EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients.
How EY can help
-
Discover how EY's technology transformation team can help your business fully align technology to your overall purpose and business objectives.
Read more
As per a report by EY and the Association of Certified Fraud Examiners (ACFE) Mumbai chapter, unsecure Wi-Fi networks, software vulnerabilities and a lack of cyber awareness among employees saw cybercriminals targeting organizational vulnerabilities during the pandemic. Ransomware attacks and social engineering risks increased by 53%, while 40% of organizations reported a cyber intrusion directed at their remote work environments.
From a compliance standpoint, critical background checks and verification procedures were also bypassed whilst onboarding new third-party operators (vendors, agents, contractors, etc.). For instance, a global IT solutions company that wanted to expand operations to India and Africa to drive its next wave of growth began operating shortly after conducting initial due diligence. However, just a few months later, the firm identified concerns such as employee — vendor collusion, misconduct, bribery, and corruption. Many issues were discovered during the vulnerability assessment, including kickbacks paid by a vendor to acquire lucrative projects, the existence of ghost employee accounts, inflated work hours being charged, and bid-rigging. Furthermore, third-party background checks revealed irregular payments and the disbursement of cash bribes to employees.
In the aftermath of the pandemic, as many companies focused on building digital-ready businesses quickly, security and compliance controls took a back seat. EY’s 14th Global fraud survey revealed that one in five respondents in the emerging markets did not conduct third-party background checks as part of their forensic due diligence programs. Threat actors have been quick to identify and leverage these security gaps and monetize it for maximum gains.
Security risks in the new normal
The hybrid model birthed by the crisis, presents both opportunities and challenges in terms of companies being able to manage their security controls. At the same time, external hackers are actively working to exploit vulnerabilities and breach company defenses for financial gain.