Tax Break for Commercial Real Estate Investors

Tax Break for Commercial Real Estate InvestorsCOVID-19 impacted the economy dramatically and commercial real estate was no exception in terms of decreased values. Often, the real property could no longer service the debt used to finance it. This debt restructuring and resulting debt forgiveness can result in taxable income.

Taxable Income and Debt Cancellation

If you have a $80,000 loan and the bank reduced the amount you owe down to $50,000, then you have an economic benefit of $30,000, which should be treated as taxable income. This is indeed how cancellation of debt is treated, but there are exceptions such as in the case of bankruptcy or insolvency. There is another unique scenario that applies only to commercial real estate.

Assuming that the taxpayer is not a C-corporation, debt cancellation is excludable from taxable income if it results from qualified real property business indebtedness (QRPBI). QRPBI is debt taken on to buy real property used for commercial purposes. Starting in 1993, debt used for building or improving a property also qualify.

As we all know, there is no such thing as a free lunch. In order for debt cancellation to not be considered current taxable income, the taxpayer must reduce their basis in the real property by this same amount. This does not cancel the income; instead, it defers its recognition and helps cash flow as a result. Below, we look at an example of how this works.

Illustrative Example

Assume David bought a property in 2017 and he uses it for business purposes. In 2022, the property has a first mortgage of $200,000 and a second mortgage of $100,000 (both with the same bank), with a fair market value (FMV) of $240,000. He negotiates with the bank to reduce the second mortgage down to $20,000, resulting in income from the cancellation of debt of $80,000.

The amount of debt cancellation that can be deferred is equal to the amount of the second mortgage before the debt cancellation, less the FMV minus the first mortgage. In David’s case, before debt cancellation, the FMV ($240k) minus the first mortgage ($200k) was $40,000. The balance of the second mortgage ($100k) exceeded this by $60,000. Out of the total debt cancellation of $80,000, this $60k is subject to deferral, with only the remaining $20,000 reported as immediate taxable income.

The $60,000 is not considered as taxable income only to the extent that David has sufficient adjusted tax basis in the depreciable real property to absorb this as a reduction in basis. Assuming this is the case, the reduction in basis applies the first day of the tax year after the debt cancellation (unless the property is sold before year-end – then it applies immediately).

In the example above, David would include the $10,000 of cancellation of debt income on his 2022 tax return and adjust his basis in the real property by $60,000 as of Jan. 1, 2023.

Filing Mechanics

For real estate held via partnerships instead of by individuals, determining if debt is QRPBI qualified happens at the entity level, although reductions of basis are done at the individual level for each partner, allowing individual planning. The election to defer cancellation of debt income is recorded on Form 982.

Conclusion

The COVID pandemic caused many real estate investors to restructure their debts. The option to defer debt income cancellation offers a great tax planning opportunity by delaying taxable income and improving cash flows.

Tips to Save on A/C This Summer

Tips to Save on A/C This SummerYou love summer, don’t you? School’s out, and BBQs are on. But what you probably don’t love are those higher air conditioning bills. Here are some tried-and-true ways to help lower the cost of keeping cool.

Change Air Filters

Make sure you switch out your filters before those sizzling summer temps arrive, then once a month after that. When filters are dirty, they block the airflow, which causes your air conditioner to work harder when cooling your home. You’ll not only lower your bills by five to 15 percent, but you will also extend the life of your entire A/C system. If you don’t change those clogged filters, it could create a malfunction, and you’ll have to get your unit repaired.

Turn Up Your Thermostat

Set it to 78 degrees and shed a few layers. Yes, this might not be preferable to your icy 72 degrees, but you know what will feel good? Seeing your electricity bill go down 18 percent.

Run the Ceiling Fan

This works in tandem with turning your thermostat to 78 degrees. If you’ve been running your fan clockwise during the previous months, be sure to change the direction so the air moves down into the room.

Invest In a Smart Thermostat

With these babies, you can regulate the temps when you’re not home from an app on your phone or via voice commands. For instance, you can set the A/C to a toasty 80 degrees when you’re not home to save money. Two good brands to check into are Nest and Ecobee. They’re well worth the cost.

Close Your Curtains and Blinds

When the sun’s rays enter your home, they heat up the room and your thermostat. The best time to shut your curtains and blinds is during the warmest part of the day, between (roughly) 10 a.m. and 3 p.m. This will help insulate your windows and stop the cool air from escaping.

