position while ensuring compliance with all legal requirements. We provide tailored solutions that not only save your time and resources but also ensure compliance with complex regulations. Our experts are here to support you, allowing you to focus on your core business.
-
Payroll & People Advisory Services
Ensuring Compliance, Efficiency, and Strategic HR Solutions In an evolving legal landscape, it is crucial for companies of all sizes to have efficient and legally compliant payroll accounting systems. The ever-changing regulations and increasing complexity make this an ongoing challenge. At Grant Thornton Austria, we provide comprehensive, precise payroll processing as part of our Payroll & People Advisory Services. Additionally, we offer customized advisory services to help clients optimise their HR strategy, improve operational efficiency, and minimize potential risks.
-
Tax Controversy Services
Your Partner when it matters most! In increasingly complex environment and considering frequent changes in tax regulations, businesses are facing intensified scrutiny from tax authorities. This has resulted in a significant rise of complex tax audits, investigations and potential disputes. Our Tax Controversy Services are tailored to help you navigate these challenges proactively and effectively. Our experts will guide you through all stages of tax proceedings, ensuring robust defence of your position and advising you on preventive measures to minimize the risk of future tax disputes.
-
Tax Technology Services
Your digital partner for an efficient future! In an increasingly digitalised business world, companies must constantly look for optimisations and adjustments to ensure their long-term success. In order to best prepare for the future and to achieve efficiency increases and process optimisations in the digital area, the experts at Grant Thornton Austria are at your side as a reliable partner as part of our Tax Technology Services.
-
Valuation
Valuations are a core competence of Grant Thornton Austria. As auditors and tax advisors we combine profound know-how with our practical experience to offer you customized solutions for your valuation assignment. Our industry expertise is based on years of services to our clients, including listed companies as well as owner-managed companies with an international focus. We advise on valuation matters related to arbitration and provide expert opinions.
-
Forensic Services
When it comes to risks in business, our experts are on hand. We support you not only in suspicious cases or in disputes, but also develop suitable strategies in the area of prevention to avoid serious cases as far as possible. Our Cyber Security team helps you to keep your networks and applications secure and is quickly on hand in the event of a security leak.
-
Cyber Security
Cyber incidents, IT system failures, the resulting business interruptions and the loss of critical data are one of the greatest business risks for companies. Recent cases underline the need for strategic protection and awareness of the issue and require a holistic approach and technical expertise that takes into account all legislative, regulatory and technical aspects of cyber security to protect companies against the daily increase in cybercrime incidents.
-
Sustainability Services
Sustainability is no longer a trend, but the only way to create a future worth living. Our experts will support you in successfully developing your sustainability strategy and preparing your sustainability reporting in compliance with regulations.
-
Transaction Support
We can support you throughout the transaction process – helping achieve the best possible outcome at the point of the transaction and in the longer term.
-
Merger & Acquisition
Companies start new activities and separate from old ones, cooperate and merge. Markets and competitive conditions are subject to constant and increasingly rapid change. As a result, existing business models are changing. Some companies have to restructure and reorganize. But new business opportunities also open up.
-
Restructuring & Going Concern Forecast
Restructuring & Going Concern Forecast: Bundled services for your strategic, operational and financial decisions offer the right answers for companies, banks, shareholders and investors.
-
Internal Audit
Internal Audit helps companies and organisations to achieve their goals by analysing and evaluating the effectiveness of risk management, controls and management and monitoring processes. Internal Audit focuses on independent and objective audit (assurance) and consulting services that improve the value creation and business activities of your company.
-
Expert dispute resolution & advisory
Grant Thornton Austria offers comprehensive services in the field of business-oriented expert services with a broad range of competencies from banking to communication. The core activity of experts is the objective recording of findings and the preparation of expert opinions - regardless of all external circumstances. Our experts Gottwald Kranebitter and Georg H. Jeitler, as sworn and court-certified experts, ensure that the highest professional standards and the principle of objectivity are observed.
-
Blockchain and Crypto-Asset
Blockchain as a carrier technology for crypto currencies and smart contracts, among other things, is becoming increasingly important. Grant Thornton Austria offers comprehensive audit and confirmation services for block chain technologies and business models.
-
Corporate & Brand Strategy
We support you in developing growth strategies for a sustainably successful future and in maximizing the potential of your brand.
-
International Project Coordination
Our International Engagement Management team is your central point of contact for international projects in all our service lines. We take care of operational project management for you and act as a central point of contact and coordination for your projects. We support companies that start international projects from Austria as well as companies from abroad that want to gain a foothold in Austria or use Austria as a hub for their international projects, especially in the DACH (Germany, Austria and Switzerland) and CEE region.
