How to Account for Accretion

What is Accretion?Whether it’s an individual investor or a business owner looking to increase their earning power, understanding how accretion works is essential for individual and business investors to make the correct decisions going forward.

How Accretion Works for Bonds

Accretion is the gradual increase of a bond’s value over time. As a bond moves toward its maturity date, it increases in value until it reaches its face or par value – or what’s paid to the bondholder upon maturity.

If a bond has a face value of $2,000, yet it’s discounted at $1,900 when it’s offered for sale, the present value of the bond is $1,900, leaving the difference of $100 as the discount. Between the time of purchase and when it matures, the value of the bond will appreciate, up to its par value of $2,000. As the bond increases in value, this is referred to as an accretion discount. 

When it comes to accounting for bond accretion, there are two common methods.

Straight-Line Method

This approach documents the bond’s appreciated monetary gain and is laid out equally over the bond’s time frame until maturity. For a bond with a term of 10 years and a business that publishes its earnings once a quarter, there are 40 earnings releases.

If there’s a $100 discount, spread across 40 quarters, that is $2.50 every three months. The $2.50 is the quarterly accretion until the bond matures.

Constant Yield Method

This method is different from the straight-line method in that the bond’s value appreciation increases in value closer to the bond’s maturity date.

Acquisitions and Accretion

Companies can also benefit from accretion. Through the concept of synergy, where there’s more output from combining multiple entities than the sum of them if still separate, an acquiring company adds the earnings before interest, taxes, depreciation, and amortization (EBITDA), for example, to add to its existing shareholders’ value.

Illustrating How it Works

If Company X wants to increase its earnings per share for its shareholders, an acquisition is one way to do so. Assume Company X earned $1 million in net income the preceding year and has 3 million shares. And then there is Company Z, which had $500,000 in net income over the same time frame, with 1 million shares issued to raise cash. The following is a way to calculate the acquisition accretion value of the new combined company.

Earnings Per Share of Company X: 1,000,000 / 3,000,000 = 0.33

Earnings Per Share of the new company post-acquisition: ($1,000,000 + $500,000) / (3,000,000 + 1,000,000) = $1,500,000 / 4,000,000 = 0.375

Based on the calculation, the earnings per share of the post-acquisition company are $0.375. Compared to the EPS for the original, pre-acquisition Company X, the post-acquisition company is $0.045, resulting in a positive acquisition accretion.

Whether an individual investor is looking to see how bond accretion works or a company is looking at whether an acquisition makes business sense, understanding how accretion works is essential to ensure it’s accounted for properly.

Get a Jump on Holiday Shopping: Key November Dates

Holiday ShoppingFor some of us, last-minute holiday shopping is just what we do. That said, it’s probably never fun, and two things invariably seem to happen: The gifts you want aren’t available, and you end up paying too much. That’s why shopping in November to get the best savings on what you want just might be the right thing to do this year. Here are a few sales dates to put on your calendar.

Singles Day, November 11. Originally started in China as a humorous “anti-Valentine’s Day” event, it’s become one of the biggest shopping days of the year, surpassing Black Friday and Cyber Monday. To top it off, the date, 11/11, was chosen because it symbolizes, you guessed it, four ones – aka singles. On this day, you can find huge discounts at a lot of high-end clothing stores like Athleta, Nordstrom, Lululemon, Abercrombie & Fitch, Madewell, Neiman-Marcus, and J. Crew, to name a few.

Pre-Black Friday, November 20-27. Yes, there is such a thing, as if Black Friday isn’t enough in and of itself. Nevertheless, lots of retailers get in on this. This year, you’ll want to check out early access on holiday deals at Costco, Lowe’s, Best Buy, as well as Kohl’s, GameStop, and PetSmart. You can find other merchants who offer deep discounts here.