Consider the Placement of Your Thermostat

Where do you have this? If it’s next to a hot window, your poor A/C will work harder than it needs to because it will think the room’s hotter than it is. Other places not to put it are near doors that could let in drafts. Or by bathrooms that are usually warm and steamy. In fact, the U.S. Office of Energy Efficiency and Renewable Energy advises avoiding placing thermostats near lamps or TVs. Why? They release heat that could confuse the sensors of your poor, struggling device.

Avoid Activities that Heat Up the House

Avoid using the oven, dishwasher, or dryer during the middle of the day. This heats up the house. Instead, use the microwave, grill outside, or wash your dishes by hand if you can stand it. If you need to dry clothes, wait until after sundown.

Check Your Air-Conditioner

If you had some issues with it last summer, get someone (a professional) to take a look at it before the high temps descend upon you. If you make a few small repairs, you’ll save mightily in the long run.

If you implement one or all of these tips, you’ll be in a much better, cooler place come full-on summer, the time of year when you most want to chill.

Sources

https://crystalheatingandcooling.com/save-money-on-air-conditioning/

https://www.cnet.com/home/energy-and-utilities/lower-your-electric-bill-this-summer-with-these-air-conditioni

https://www.choosetexaspower.org/the-current/energy-savings/10-tips-saving-air-conditioning-summer/ 

Ways Technology Can Improve Business Cash Flow

Ways Technology Can Improve Business Cash FlowCash flow awareness is vital in running the day-to-day activities of a business. Keeping track of the inflows and outflows helps a company make better plans and decisions, such as the right time to expand. Cash flow knowledge reveals where a business is spending money and can protect business relations, among other benefits. However, tracking cash flow is a challenge for many businesses.

To avoid business failure due to poor cash flow management, business owners are investing in software applications to help manage cash flow challenges. Modern technology enables access to these applications over the cloud, giving small- and medium-sized businesses the opportunity to benefit from them. These cash flow management tools help companies improve cash flow in various ways.

  1. Remove Manual Paper Systems that Cost Time and Money
    Using a cash flow automated system, it’s possible to create and send invoices directly to clients through email. This saves on time that would otherwise be used for printing invoices, mailing, bank trips, and going through paperwork comparing details. It is also possible to automate recurring invoices, saving the time used to create and send invoices.
  2. Makes it Easy for Clients to Pay
    Paying invoices takes time if a client has to keep confirming the payment details. However, an automated invoice can contain a pay now link, which facilitates quick payments for applications that include access to online payment options.
  3. Helps Avoid Data Entry Errors and Reduces Risks
    There is no need to move from one platform to another to check details, manually enter details, verify figures, etc. This ensures fewer errors, such as those generated when copying details like bank information to a check, or paying the wrong amount. Sorting out these errors takes time, hence delaying payments.
  4. Cash Flow Forecast
    The applications offer access to account insights in real time using cloud-based software and mobile apps, making it possible to forecast when clients are likely to pay and when bills are due. Access to live data also means there is no more dealing with complicated spreadsheets and paper ledgers. This way, a business can plan its actions to ensure positive cash flow. For instance, a business can delay paying vendors and plan when best to pay bills without running out of standby cash.
  5. Avoid Late Payments
    Late payments can result in fines that will cost the business unnecessary losses. However, with software that automatically sends invoice reminders, it is possible to make timely payments.
  6. Centralized Cash Flow System
    All activities involving cash transactions are located in one system, offering the ability to see cash inflows and outflows at a glance. As a result, a business can streamline its accounts and monitor cash flow; and since it includes real-time reporting, it’s easy to spot any red flags and solve problems that could adversely affect a business.
  7. Leverage on Data Analytics
    A centralized system will collect data and store it in one place. By deploying artificial intelligence technology that performs data analysis, a business can better forecast its cash flow. This also provides insight into how changes such as a new products or price adjustments affect cash flow.

Choosing a Cash Flow Tool

Cash flow automation enables a business to maintain a positive cash flow and have cash in its reserves to afford reinvesting in its operations, settling debts, and handling other operating costs. However, before investing in an automation tool, it’s recommended to analyze different tools to find the best fit for your business. Each tool is different and built to address various business problems.

Some features to look out for include integration with the existing accounting system, payments and invoicing, accepting a variety of payment methods, and security.