-
International Desks
As a member of the Grant Thornton network, we guarantee direct access to resources from our worldwide circle of partners. This global connection enables us to seamlessly integrate highly qualified specialists and industry experts from different countries around the world into our teams. Through our broad perspective and diverse expertise, we ensure that we can optimally meet the individual requirements of our clients in an increasingly globalised economy.
Jutting out into Austria’s skyline, emerging from the surrounding forest, lies an ancient medieval wonder – Hochosterwitz Castle. The thousands of tourists that flock here every year soon learn a surprising fact: it is one of only a very small number of castles around the world that has never been breached.
Its inhabitants thank Baron George Khevenhüller. He knew that holding the castle was strategically important to the region. Fearing an onslaught of marauding armies, he ordered the construction of a series of 14 fortified gates on its gentlest slope, the most likely avenue of attack. Each has a unique defence structure designed to flummox invaders. It worked. The most successful conqueror only reached the fourth gate.
Today’s technology companies can learn something from Khevenhüller. They may not fear foreign conquerors, but they do face attack from malicious actors that are set on stealing their IP or the personal data they hold.
Like Khevenhüller, they must identify the assets that are most important, consider the most likely lines of attack, and tailor a defensive strategy accordingly.
Of course, a holistic digital risk strategy (which should span cyber security and data privacy risk across the enterprise) must incorporate more than defending against cyberattack. Ever stricter data protection regulation, not to mention the public’s growing awareness of privacy, means technology companies must regularly reexamine privacy controls. Data asset categorisation is essential in this process too.
Technology companies are most vulnerable
The annual global cost of cybercrime is estimated to hit US$6tn in 2021, up from US$3tn in 2015.(i) James Arthur, partner and head of cyber consulting at Grant Thornton UK agrees. “Technology companies are particularly impacted.”
“It is important for technology companies to develop a digital risk strategy based on their most strategically important data assets,” says James. “After all, they typically hold more data than non-tech companies and often lead the way in adopting new technologies, which can create cyber vulnerabilities.”
B2C technology companies also house and process huge volumes of sensitive, personal information. It is therefore no surprise that IT was the most targeted sector for web application cyber-attacks last year. (ii)
Added together (and as revealed in our previous cyber research) this means that technology companies are now more vulnerable to cyber attacks and customer data breaches than ever before. This not only exposes them to hefty regulatory fines, but also business-crippling reputational damage.
Get ahead of regulators
In the last three years, technology companies made great efforts to comply with new data privacy and protection regulations, not least GDPR. Most large technology companies are now compliant, but they must remain vigilant. Data protection regulations are becoming stricter and the penalties for non-compliance are increasing. What’s more, customers are becoming more aware of privacy issues and are prepared to punish companies for not taking it seriously.
Technology companies must respond by going above and beyond the minimum required by the regulator on privacy. “Tech companies today need to go beyond the basics to ensure compliance because these companies service their clients in a regulated industry and are largely data controllers, while their clients may be data processors,” confirms Akshay Garkel, advisory partner at Grant Thornton India.
“Cloud service providers may be required to maintain 10 out of 20 (for example) data controls for minimum compliance. But they shouldn’t stop there. In the spirit of ensuring security and privacy they might want to go at least four or five notches above the minimum expected from the regulator because clients will demand it.”
The tightrope between privacy and analytics
But a careful balance must be struck. Customers will appreciate technology companies going the extra mile on privacy, but not if it restricts their ability to receive personalised offers or the development of products tailored to their individual needs.
Individual companies aside, overbearing privacy law prevents the use of data to drive positive societal outcomes, be that in relation to healthcare, disease monitoring or traffic accident reduction. So, governments and regulators must also be careful not to enact overly restrictive privacy laws.
“The balance between data protection and using data for the public good is a key debate for society,” says Nick Watson, partner and technology sector lead at Grant Thornton UK. “Germany has very strong privacy rules, but this has resulted in traffic accident data not being collected on particular stretches of roads. Therefore, they weren’t able to collect data that would have pinpointed a particular accident hotspot. You could take data privacy to a level where even non-personalised data is not collated on a group-wide, anonymous basis. In this case society would lose out.”
The middle-man in surveillance
Judging how far to go on privacy has become more complex because, like it or not, many technology companies are now surveillance intermediaries. Whether it be messages sent on social media, recordings from Echo devices or location data stored on smart phones, technology companies possess information that is useful for fighting crime.
There is no question that they must comply with the law regarding requests for information, but they have discretion over how swiftly they reply and the depth of information they provide.