Black Friday, November 28. It’s probably the most famous shopping day of the year, where you’ll find huge price cuts across all categories. If you’re into tech stuff, head to Apple, AT&T Wireless, Dell, Google, HP, Lenovo, or Micro Center to start. The big box places to hit are Walmart, Target, and Sam’s Club. For home goods, you’ll find savings at Bed, Bath & Beyond, Ashley Furniture, and Crate & Barrel. If you want a comprehensive list, go to blackfriday.com. (See? There’s even a website dedicated to this day!) But get ready to scroll because there’s a lot there.

Small Business Saturday, November 29. Originally launched in 2010 by American Express, this day is all about shopping at your local stores. So hit your neighborhood shops, markets, coffee shops, and boutiques to support your friends and neighbors. If you don’t know where to start and don’t have a lot of time, just Google “small business Saturday sales near me” and you’ll be good to go.

Cyber Monday, December 1. To cap off all the November savings, you can’t forget this day. And yes, it’s not technically in November, but that’s OK. This date is great because you can let your fingers do the shopping. Online-only offers are king, so hunker down and start searching. Some places with the biggest deals are, again, (and not surprisingly) Amazon, Target, and Walmart – the big three. For more price-cutting goodness, go here.

Life gets busy around this time of year, but if you take a moment, get your list and hit a few of the aforementioned stores, you’ll be way ahead come the holidays. And that just might be the best gift of all.

 

Sources

Holiday Shopping Calendar: Key Discount Dates 2025 | GiftList Blog | GiftList

https://giftlist.com/blog/holiday-shopping-calendar-key-discount-dates-2025

Understanding The Q Ratio

Understanding The Q Ratio, What is Tobin's Q RatioWhen it comes to evaluating a business, there are many ways to perform a valuation. One way to do so is to use the Q Ratio. Known as Tobin’s Q Ratio or simply the Q Ratio, this method looks at the proportion between the values of a physical asset and its replacement cost. Developed by Nobel laureate economist James Tobin, this ratio presumes a single company; for public investors, if asset values can be estimated, the company’s market value of a publicly traded company may be approximately estimated.

The original formula is as follows:

Q Ratio = Market Value of Assets / Replacement Cost of Capital

While this formula is the original iteration, approximating an asset’s replacement value is complicated and oftentimes not 100 percent realistic to analyze. The more realistic way it’s calculated is by using book values in lieu of the asset’s replacement costs. The new way to calculate it is as follows:

Q Ratio = (Equity Market Value + Liabilities’ Market Value) / (Equity Book Value + Liabilities’ Market Value)

When it comes to calculating the overall market’s Q Ratio:

Q Ratio = Value of the Stock Market / Corporate Net Worth

Putting the Q Ratio in Practice

Essentially, it’s used to value a company. Once calculated, the Q Ratio provides internal stakeholders and outside investors with one way to evaluate a company.

Above 1

If the Q Ratio is more than 1, the business’ market value is higher than its booked assets. It means a company’s valuation is overestimated in the eyes of the market since there is some portion of the company’s assets that are either not documented or valued fully. When the Q Ratio is above 1, a business’ earnings are worth more than replacement costs for the assets. At this level, entrepreneurs are incentivized to develop a competitor business to gain market share and financial gain.

Equal to 1

When the Q Ratio equals 1, it implies the market sees the company’s assets as valued fairly.

Below 1

At this level, a business’ assets are worth more than fair market value, establishing the business as undervalued. Investors with enough assets can purchase the company in question, either via shares if publicly traded or outright if a private company, versus trying to create a competitor company to siphon value away from it.

Further Consideration

When it comes to the calculated Q Ratio, it’s important to keep it in context. While accountants can be precise with many things during preparation, when it comes to market forces and intangible assets, analysts need to use their judgment. Investors and market forces can create hyperbole for a business’ value that can’t be quantified and recorded by accountants. Stock analysts’ perspectives on a business’ prospects or rumors regarding future performance can modulate the present, dynamic valuation of the company.