Besides getting the most suitable application, there are other considerations to establishing a healthy cash flow. Technology has its benefits, but it does not act as a cure for a poorly implemented system. For instance, if employees don’t know how to use new technology, its impact will be limited. Therefore, a business should establish a workflow process before implementing any new technology.

Rushing Baby Formula supplies, Helping Ukraine and Punishing Russia

Rushing Baby Formula supplies, Helping Ukraine and Punishing RussiaTo amend the Child Nutrition Act of 1966 to establish waiver authority to address certain emergencies, disasters and supply chain disruptions, and for other purposes. (HR 7791) – In response to the recent nationwide shortage of infant formula, Congress passed a bill authorizing $28 million to fund emergency supplies and to address the potential for future shortages due to emergencies, disasters or supply chain disruptions. The bill was introduced by Rep. Jahana Hayes (D-CT) on May 17. It passed in the House on May 18 and unanimously in the Senate on May 19. It is currently awaiting signature by the president.

Ukraine Democracy Defense Lend-Lease Act of 2022 (S 3522) – This legislation was introduced on Jan. 19, by Rep. John Cornyn (T-TX). It passed in the Senate on April 6, the House on April 28, and was signed into law by President Biden on May 9. The bill waives certain requirements that constrain the president’s authority to lend or lease defense articles intended for Ukraine’s government or other Eastern European countries affected by Russia’s war. For example, prohibiting a loan or lease period of more than five years. Furthermore, the president must establish procedures to ensure quick delivery of defense articles loaned or leased to Ukraine. The provisions of this bill are scheduled to terminate at the end of FY 2023.

Additional Ukraine Supplemental Appropriations Act, 2022 (HR 7691) – Introduced by Rep. Rosa DeLauro on May 10, this bill authorizes $40.1 billion in emergency funding for U.S. agencies to aid Ukraine’s response to Russia’s invasion. The funding is available only through fiscal year 2022 (which ends Sept. 30). The appropriations are designed to provide defense equipment, migration and refugee assistance, support for nuclear power issues, emergency food assistance, economic assistance, and property seizures related to the invasion. U.S. agency recipients include the Department of Justice, the Department of Defense, the Nuclear Regulatory Commission, the Department of Health and Human Services, the Department of State, the U.S. Agency for International Development, the Department of Agriculture and the Treasury Department. The bill passed in the House and Senate on May 19 and awaits the president’s signature.

Ukraine Comprehensive Debt Payment Relief Act of 2022 (HR 7081) – This bill is designed to advocate debt assistance for Ukraine among domestic and international financial institutions. Specifically, the legislation calls for an immediate suspension of Ukraine’s debt service payments to respective institutions, offering concessional financial assistance to Ukraine, and providing economic support to both refugees from Ukraine and to the countries receiving them. The bill was introduced by Rep. Jesus Garcia (D-IL) on March 17. It passed in the House on May 11 and is under review in the Senate.

Russia and Belarus SDR Exchange Prohibition Act of 2022 (HR 6899) – The purpose of this legislation is to prevent financial assistance to Russia or Belarus. Specifically, it prohibits the U.S. Treasury Department from making transactions that involve the exchange of Special Drawing Rights held by the Russian Federation or Belarus. Special Drawing Rights (SDR) are reserve assets contributed by member countries and maintained by the International Monetary Fund (IMF). The act was introduced by Rep. French Hill (R-AK) on March 2. It passed in the House on May 11 and is in the Senate.

Isolate Russian Government Officials Act of 2022 (HR 6891) – Introduced by Rep. Ann Wagner (R-MO) on March 2, this bill is designed to exclude Russian government officials from certain international meetings, such as the Group of 20, the Basel Committee for Banking Standards, and the Bank for International Settlements. The bill’s mandate is scheduled to end either within five years, or 30 days after the president has reported (to Congress) the end of the Russian-Ukraine war. The act passed in the House on May 11; it currently resides in the Senate.

Asset Seizure for Ukraine Reconstruction Act (HR 6930) – This bill would authorize a task force to identify legal actions that can be used to confiscate the assets of foreign individuals affiliated with Russia’s political leadership. The work group also is directed to report (to Congress) its recommendations for more energy-related sanctions on Russia’s government, as well as any additional authority the president can use to seize assets. The act was introduced by Rep. Tom Malinowski (D-NJ) on March 3. It passed in the House on April 27 and is under consideration in the Senate.

