THE USE OF NEW TECHNOLOGIES AND THE DEVELOPMENT OF AUTOMATION FUNCTIONS: FOCUS INFORMATION TECHNOLOGY (IT) AUDIT 2021 | INTERNAL AUDIT DEPARTMENT
» ARTICLE » THE USE OF NEW TECHNOLOGIES AND THE DEVELOPMENT OF AUTOMATION FUNCTIONS: FOCUS INFORMATION TECHNOLOGY (IT) AUDIT 2021

THE USE OF NEW TECHNOLOGIES AND THE DEVELOPMENT OF AUTOMATION FUNCTIONS: FOCUS INFORMATION TECHNOLOGY (IT) AUDIT 2021

2020 was full of significant disruption. In 2021, it is more critical than ever to be aware of the most pressing risks on which IT auditors should focus, including the threat from increasing implementation of new technologies, and the changing landscape of emerging risks. As companies navigate this change, IT internal audit has become more relevant than ever to make sure IT risk is both assessed and addressed to identifying opportunities to adopt emerging technologies and automation, focusing attention to cyber security and information security, adapting to business change, and building resilient core IT operations and critical infrastructure.

  1. Development of Cloud Technologies

Risk assessment on the growing use of Cloud Technologies in the organization should be given attention by identifying the implementation strategy of Cloud Technologies, security features, governance, and Implementation Methods of Cloud Technologies.

 

  1. Expansion of Automation and Integration Functions

Almost all business sectors invest in technologies such as robotic process automation, big data, predictive analysis, cognitive systems, natural language processing, machine learning, and artificial intelligence (AI) to automate existing systems. Expansion of automation functions and data integration between systems requires risk assessment to ensure information accuracy and data integrity.

 

  1. Third Party Risk Management

Organizations are increasingly relying on suppliers (Third Parties) for system maintenance and delivery of information to customers. Failures or delays by third parties cause damaging an organization’s reputation quickly and have significant operational and cost implications. Assessment of third-party functions and risks in information technology management is essential to ensure that the organization’s operations are uninterrupted, information security is preserved and the dissemination of information to customers is accurate.

 

  1. Cyber ​​Security

There is still a shortage of skilled and trained cybersecurity professionals to protect intellectual property and sensitive data. The reduction in trained manpower and increased implementation of automation functions as well as cloud technologies lead to increased cybersecurity risks.

 

  1. Data Integrity and Data Protection

Data is now an organizational priority. Irregular integrity controls and data protection have a major impact on organizational management and risk loss of property, loss of reputation, increased costs and legal action.

 

  1. New Work Model

The expansion of new work models remotely using existing system capabilities during the period opens the door to cyber fraud, data misuse, cyber fraud and misappropriation if information technology security procedures or procedures based on new work models are not established, not updated and not channelled to the entire employee in the organization.

Article prepared by : Mr. Mohd Azis Bin Abdullah 

Date of Input: 14/04/2021 | Updated: 14/04/2021 | nurmiera

MEDIA SHARING

INTERNAL AUDIT DEPARTMENT
Universiti Putra Malaysia
43400 UPM Serdang
Selangor Darul Ehsan
03-9769 1346
03-9769 6176
SXFCHAc~