Another consideration is how to document and gauge intangible assets like intellectual property and goodwill. While accountants can approximate IP or goodwill, it’s not an exact science.

Thus, when businesses use the Q Ratio to value their own company or one they consider purchasing, investors must take the Q Ratio as part of a holistic valuation approach.

Why Authorization Sprawl Is the Next Big Security Blind Spot and How to Fix It

Authorization Sprawl, What is Authorization SprawlDespite major investments in cybersecurity, organizations continue to face breaches. Most security mechanisms implemented guard against threats such as password theft. However, there is a growing concern with the unchecked expansion of user access, permissions, and tokens across apps, clouds, and systems.

This growing challenge is known as authorization sprawl, and it is becoming one of the most dangerous and least visible threats in modern enterprise security.

According to insights from the SANS keynote at the RSAC 2025 Conference, attackers are increasingly exploiting this sprawl to gain legitimate, persistent access that bypasses multifactor authentication (MFA), security information and event management (SIEM) alerts, and endpoint detection and response (EDR) visibility altogether.

What is Authorization Sprawl?

Authorization sprawl occurs when access permissions multiply uncontrollably across systems, users, and applications. Every time a team or department adds a new SaaS integration, service account, or API key, another layer of permission is introduced.

In an attempt to make access to multiple applications easy, users also have single sign-on (SSO), designed to help log in once and access multiple applications securely. Here, users are granted access to several connected systems through SSO, adding to the authorization sprawl problem.

Over time, all these factors create a complex ecosystem that even security teams have a hard time tracing who can access what.

Unlike authentication, which verifies who someone is, authorization determines what one can do. When permissions expand without review, attackers take advantage of forgotten tokens, dormant accounts, or outdated roles to move freely inside systems.

Why Traditional Defenses Miss It

Most defenses focus on identity verification, such as MFA, conditional access, and endpoint protection. But once a user is authenticated, there is no monitoring. This is the blind spot that attackers exploit. Instead of breaking in, they log in using legitimate session tokens, application programming interface (API) keys, or open authorization (OAuth) grants.

The misuse of valid credentials or access tokens enables cloud-related breaches. These attacks bypass traditional detection tools because they appear to be normal activity by authorized users.

A recent incident involving Salesloft’s Drift application highlights how damaging authorization sprawl can be. Drift, an AI chatbot often integrated with Salesforce, was exploited after attackers gained access to Salesloft’s GitHub account and later its AWS environment. From there, they stole OAuth tokens and authentication credentials, exposing Salesforce data from potentially hundreds of organizations. This incident is an example of how interconnected SaaS systems and unchecked authorization links can create a cascading breach effect, where one weak point leads to multiple breaches across services.

The Business Impact of Authorization Sprawl

Aside from increasing technical risk, authorization sprawl erodes compliance, governance, and trust.

  1. Regulatory Exposure – Frameworks like GDPR, SOC 2, and HIPAA require strict access control and auditability. Untracked permissions make demonstrating compliance nearly impossible.
  2. Operational Risk – An overprivileged account can unintentionally leak data, delete configurations, or expose APIs.
  3. False Sense of Security – Zero Trust frameworks often stop at identity verification. Failing to continuously validate authorization is equivalent to protecting the front door while leaving internal doors wide open.

How to Fix Authorization Sprawl

Luckily, solving this problem does not require removing existing security controls but rather extending visibility and discipline into authorization.