Why Businesses Should Be Worried About Mobile Security and How to Keep Safe

Mobile SecurityCybersecurity has become more important than ever, especially with the rise in cyberattacks. However, much focus is put on computers, laptops, servers, etc. Mobile phones and tablets seem to be overlooked when talking about cybersecurity.

Today smartphones are integrated into the modern workforce as driven by work at home and remote working. To enhance mobility, these devices are installed with business mobile applications that enable access to company systems. They enable users to conduct different activities on-the-go, such as banking, connecting to company networks, business transactions, and other social operations. However, this is raising concerns about the security of sensitive corporate data and other personal information stored on phones.

Despite these concerns, businesses continue to be lax on enforcing solid measures to protect company data and networks.

Since the phones have less protection than computers, they have become an easy target for cybercriminals who are using different methods to gain access to phones.

Security Threats to Mobile Devices

Phishing is one common attack vector that uses fake emails and text messages to trick users into clicking links that download malware onto a user’s smartphone. For instance, cybercriminals may use SMS to mimic legitimate companies and send messages that contain harmful links.

Recently, cybersecurity researchers cited a WhatsApp phishing campaign that attempts to lead WhatsApp users to install an information-stealing malware. The senders impersonate the WhatsApp notification service and send an email to a user claiming they have received a private voicemail. A user who is unaware of this ploy and clicks on the play button in the email will download malware onto their phone.

Attackers also take advantage of data leakage through malicious mobile apps. Users can get these apps by downloading fake versions of real apps, which are infected with malicious code that steals personal data stored on a phone.

Data can be stolen through legitimate solutions, as researchers found at the end of October 2021, when they discovered a banking trojan horse known as SharkBot in six phoneapps. These apps were designed as legitimate antivirus solutions. The malware could bypass multifactor authentication to steal credentials and banking information, and even transfer money. Although the six dangerous apps have since been deleted from the Google Play store, this goes to show that hackers do not tire of looking for ways to infiltrate mobile devices.

Mobile phones also are affected by web-based mobile security threats when users access affected sites that download malicious content onto a device.

Other security threats to phones include using unsecured public WiFi, lost or stolen mobile devices, mobile spyware, rooting malware and jailbroken phones that become more prone to attacks.

How to Keep Safe

Since phones are now primarily being used as business tools, business owners need to rethink their mobile strategies for both employer-provided devices and bring your own device (BYOD).

Businesses that deploy mobile device management (MDM) tools will block potentially harmful apps, automatically update software, and remotely wipe off data on stolen or lost phones.

Users are the weakest link in security issues; hence, a need for regular security risk-training on social engineering by learning how to differentiate suspicious emails and SMS messages. Users also need to learn to avoid downloading applications from third parties and other untrusted sources and use only authorized app stores. Furthermore, user training should include the dangers of public Wi-Fi, the importance of turning off a phone’s Wi-Fi when not using it, and locking the device with a strong password or biometrics, such as fingerprint detection.

Users also should avoid granting broad app permissions, especially for free apps that may be sending sensitive data to remote servers, where it can be used not only by advertisers but also by cybercriminals.

Keeping device operating systems and other software updated will reduce attack possibilities since cybercriminals use old bugs to hack devices.

It is important to install anti-malware and anti-virus programs on mobile devices since they now face the same threats as computers and laptops.

Businesses can introduce a mobile device policy that employees sign before accessing company resources on their devices or when receiving employer-provided devices. Such a policy includes the dos and don’ts of using phones.

Regular security testing is crucial for enterprise applications as it helps expose vulnerabilities in apps and especially those developed by third-party agencies to ensure the security meets required compliance guidelines.

Conclusion

Mobile phones now have capabilities similar to computers and store a lot of personal and sensitive data. As more devices access business systems, it creates more endpoints that put the business at risk of a data breach. Therefore, businesses of all sizes should take mobile security seriously through strong defensive measures, which can be enhanced with enterprise mobile security solutions.

How to Save When You’re Broke

How to Save When You're BrokeIf you think saving money is a waste of time, think again. It all comes down to having the right mindset and strategy – even if you don’t have a penny to spare. Here are some ground rules that have proven effective for many. All you have to do is be willing to dive in, change your choices, and revisit the way you approach your finances.

