© Copyright Acquisition International 2026 - All Rights Reserved.

Article Image - Current Approach to Due Diligence  Requires Rethink
Posted 30th April 2015

Current Approach to Due Diligence Requires Rethink

Completing a corporate transaction without rigorous financial due diligence is unthinkable. Yet, despite numerous well publicised incidents of cybercrime, investors remain blasé about the potential impact of cyber risks on long term value.

Mouse Scroll AnimationScroll to keep reading

Let us help promote your business to a wider following.

Current Approach to Due Diligence Requires Rethink
Image

Current Approach to Due Diligence Requires Rethink

Completing a corporate transaction without rigorous financial due diligence is unthinkable. Yet, despite numerous well publicised incidents of cybercrime, investors remain blasé about the potential impact of cyber risks on long term value.

Deals continue to be made without understanding the potential impact of this ticking time bomb, which U.S. Deputy Treasury Secretary Sarah Bloom Raskin has warned could be “the most pressing operational risk of our time”.

Hackers are becoming increasingly adept not only at penetrating networks, but also avoiding detection once inside corporate systems. Indeed, most significant breaches are uncovered, only after cyber criminals have been lurking inside corporate systems for weeks or months.

To understand the value of an investment and reduce the likelihood of a future catastrophic event, companies and their advisers must ensure cyber resilience is assessed alongside other strategic criteria, before a deal is completed. Leaving a review until after a deal has been signed is a very significant mistake.

A security assessment starts with a wide-ranging review, carried out by an external third party. However, just because the security review is being done at the same time as a financial review, it must not be confused with an audit. It is crucially important for investors to avoid the all-too-common pitfall of treating the security assessment as a checklist audit of security systems. Such an IT audit often does nothing more than confirm that a company meets a certain predefined infrastructure standard. It almost never considers the actual circumstances in which a company operates and tends to ignore the risks that are unique to each company, even though those risks cause the greatest vulnerability. Instead, a proper security assessment must be a customised and risk-focused review, aimed at understanding actual risks and suggests bespoke risk mitigation options.

In addition to identifying security gaps in hardware and software used by a company, a security review will determine the extent to which security is seen as a companywide priority. Everyone involved in using the IT systems has a crucial role to play. Therefore, an important part of good security is ensuring that employees are knowledgeable about their role in protecting company data and do not become the weak link in the security chain. Individuals must be taught to be vigilant about their behaviours, which will make it more difficult for attackers to catch someone unaware. Users also need to understand what to do if they suspect a problem with their computers or activities.

Careless executives or employees represent a significant risk to cyber security, according to a poll of US companies. The Stroz Friedberg ‘On the Pulse: Information Security Risk in American Business’ survey found that a key challenge for companies is to strengthen cyber security awareness among top executives. The survey found that 87% of senior managers regularly use personal email or cloud account to work remotely, placing such information at a much greater risk of being breached. More than half (58%) of senior management also reported that they had accidentally sent sensitive information to the wrong recipient, compared to just one quarter of workers overall.

The strategy to protect information must recognise also that cyber security extends beyond the data held directly by an enterprise. Key assets, including commercial contracts, intellectual property and strategic plans, are commonly held by third parties involved, such as financial or legal advisers. A determined hacker will not only aim to penetrate a corporate network but also target the company’s legal advisers, consultants suppliers and anyone else likely to have valuable information. Corporates must, therefore, ensure their lawyers, brokers, accountants and suppliers are also secure. Indeed, both the UK and US governments have specifically warned law firms that they are the targets of sophisticated hackers and must be better prepared to defend their networks.

Senior executives and their professional advisers can no longer be blind to cyber risks. As such threats become increasingly commonplace and costly, the resilience of the entire supply chain, including financial and legal advisers, must be addressed, so that the long-term value of an investment can be safeguarded from the very beginning.

Seth Berman is executive managing director of Stroz Friedberg, an investigations, intelligence and risk management company. 