  1. Conduct Regular Access Audits – Map users, roles, and permissions across your environment. Be sure to look for redundant privileges, dormant accounts, and orphaned API keys. Use tools that help visualize hidden paths and privilege escalation routes.
  2. Implement Structured Access Control – Use frameworks like role-based access control (RBAC) or attribute-based access control (ABAC). Standardizing roles ensures fewer exceptions and easier auditing.
  3. Automate Reviews and Revocations – Integrate identity and access management (IAM) with HR systems so access automatically changes when employees leave or change roles. This helps eliminate the temporary access that never gets removed.
  4. Shorten Token Lifetimes and Rotate Credentials – Session tokens and personal access tokens (PATs) should have an expiration period, such as 30 to 90 days. Using automated key rotation policies will help prevent long-lived access tokens from becoming backdoors.
  5. Enforce the Principle of Least Privilege – Grant users and systems only the minimum access needed.
  6. Extend Zero Trust to Authorization – Verification shouldn’t end with login. Apply continuous authorization checks.

Conclusion

As cloud ecosystems, APIs, and integrations continue to multiply, authorization complexity will grow exponentially. Businesses that invest in mapping and controlling authorization sprawl will stay ahead of both attackers and regulators. In cybersecurity, visibility equals control, and this begins with knowing exactly who can do what.

The Hidden Tax Trap Keeping America’s Housing Market Frozen

capital gains taxes on your home America’s housing crisis has reached a breaking point. With median home prices soaring past $400,000, the National Association of Home Builders reports that 60 percent of U.S. households can’t even afford a $300,000 home. The math has become impossible for most American families.

While we often blame high mortgage rates, restrictive zoning laws and rising construction costs for the housing shortage, there’s another culprit hiding in plain sight: a decades-old tax rule that’s trapping millions of homeowners in houses they’d rather leave.

The $500,000 Problem

When Congress overhauled capital gains taxes on home sales in 1997, they created what seemed like a generous benefit: homeowners could exclude up to $250,000 in profits from taxes ($500,000 for married couples) when selling their primary residence. This replaced a complex system of rollovers and age-based exemptions with something simpler and cleaner.

But Congress made one critical mistake – they never adjusted these limits for inflation or housing price growth.

Nearly three decades later, these same dollar amounts remain frozen in time, even as home values have skyrocketed. According to new research from Moody’s Analytics, if the exclusion had kept pace with home prices, it would now stand at $885,000 for singles and $1,775,000 for couples. Even adjusting for general inflation alone would double today’s limits.

The Senior Squeeze

This outdated tax rule hits empty-nesters particularly hard. Consider this: nearly 6 million households headed by seniors live in homes larger than 2,500 square feet. Many would gladly downsize to something more manageable, but selling could trigger six-figure tax bills on homes they’ve owned for decades.

The result? They stay put, waiting until death when their heirs can inherit the property with a stepped-up basis that erases all capital gains. Meanwhile, these oversized homes remain off the market, unavailable to growing families who desperately need the space.

Moody’s Analytics estimates these “overhoused” seniors spend $3,000 to $5,000 more annually on maintenance, utilities and property taxes than they would in smaller homes – adding up to $20 billion to 30 billion in unnecessary costs nationwide each year.

An Unexpected Burden on the Middle Class

Surprisingly, this tax burden doesn’t primarily affect the wealthy. Middle-class homeowners in expensive markets like California and Massachusetts face steep tax bills despite modest incomes. Widows face their own challenges, having just two years after a spouse’s death to sell while maintaining the full $500,000 exclusion (though they do receive a partial step-up in basis on their late spouse’s share).

An IRS study revealed a startling fact: 20 percent to 25 percent of capital gains taxes collected under current rules come from filers earning less than $20,000 annually. Meanwhile, wealthier homeowners often have the resources and flexibility to structure sales strategically, minimizing their tax exposure.

The Housing Market Ripple Effect

This tax trap creates a cascade of problems. Young families remain stuck in starter homes. First-time buyers face even fiercer competition for limited inventory. Labor mobility suffers as workers can’t relocate to areas with better job opportunities. The entire housing ecosystem becomes frozen.

The shortage is stark: monthly active listings only climbed back above 1 million in May, according to realtor.com. Before the pandemic, that number hadn’t dropped below that threshold since at least 2016.