Create a budget and track your expenses. Yes, you’ve probably heard this a million times and you might be thinking: how can I save money if I don’t have any? Here’s what you do. For the next 30 days, try this experiment: track every dollar that’s coming in and going out. Here are things to consider:

  • Except for the basics, where did you spend?
  • Were there items that were wants instead of needs that you might cut?
  • Did you buy name brands or lower-cost options?
  • How can you reduce your spending by 5 percent or 10 percent?

After you’ve digested all this, you’ll have a better picture of what’s going on. A good next step is to balance your budget. This method keeps money from slipping through the cracks. 

Grow your income. This might sound like a beat-down since you’re already burning the midnight oil, but remember that this is temporary and a means to an end. If you have an extra room, you might think of renting it out for a few months. If this is outside your comfort zone, find a side hustle that’s fun like dog walking or pet sitting. Or think about jobs you can do on your computer like answering paid surveys. Part-time weekend jobs also are an option. Greeters at Costco make around $24 an hour!

Automate your savings. Again, you’ve heard this, but taking this money off the top before you even see it is key. You never see the money so you don’t ever miss it. And any amount saved can add up over time. Even $5 a paycheck can make a difference.

Have no-spend days. Of course, you have necessary expenses like food and shelter. But what about those days when you don’t want to cook and grab some drive-through grub? Or you see a Starbucks, your car turns around, and suddenly, you’re there ordering a Double Mocha Frappuccino? Certainly, we all want – and need – treats every now and then. But be judicious about them because if you’re already broke, these spontaneous splurges can derail your savings dreams.

Sell things you no longer need. Start by cleaning out your closets and your garage. You’ll most likely find things you no longer have any use for, or want. Host a yard sale. Or even better, snap pics of your items and put them up on Facebook Marketplace, eBay, Craigslist, or Nextdoor. For more pricey things like clothes or jewelry, try Thred Up or Poshmark. You’ll be surprised how quickly this all adds up. Then put this money toward your savings or your debt. Slow and steady always wins the race.

Write down your 10-year lookahead. How do you want to be living a decade from now? On the beach? In a townhouse in a European city? Completely out of debt? All of your dreams, no matter how crazy, can absolutely be achieved. All you have to do is take the long view. Have tunnel vision about your destiny. What this all comes down to is daily financial decisions.

So now that you have a few ways to get ahead, it all comes down to you. Take a deep breath and be intentional – embrace this new way of living. When you see yourself making new choices and realizing what you can achieve by tweaking how you spend, there’s no stopping you.

Sources

https://financeoverfifty.com/how-to-save-money-when-youre-broke/

Restricting Trade Relations with Russia, Enhancing U.S. Export Pathways, and Bearing Down on Cybercrime and Human Trafficking

Suspending Normal Trade Relations with Russia and Belarus Act (HR 7108) – This legislation suspends normal trade relations with Russia and Belarus. The president may restore normal trade relations pending Congressional approval, and this authority is scheduled to end on the last day of 2023. The bill also permanently authorizes the president to impose visa- and property-blocking sanctions based on violations of human rights, as well as increase duty rates on products from these countries. These actions are designed to condemn Russia’s invasion of Ukraine by urging other World Trade Organization (WTO) members to suspend trade concessions to Russia and Belarus, and consider steps to suspend Russia’s participation in the WTO. The bill was introduced on March 17 by Rep. Richard Neal (D-MA). It passed in the House on the same day, passed in the Senate on April 7, and was signed into law by President Biden on March 17.

Modernizing Access to Our Public Land Act (HR 3113) – This bill was introduced by Rep. Blake Moore (R-UT) on May 11, 2021. It requires the Dept. of the Interior, the Forest Service, and the Corps of Engineers to digitize geographic information system mapping data relating to public access to Federal land and waters for outdoor recreation. This information, which must be made publicly available, will include status as to whether roads and trails are open or closed; the dates on which roads and trails are seasonally opened and closed; the types of vehicles allowed on each segment of roads and trails; the boundaries of areas where hunting or recreational shooting is regulated or closed; and the boundaries of any portion of a body of water that is closed to entry, watercraft or has horsepower limitations for watercraft. The bill passed in the House on March 15, the Senate on April 6, and is awaiting signature by the president.

