-
Business valuations
We offer expert valuation advice in transactions, regulatory and administrative matters, and matters subject to dispute – valuing businesses, shares and intangible assets in a wide range of industries.
-
Capital markets
You need corporate finance specialists experienced in international capital markets on your side if you’re buying or selling financial securities.
-
Complex and international services
Our experience of multi-jurisdictional insolvencies coupled with our international reputation allows us to deliver the best possible outcome for all stakeholders.
-
Corporate insolvency
Our corporate investigation and recovery teams can help you manage insolvency situations and facilitate the best outcome.
-
Debt advisory
An optimal funding structure for your organisation presents unprecedented opportunities, but achieving this can be difficult without a trusted advisor.
-
Expert witness
Our expert witnesses analyse, interpret, summarise and present complex financial and business-related issues which are understandable and properly supported.
-
Financial models
A sound financial model will help you understand the impact of your decisions before you make them. Talk to us about our user-friendly models.
-
Forensic and investigation services
We provide investigative accounting and litigation support services for commercial, matrimonial, criminal, business valuation and insurance disputes.
-
Independent business review
Is your business viable? Will it remain viable in the future? A thorough independent business review can help your organisation answer these fundamental questions.
-
IT forensics
Effective ESI analysis is integral to the success of your business. Our IT forensics experts have the technical expertise to identify, preserve and interrogate electronic data.
-
Mergers and acquisitions
Grant Thornton provides strategic and execution support for mergers, acquisitions, sales and fundraising.
-
Raising finance
Raising finance - funders value partners who can deliver a robust financial model, a sound business strategy and rigorous planning. We can guide you through the challenges that these transactions can pose and help you build a foundation for long term success once the deal is done.
-
Relationship property services
Grant Thornton offers high quality independent advice on the many financial issues associated with relationship property from considering an individual financial issue to all aspects of a complex settlement.
-
Restructuring and turnaround
Grant Thornton’s restructuring and turnaround service capabilities include cash flow, liquidity management and forecasting; crisis and interim management; financial advisory services to companies and parties in transition and distress
-
Transaction advisory
Our depth of market knowledge will steer you through the transaction process. Grant Thornton’s dynamic teams offer range of financial, commercial and operational expertise.
-
Virtual asset advisory
Helping you navigate the world of virtual currencies and decentralised financial systems.
-
Corporate tax
Grant Thornton can identify tax issues, risks and opportunities in your organisation and implement strategies to improve your bottom line.
-
Employment tax
Grant Thornton’s advisers can help you with PAYE (payroll tax), Kiwisaver, fringe benefits tax (FBT), student loans, global mobility services, international tax
-
Global mobility services
Our team can help expatriates and their employers deal with tax and employment matters both in New Zealand and overseas. With the correct planning advice, employee allowances and benefits may be structured to avoid double taxation and achieve tax savings.
-
GST
GST has the potential to become a minefield and can be expensive when it goes wrong. Our technical knowledge can help you minimise the negative impact of GST
-
International tax
International tax rules are undergoing their biggest change in a generation. Tax authorities around the world are increasingly vigilant, especially when it comes to global operations.
-
Research and Development
R&D tax incentives are often underused and misunderstood – is your business maximising opportunities for making claims?
-
Tax compliance
Our advisers help clients manage the critical issue of compliance across accountancy regulations, corporation law and tax. We also offer business and wealth advisory services, which means we can provide a seamless and tax-effective offering to our clients.
-
Tax governance
Mitigate tax risks and implement best practice governance that will stand up to IRD scrutiny and audits.
-
Transfer pricing
Tax authorities are demanding transparency in international arrangements. We businesses comply with regulations and use transfer pricing as a strategic planning tool.
-
Audit methodology
Our five step audit methodology offers a high quality service wherever you are in the world and includes planning, risk assessment, testing internal controls, substantive testing, and concluding and reporting
-
Audit technology
We apply our audit methodology with an integrated set of software tools known as the Voyager suite. Our technology has been developed to produce quality audits that are effective and efficient.