Many now wonder whether law enforcement data requests should be processed without question, or heavily scrutinised in the interest of preserving privacy.
In the past, some technology companies resisted rather than cooperated with law enforcement. But as technology companies unwittingly accumulate more and more vital evidence, there is controversy in some markets about which data is shared, how much and for what purpose.
After all, being perceived as uncooperative with counter-terrorism forces is far more damaging than not adhering to the absolute strictest privacy standards.
Strengthen protection of digital assets
How should technology businesses respond to rising digital risk? First and foremost, they must classify, categorise and map out their digital assets to understand the specific risks and value associated with them.
Armed with this insight, they should develop and implement a nuanced, risk-based digital risk strategy that fortifies the digital crown jewels – those deemed most critical to the business and its customers.
Of course, one company’s most valuable data may be completely unimportant to another. For example, fintech companies highly value customers’ financial information, entertainment technology companies place high importance on consumer preference data and high-tech companies treasure their IP.
This approach sounds sensible. But a surprisingly large number of technology companies do not do this, and instead rely on an outdated one-size-fits-all approach to cyber security and data privacy based on perimeter security.
Orus Dearman, managing director of risk advisory services at Grant Thornton US, explains how this classification process can lead to practical change that reduces vulnerability.
“We assisted a technology company client in performing a data categorisation process to enable them to efficiently identify sensitive and personal information within their databases and networks as part of an overall data inventory. This allowed the company to deploy data protection resources where they are needed and would have the most impact,” he says. “Now, if anyone wants to change anything to do with this data or these systems, the privacy team is brought into the process as part of the workflow.”
Bin useless data
In contrast, data revealed to be not at all useful to the business and not required for regulatory and compliance purposes should be deleted or appropriately anonymised. This reduces the risk of it being compromised.
Naturally, technology companies can be reluctant to delete information due to concerns they might need it for an audit or that it is essential for something they are unaware of. Data mapping helps realise interdependencies, which can assist in deleting data.
But data asset categorising doesn’t just reduce risk. It also creates value. This exercise might identify a dataset or combination of datasets that can be used to improve the efficiency of internal operations or gain insight into customer preferences.
When strategy changes, so should data categorisation
Technology companies must remember two things when profiling data assets. First, it is not a one-off exercise. They must constantly map out their digital assets as the nature of the threat changes and as their business priorities evolve.
Second, this task cannot be left to the information security officer or head of IT. It is a critical business decision that must align to business objectives. Senior business leaders must be involved in the process.
Drive competitive advantage through trust
There is a real opportunity for B2B technology companies to market themselves around digital trust. Those that demonstrate readiness to respond to a cyber threat, responsibly handle customer data and empower customers to manage privacy controls stand to gain a competitive advantage.
To start building trust, technology companies must offer value-added cyber security solutions such as malware and ransomware screening that plugs vulnerabilities as part of their core offering. Customers will also be impressed with suppliers that conduct comprehensive cyber security audits and produce independent assurance reports.
“Reports that demonstrate capability, security, and a serious commitment to risk management (such as SOC2 or ISAE3402) are without question a way for technology companies to differentiate themselves from the competition,” says Matthew Green, technology advisory partner at Grant Thornton Australia. “The more astute clients are now starting to ask for the validation and the ongoing assurance that the organisation is maintaining an appropriate level of data security and are requesting those reports as a way of demonstrating it.”
There are a number of security standards that technology companies can use to demonstrate best practice digital resilience. But because every technology company is different, these merely provide a starting point. Technology companies should evaluate what their customers want when it comes to privacy and security and prioritise this.
Consumers value control
The jury is out on whether B2C technology can truly differentiate themselves through digital trust. Still, there is no harm in making it incredibly easy for customers to identify and delete data that is held about them and manage privacy settings.
B2C technology companies must also make privacy policies crystal clear. Today, most are displayed in tiny lettering across multiple pages, making them impossible to decipher.
“Privacy should be an enabler and not hinder innovation. Companies who have embraced good privacy practices should use that as a branding platform in the market,” confirms Orus.
“Clearly communicating privacy policies in a transparent way is essential. The general trend for technology companies is to develop a user hub that allows users to see what data is being held about them and allows them to opt in and out of various things."
"Privacy regulations such as the GDPR and upcoming California Consumer Privacy Act (CCPA) require clear and concise privacy notices for applicable data subjects. However, for those of us that don’t fall into the GDPR or CCPA buckets, many user agreements are over a hundred pages long, so they can still be made more user-friendly.”
If you would like to discuss any of the areas raised in this article, please contact our Business Risk expert Georg H. Jeitler