Better Cybercrime Metrics Act (S 2629) – This bill authorizes various requirements to improve the collection of data related to cybercrime. For example, the Department of Justice must collect cybercrime reports from federal, state and local officials; include questions about cybercrime in the annual National Crime Victimization Survey; and evaluate current cybercrime data collection and reporting systems. The bill was introduced by Sen. Brian Schatz (D-HI) on Aug. 5, 2021. It passed in the Senate on Dec. 7, 2021, the House on March 29, and is awaiting the president’s signature to become law.

Bankruptcy Threshold Adjustment and Technical Corrections Act (S 3823) – The primary purpose of this legislation is to modify the eligibility requirements for a debtor to file for bankruptcy under Chapter 13. Specifically, only an individual (or an individual’s spouse, except a stockbroker or a commodity broker) with regular income that owes aggregated debt of less than $2,750,000 may file as a debtor under Chapter 13. The bill was introduced by Sen. Chuck Grassley (R-IA) on March 14 and passed in the Senate on April 7. It is currently under consideration in the House.

Countering Human Trafficking Act of 2021 (S 2991) – This bill authorizes the establishment of a Department of Homeland Security Center for Countering Human Trafficking. The goal is to address human trafficking with a victim-centered approach to increase the focus on and effectiveness of investigating and prosecuting forced labor cases. Specifically, the legislation centers on eradicating forced labor from both corporate and government agency supply chain contracts and procurement. The act was introduced by Sen. Gary Peters (D-MI) on Oct. 18, 2021. It passed in the Senate on April 16 and is under consideration in the House.

Ocean Shipping Reform Act of 2022 (S 3580) – This bipartisan act was introduced by Sen. Amy Klobuchar (D-MN) on Feb. 3. The bill increases the authority of the Federal Maritime Commission (FMC) to investigate late fees charged by common ocean carriers and otherwise find ways to promote the growth of U.S. exports through a more effective and economical ocean transportation system. For example, the bill prohibits common ocean carriers, marine terminal operators, and ocean transportation intermediaries from unreasonably refusing cargo space when available. This legislation passed in the Senate on March 31 and is under consideration in the House.

Secure 2.0 Retirement Bill

Secure 2.0 Retirement BillAt the very end of March, the House of Representatives passed a version of the bill known as Secure 2.0. The bill passed the House with overwhelming bipartisan support in a 414-5 vote. The House version still needs to pass in the Senate, where there are differing ideas on exactly what the bill should contain. There is strong support, so it is less of a question of if Secure 2.0 will become law than what exact version.

The Secure 2.0 bill in any version aims to help Americans save for retirement through a variety of mechanisms and changes in tax law. Here are some highlights of what the bill hopes to accomplish and how. We’ll also note differences between the House and Senate plans throughout.

Sign Up More Workers for Retirement Plans

One way the House version of the bill aims to help people save for retirement is to simply get them into a plan. The law would automatically enroll workers in 401(k), 403(b) and SIMPLE IRA retirement plans in their workplace; however, they can opt out. It’s been shown that most people simply won’t take action, meaning they won’t enroll if they have to proactively sign up –  and similarly won’t opt out. The Senate version does not require auto enrollment, but it does give companies incentives to structure plans so that they auto enroll workers.

Auto enrollment in the House version starts at three percent contributions and increases yearly until participants are contributing 10 percent of their pay. Business with 10 or fewer employees are exempt.

Encourage Small Employers

Workplace retirement plans come with administrative, financial and legal burdens just to set up and offer the plan. This is before any type of employer contributions and is often a roadblock to small employers offering plans to their employees. To help encourage small employers, the bill offers a retirement plan start-up tax credit of 100 percent for the first three years to cover these costs.

Bigger Catch-Up Contributions

Right now, 401(k) plan catch-up contributions for workers 50 and older are capped at $6,500 for 401(k) plans. Both the House and Senate versions offer to increase these amounts, but in different ways.

The House version increases 401(k) catch-up contributions up to $10,000 for those 62, 63 or 64 starting in 2024. A more generous version is offered by the Senate, allowing the same $10,000 limit but to all who are 60 or older.

There is a “catch” to the catch-up, however. Under both versions, all catch-up contributions to 401(k) plans will be treated as Roth contributions; i.e., after tax contributions beginning in 2023. Currently, workers can make the contributions on either a pre-tax or post-tax (Roth) basis.