Solutions on the Table

Congress is considering two approaches to break this logjam. One would be to double the current exclusions and index them to inflation going forward. The more radical proposal would eliminate the cap entirely.

The Double-Edged Sword

Any change comes with risks. Moody’s Analytics warns that while updating these limits could unlock hundreds of thousands of homes and boost inventory, it might also intensify competition at the lower end of the market as downsizing seniors compete with first-time buyers for the same properties. It could also make housing an even more attractive tax shelter, which would ultimately drive prices higher.

The Path Forward

The paradox is clear: raising or eliminating the capital gains exclusion could provide immediate relief to millions of homeowners trapped by tax considerations. It could inject a much-needed supply into a starved market. But without careful implementation, it could just as easily fuel another round of price increases, leaving affordability as elusive as ever.

Financing Via Off-Balance Sheet Options

Off-Balance Sheet Options, Off-Balance Sheet Financing (OBSF)When it comes to business needs, securing financing is a top priority, particularly when starting out or for ongoing needs such as making payroll or paying for inventory. This financing could include a loan or securing an ongoing credit line, and businesses can do that through Off-Balance Sheet Financing (OBSF).

Defining OBSF

Off-Balance Sheet Financing is an accounting practice whereby businesses document liabilities or assets on their books but do not reflect them on their balance sheet. It’s important to note that while they’re not reflected on the business’ balance sheet, if their disclosure meets generally accepted accounting principles (GAAP), it’s legal. If select transactions aren’t on the company’s balance sheet, these transactions are generally found in a company’s financial statements via notes. If, however, company employees conceal material information from investors, then it becomes illegal. As the Federal Deposit Insurance Corporation (FDIC) and the U.S. Securities and Exchange Commission (SEC) lay out, financial statements also may contain references to lease expenses, rentals, or partnerships.

Why Companies Use OBSF

Businesses use this type of accounting to manage their debt usage. Along with reducing interest rates for commercial loans, businesses can lower their leverage and debt-to-equity ratios, reducing the chances of default and encouraging outside investment. This is even more advantageous to help companies obtain financing if they have debt covenants.   

In reaction to the Financial Accounting Standards Board’s (FASB) discovery of operating leases regarding OBSF of more than $1.25 trillion for lease accounting, it changed the requirement for OBSF in February 2016 to mandate U.S. public companies to record “right-of-use assets and liabilities from leases on balance sheets” per 2016-02 ASC 842, coming into force in 2019. Based on the publication “Accounting Standards Update No 2016-02 Leases (Topic 842) p. 1,” footnotes were mandated for greater transparency.

How OBSF Works

OBSF moves select assets, liabilities, or transactions away from their balance sheets. It’s done to attract investors or when a company has a ton of debt yet needs to borrow additional capital to fund operations. This can provide companies with more favorable lending rates. Such transactions are either moved to subsidiaries or via special purpose vehicles. The questionable assets are still there but are simply listed on related monetary documentation.

Depending on how the company proceeds, it can include entities that the parent company has a minority ownership stake in. This may include special purpose vehicles (SPV) that take on assets and liabilities, along with other entities such as joint ventures and research and development (R&D) partnerships.

Conclusion

When it comes to R&D partnerships, since R&D is capital-intensive and requires a long time for completion, OBSF is financially advantageous. It permits a company to reduce its liability over the research time since there are no substantive assets to help even out the liability. Industries such as healthcare can see benefits.

Another advantage of OBSF is that when an operating lease is used, it can create liquidity since capital is not tied up in purchasing equipment, and rental expenses are the only financial outflows.

When done according to GAAP guidelines and state and federal laws, companies that use OBSF can maximize their financial landscape.