Categories: M&A, Strategy


You Might Also Like
Read Full PostRead - Eye Icon
2018: £30m invested; 5 exits; £600m of deals. What’s coming to UK small business in 2019?
Finance
04/02/20192018: £30m invested; 5 exits; £600m of deals. What’s coming to UK small business in 2019?

2018 was a year that confounded predictions. We had predicted a year where Brexit and general uncertainty over slowing global growth might cloud events and perhaps dampen investment appetites.

Read Full PostRead - Eye Icon
B2B eCommerce Platform: How to Choose?
News
04/11/2022B2B eCommerce Platform: How to Choose?

eCommerce has become an essential part of doing business. No matter what kind of B2B company you have, it's critical to be able to reach out to customers online. You can do just that with a B2B eCommerce platform.  Whether you're selling products or services,

Read Full PostRead - Eye Icon
What Regulations Apply To Commercial Truck Drivers in California?
Legal
27/04/2026What Regulations Apply To Commercial Truck Drivers in California?

Commercial trucking is one of the most heavily regulated industries in the United States. The size and weight of tractor-trailers, combined with the distances they travel and the hours their operators spend behind the wheel, create risks for every motorist sha

Read Full PostRead - Eye Icon
As Attackers Embrace AI, Every Organization Should Do These 5 Things
News
01/10/2025As Attackers Embrace AI, Every Organization Should Do These 5 Things

AI benefits our society at large in numerous ways, but cybercriminals are using this new technology for nefarious purposes.

Read Full PostRead - Eye Icon
Where to Buy Digital Labor Law Posters for Remote Employees: 5 Top Options for Employers
News
26/05/2025Where to Buy Digital Labor Law Posters for Remote Employees: 5 Top Options for Employers

Remote and hybrid workplaces are becoming more common every year. Navigating the requirements of posted notifications with work-from-home (WFH) employees can be tricky. Digital labor law posters are the solution to complying. Buying printed posters is as simpl

Read Full PostRead - Eye Icon
Successful Consumer Analytics Equals Successful Digital Marketing
News
27/03/2023Successful Consumer Analytics Equals Successful Digital Marketing

It’s an exciting time to be a marketer, but it’s also a challenging time in the industry. Knowing what mediums to focus on and where to spend your marketing budget is no simple task.

Read Full PostRead - Eye Icon
How One Office Fruit Company Planted 19 Million Trees: A Corporate Responsibility Case Study
News
07/10/2024How One Office Fruit Company Planted 19 Million Trees: A Corporate Responsibility Case Study

When businesses talk about corporate responsibility, actions speak louder than words. Few companies demonstrate this better than Fruitful Office, whose initiatives stretch from local communities to international environmental projects. Their approach offers va

Read Full PostRead - Eye Icon
How Stakeholder Engagement in Public Sector Projects Can Building Trust
News
03/07/2023How Stakeholder Engagement in Public Sector Projects Can Building Trust

Public sector projects play a pivotal role in shaping societies and improving the lives of citizens. From infrastructure development to policy implementation, these initiatives require effective stakeholder engagement to ensure their success. Engaging stakehol

Read Full PostRead - Eye Icon
Retail Mapping: Utilizing Contextual Intelligence to Meet Consumers Where They Are
News
27/06/2022Retail Mapping: Utilizing Contextual Intelligence to Meet Consumers Where They Are

Although online shopping has increased by 300%, 56% of shoppers still visit a physical store before making a purchase, and 30% of direct-to-consumer brands say opening a store is a current priority.



Our Trusted Brands

Acquisition International is a flagship brand of AI Global Media. AI Global Media is a B2B enterprise and are committed to creating engaging content allowing businesses to market their services to a larger global audience. We have a number of unique brands, each of which serves a specific industry or region. Each brand covers the latest news in its sector and publishes a digital magazine and newsletter which is read by a global audience.

Arrow