Push-Out Mandatory Required Distributions

The House version would extend the age for taking required minimum distributions (RMD) from retirements plans from 72 up to 75, incrementally over 3 years (73 in 2023, 74 in 2030 and 75 in 2033).

The Senate plan raises the age to 75 by 2032 and also waives RMDs entirely for those with less than $100,000 in aggregate retirement savings. It also reduces the penalty for not taking RMDs down to 25 percent (currently 50 percent).

Expand Employer Matching

The way the vast majority of retirement plans work is that employees contribute a portion of their salary and then the employer contributes a matching amount of  50 percent or 100 percent of what employee saves (up to a limit). The Secure 2.0 bill proposes to make student loan payments qualify as deferrals the same as plan contributions. This means that if you make student loan payments, your employer can now make a matching contribution to your retirement plan account even though you are not actually making any contributions into the plan itself. This is not a requirement, but an option for employers.

Create a Lost and Found for Retirement Plans

It’s common for workers to lose track of retirement plans from previous jobs when they move and change jobs. The bill would create a national lost and found to aid people in locating plans they may have inadvertently left behind or forgotten about.

Conclusion

In whatever form the final bill takes shape, it will give Americans more options to save for retirement and expand access to workplace plans.

Combating Employee Hesitancy to Return to the Office

Employee Hesitancy to Return to the OfficeAccording to the January 2022 Future Forum Pulse survey, there’s been a shift in what workers want post-pandemic. The report found that in Q4 of 2021, 78 percent of workers from six industrialized companies wanted location flexibility. The survey also found that 95 percent desired schedule flexibility. This is in light of the same survey finding that 72 percent of employees desire greater flexibility from their current places of employment. Those same workers reported that if they can’t find more flexible arrangements, they would seek out another employer that provides greater flexibility – compared to 57 percent expressing the same desire in Q3 of 2021.

According to a December 2017 Gallup report titled, “Thinking Flexibly About Flexible Work Arrangements,” along with helping develop and keep high-performing workers, creating and improving a flexible workplace also intensifies the tie workers have to their employer, as well as reducing employer expenses. While lowering costs is always attractive, it’s important to understand that not every role or type of business will have the same implementation opportunities.

When businesses formulate their flexible working arrangement, employers and employees must be on the same page, have clear expectations, and a way to measure that work is being completed in a manner similar to that in office. One important consideration is ensuring that remote employees are treated with the same consideration for potential promotions, projects, etc. Do managers and senior executives maintain the same level of treatment of employees whether someone comes into the office or works remotely and at different hours?

As for jobs that cannot be performed remotely, flexibility may not be very realistic. However, businesses can offer employees compensatory approaches to flexibility. Examples include a relaxed dress code and the ability, within reason, to choose lunch and break times. Employers also may offer the option for both an open floor plan and traditional office space to provide variety that leads to creativity and innovation.

Additionally, employers can create digital spaces where in-person workers can communicate with co-workers to discuss covering and switching shifts in their work schedules, helping them attend to their personal lives better and foster camaraderie. Businesses also can gamify employees covering each other shifts; for example, by offering a reward system if they take on extra shifts.

Permitting workers to select their preferred variety of tasks gives employees an awareness of freedom and can increase capabilities. By switching tasks within a pre-determined time frame or permitting employees to work at different offices or sites, employers can similarly provide a flexible working arrangement. This lets employees take on new responsibilities, workplace flows, and engage with different co-workers.

 Variations on Flexible Working Arrangements

Another option is to work around employees’ personal circumstances. It could be a school system holding classes every other month or a mixed schedule. It also could take the shape of a four-day work week, whereby employees work 10 hours a day. This could similarly benefit families with children, parents, etc. that have medical or other special needs that can be addressed efficiently by a shorter but equally productive work week.

Splitting a Position

Having two (or more) employees perform duties of one full-time worker is called job sharing. This happens via employees performing a part-time schedule, combining to create a single full-time position. It’s able to satisfy the role of a full-time job while meeting the needs of workers looking for part-time work.

Legal Considerations

One consideration for employers to maintain compliance with the Fair Labor Standards Act (FLSA) for non-exempt employees with flexible work arrangements is to strictly monitor hours worked. According to the FLSA, non-exempt employees must receive 1.5 times standard wages when they work beyond 40 hours within any continuous seven-day work week. Ensuring that workplace guidelines are crafted and implemented equally, as well as documenting the implementation, is one way to reduce the risk of discrimination claims.