Controversial Defense Funding Bill, Shoring Up ESOP Plans, and Leave Benefits for Public Health Personnel

Shoring Up ESOP PlansNational Defense Authorization Act for Fiscal Year 2026 (S 2296) – Introduced by Sen. Roger Wicker (R-MS) on July 15, the Senate passed this legislation on Oct. 9. The bill is a carve-out of the 2026 budget bill intended to fund military appropriations for the 2025-2026 fiscal year. The bill was largely supported by Republicans but less so by Democrats, who are in favor of keeping the government closed until all of their budget concerns are addressed. In addition to establishing funding and policies for military and defense-related activities, the bill includes a roadmap for bomber modernization, a real-time database for contractor compliance oversight, and authorizing programs for nuclear weapons facilities. The legislation would authorize $32.1 billion over the President’s budget request, and the White House opposes provisions in the bill that thwart the President’s ability to control immigration and conduct foreign affairs, including submitting plans to Congress ahead of actions, dictating the terms of intelligence support to Ukraine, and enabling the Defense Department to bypass the Administration’s tariffs. The bill currently rests with the House, which asserts it will not return to regular session until the Senate passes the current controversial CR budget bill.

Employee Ownership Representation Act of 2025 (S 1728) – This bipartisan bill seeks to expand the membership of the Advisory Council on Employee Welfare and Pension Benefit Plans to include two representatives of employee ownership organizations. While the council presently includes 15 members from business, labor, and the public, the council has no expertise specific to Employee Stock Ownership Plans (ESOPs). The legislation was introduced by Sen. Bill Cassidy (R-LA) on May 13 and passed in the Senate on Oct. 9. It currently awaits consideration by the House.

Retire Through Ownership Act (S 2403) – The main purpose of this bill is to provide a clear definition for certain closely held stock that aligns valuations with IRS standards in an effort to mitigate valuation risk for ESOPs. It would also provide “safe harbor” for trustees relying on these guidelines. The Act was introduced by Sen. Roger Marshall (R-KS) on July 23. It passed in the Senate on Oct. 9 and currently lies with the House.

Uniformed Services Leave Parity Act (S 1440) – Introduced by Sen. Tammy Duckworth (D-IL) on April 10, this legislation would authorize leave benefits (parental leave, emergency leave) to Public Health Service (PHS) officers. The bill sponsors assert that the current lack of these important benefits is a challenge to recruiting and retaining PHS personnel, who should be on par with the same benefits offered to uniformed service members. The bill passed in the Senate on Oct. 9 and is up for review in the House.

Internal Revenue Service Math and Taxpayer Help Act (HR 998) – This bill was introduced on Feb. 5 by Rep. Randy Feenstra (R-IA). Among other provisions, it instructs the IRS to provide taxpayers with details of notices that relate to a math or clerical error. The bill passed in the House on March 31 and in the Senate on Oct. 20. It currently awaits the President’s signature to become law.

Understanding Contribution Margin After Marketing

Contribution Margin After Marketing (CMAM)Contribution margin after marketing (CMAM) measures how much money is generated per unit retailed after factoring in a company’s variable costs, along with marketing costs.

It’s analogous with contribution margin, however, a business must factor in marketing costs the company experiences when publicizing a good to likely consumers with details on the business’ wares. This metric determines how well net sales can satisfy expense obligations and what percentage of net sales may remain to satisfy fixed expenses.

Comparing Variable Versus Fixed Costs

Variable costs, as the name implies, are expenses that rise and fall according to output quantities. Fixed costs, conversely, are expenses that don’t change despite variation of production quantities. Understanding these concepts is helpful when calculating CMAM to see how both types of expenses impact the different calculations.

CMAM = Sales Revenue – Variable Costs – Marketing Expense

It can also be determined on a per-unit basis to help a business understand how a single product unit contributes to the company’s comprehensive profits. One can calculate the CMPU (contribution margin per unit) as follows to provide a more granular analysis:

CMAM/Unit = Sales Revenue/Unit – Variable Expenses/Unit – Marketing Expense/Unit

What separates variable costs (including marketing expenses) from the sales revenue is CMAM. The balance is profit along with fixed costs. To calculate if a business saw a net loss or profit, the formula is:

Net Operating Profit = CMAM – fixed costs

If a profit is reported after subtracting variable costs, costs to market, plus fixed costs, it means a business or specific department is profitable. If it’s negative, the business sees a loss that won’t enable it to pay its bills.