-
Financial reporting advisory
Our financial reporting advisers have the expertise to help you deal with the constantly evolving regulatory environment.
-
Business architecture
Our business architects help businesses with disruptive conditions, business expansion and competitive challenges; the deployment of your strategy is critical to success.
-
Cloud services
Leverage the cloud to keep your data safe, operate more efficiently, reduce costs and create a better experience for your employees and clients.
-
Internal audit
Our internal audits deliver independent assurance over key controls within your riskiest processes, proving what works and what doesn’t and recommending improvements.
-
IT advisory
Our hands on product experience, extensive functional knowledge and industry insights help clients solve complex IT and technology issues
-
IT privacy and security
IT privacy and security should support your business strategy. Our pragmatic approach focuses on reducing cyber security risks specific to your organisation
-
Payroll assurance
Our specialist payroll assurance team can conduct a review of your payroll system configuration and processes, and then help you and your team to implement any necessary recalculations.
-
PCI DSS
Our information security specialists are approved Qualified Security Assessors (QSAs) that have been qualified by the PCI Security Standards Council to independently assess merchants and service providers.
-
Process improvement
As your organisation grows in size and complexity, processes that were once enabling often become cumbersome and inefficient. To maintain growth, your business must remain flexible, agile and profitable
-
Procurement/supply chain
Procurement and supply chain inputs will often dominate your balance sheet and constantly evolve for organisations to remain competitive and meet changing customer requirements
-
Project assurance
Major programmes and projects expose you to significant financial and reputational risk throughout their life cycle. Don’t let these risks become a reality.
-
Risk management
We understand that growing companies need to establish robust internal controls, and use information technology to effectively mitigate risk.
-
Robotic process automation (RPA)
RPA is emerging as the most sophisticated form of automation used to help businesses become more agile and remain competitive in the face of today’s ongoing digital disruption.
Grant Thornton New Zealand’s bi-annual business survey has revealed 41% of business owners, leaders and decision makers undertake specific planning for fraud risk – a number that should be a lot higher according to business advisory services and tax partner, Greg Thompson.
“A lot of online scams are pretty obvious. Your bank isn’t going to send you emails about your balance expiring soon. And you know the IRD isn’t going to send you a text to transfer your tax rebate.
“However, the types of scams most likely to affect New Zealand businesses are considerably more sophisticated. They’re also increasing in frequency and surprisingly convincing; so it’s concerning to see that less than half of survey respondents in our research plan for this type of risk”, says Thompson.
Invoice fraud is one of the most common online scams experienced by businesses. This typically involves a fake invoice from a supplier.
Thompson says, “A scammer can create a bogus invoice that looks like one from your supplier, but with a different bank account. The email addresses they use will look very similar to the supplier’s but one character will vary slightly.
“Or they’ll simply hack a supplier’s email account and start watching for patterns in your business cycle so they know when you’re expecting to receive invoices; they’ll even know the typical amounts and items.”
Thompson emphasises the importance of being proactive rather than reactive when it comes to this type of risk management and says many companies won’t proactively plan for breaches until they’ve actually experienced one.
“As the saying goes, ‘the time to repair the roof is when the sun is shining’. Businesses need to take a ‘when’ not an ‘if’ approach to fraud prevention, particularly as it’s becoming more prevalent and can potentially devastate vulnerable companies”.
But there are steps organisations can take to better protect themselves from breaches.
“It’s important to take the time to establish a process for verifying any new details a vendor gives you like bank account numbers and email addresses, and to always check information changes over the phone – not email.
“Two factor authentication process can also be an effective safeguard as it ensures payments are being authorised by multiple team members who can verify the transaction’s legitimacy.
“Because all fraud involves a human element, employees should be trained to recognise common red flags such as unusual email addresses, grammatical errors, or unexpected changes in payment instructions.
“And of course, it’s mission critical to strengthen cybersecurity measures to protect against phishing attacks, malware infections, and to ensure secure file sharing methods are in place to protect the transmission of sensitive information.