While providing flexible working arrangements is unique to every business, offering it can provide many benefits, especially the potential to attract and retain high-performing staff.

Sources

https://futureforum.com/pulse-survey/

https://www.gallup.com/workplace/236183/thinking-flexibly-flexible-work-arrangements.aspx

https://www.dol.gov/agencies/whd/flsa

The Rise in Ransomware Attacks and How to Keep Safe

RansomwareCybersecurity experts estimate that there is a ransomware attack every 11 seconds. This makes it a challenge to individuals, businesses, and even governments.

In ransomware attacks, cybercriminals encrypt a victim’s network or data, making it inaccessible until a ransom is paid. Despite organizations’ efforts to reduce the attacks, cybercriminals also are advancing their attack methods. For instance, an organization may have backups they can use to restore their systems, but the criminals also demand ransom not to publish the sensitive company information they have in their possession.

Ransomware is not a new cybersecurity threat. It is traced back to 1989 when the first ransomware was released through floppy disks and required a victim to send money to a post office box in Panama. As technology has now advanced to allow for always-on connectivity, the prevalence of ransomware has grown tremendously. The use of Bitcoin and other cryptocurrencies as payment makes it more complicated as they are difficult to trace. These attacks, such as the WannaCry, CryptoLocker, etc., have resulted in billions in losses through infrastructure and business outages and millions of dollars being paid to the attackers.

Ransomware has grown so much that organized gangs are offering cybercriminals services for hire. This is made more intricate by the availability of ransomware-as-a-service (RaaS) to provide infrastructure to other cybercriminals to escalate their attacks.

Ransomware has become such a global threat that in a joint advisory made up of CISA, FBI, NSA and International Partners, has called for every government, business, and individual to be aware of this threat and take necessary action to avoid becoming victims.

President Joe Biden also continuously issues warnings to business leaders to strengthen their companies’ cyber defenses. The risks of cybersecurity are expected to increase with the ongoing invasion of Ukraine by Russia.

On the other hand, there are efforts to reduce the threat scale by various groups. One such group is the Cyber Threat Intelligence League (CTI-League), made up of cybersecurity experts from different countries. They have helped take down malicious websites, detect vulnerabilities, collect and analyze different phishing messages, and assist law enforcement organizations in creating safer cyberspace.

Protecting Against Ransomware

Before a ransomware attack is fulfilled, there are detectable activities that can aid in mitigating an attack. In any case, the attackers target specific user behavior, unchanged default security configurations and common technology vulnerability. This means that ransomware attacks can be avoided. Some ways to keep safe from ransomware include:

  1. Timely patches – ensure to patch operating systems and other software immediately whenever a patch is released. Patching also should apply to cloud environments, including virtual machines, serverless applications, and third-party libraries.
  2. Keep backups – it is impossible to fully protect an organization’s network as one user action may expose the network to attacks. Regularly backing up data is crucial. However, ensure that cloud backups are encrypted and can’t be deleted or altered. Also, always keep a backup version that is not accessible through the cloud to ensure business continuity in case of an attack.
  3. User training – users are considered the weakest link in the line of defense against cybersecurity. An attack can start with a seemingly legit email containing a link or an attachment that downloads malware to a device once clicked. Therefore, continuous user training and phishing exercises will help reinforce user responses to suspicious emails.
  4. Secure and monitor RDP – as more people adopt remote working, they rely on the remote desktop protocol to connect to office computers or colleagues. This has made RDP one of the most commonly used methods for attackers to gain access to a network. Therefore, businesses should use Network Level Authentication (NLA) and use unique and complex passwords for users to authenticate themselves before making a remote connection. Other ways include multifactor authentication, setting time limits to disconnect inactive RDP sessions automatically, and limiting login attempts.
  5. Use up-to-date antivirus software – this should be used to regularly scan the systems and scan files downloaded from the internet before they are opened.
  6. Network monitoring – use network monitoring tools and intrusion detection systems to look out for any suspicious activity.

The CISA, FBI, NSA, and International Partners joint advisory discourages paying ransom to cybercriminals and recommends following the CISA ransom response checklist and reporting to cybersecurity authorities such as the FBI, CISA, or the U.S. Secret Service. System administrators should also follow incident response best practices that can aid in handling malicious activity.