Illustrating CMAM

When it comes to a company producing widgets, the following is already known. Variable costs for production for a single widget are detailed below:

  • $2.25 for unprocessed inputs
  • $1.80 firsthand production expenses
  • $0.50 power
  • $0.40 freight expenses
  • $4,500 business equipment rentals
  • $6,000 factory rent
  • $30,000 management salary
  • $10,000 marketing costs

Each widget costs $10, and the business sold 30,000 last year. Therefore, it’s calculated as follows:

CMAM = Sales Revenue – Variable Costs – Marketing Expense

Sales Revenue = $10 x 30,000 = $300,000

Variable Costs = ($2.25 + $1.80 + $0.50+ $0.40) x 30,000 = $4.95 x 30,000 = $148,500

CMAM = $300,000 = $148,500

The next step is to calculate net operating loss or profit: we take CMAM ($148,500), then subtract fixed costs:

$148,500 – ($4,500 + $6,000 + $30,000)

$148,500 – $40,500 = $108,000

Based on that calculation, the company producing widgets realized $108,000 for its net operating profit last year. The next section will discuss how businesses can use this information to improve their operations.

Using CMAM for Business Analysis

Managers use this metric to determine the viability of a product. If there are multiple iterations or options of a product, it can help managers determine which product sells the best and rank them if there are multiple versions of a widget. Businesses can analyze each unit’s contribution margin for each version of a widget to determine which versions provide the greatest option for profitability. Depending on the outcome, the company may choose to produce only the most profitable one or two widgets.  

When it comes to the CMAM, businesses that use it for analysis can increase their sales efficiency for the present and future.

The Silent Threat: How Simple Misconfigurations Are Fueling 2025 Worst Cyberattacks

Simple Misconfigurations Are Fueling 2025 Worst CyberattacksAs organizations invest heavily in next-gen firewalls, AI detection, and threat intelligence, grave cyberattacks have been reported as a result of overlooked misconfigurations. According to the latest statistics, about 23 percent of cloud security incidents are directly connected to misconfigurations. These missteps create easy entry points for cybercriminals that may lead to data breaches, ransomware demands, and financial loss.

What are Misconfigurations?

Misconfigurations are overlooked errors in system setups that create vulnerabilities without the need for hackers to apply advanced hacking techniques. These silent threats are human-driven oversights when configuring software, hardware, or cloud services. Good examples include improperly set permissions in cloud storage, insecure API keys left in code repositories, inadequate security monitoring, and unsecured access points like IoT devices with default passwords.

These issues arise from human error, which accounts for 82 percent of misconfigurations. This is also compounded by today’s cloud era, where businesses depend on cloud platforms, software as a service stacks (SaaS), and AI-driven infrastructure. Many organizations now use multiple providers, and this makes configurations challenging. Rushed deployment also adds to the misconfiguration problem, especially when a thorough audit is not conducted. Unlike malware or phishing scams, misconfigurations remain undetected until exploited.

2025’s Worst Cyberattacks Fueled by Misconfigurations

This year alone, there has been a surge in incidents related to misconfiguration, which is alarming. There were more than 9.5 million cyberattacks in the first half of the year. A good example is the Coinbase breach of May 2025, in which data from more than 70,000 customer records was stolen. This breach is attributed to insider threats exploiting misconfigured permissions.

Recently, cybersecurity researchers revealed a botnet campaign that exploited misconfigured DNS sender policy framework (SPF) records across 20,000 domains and compromised more than 13,000 MikroTik routers. This enabled large-scale spam and spoofing attacks.

In many regions, misconfigured VPN gateways and remote access tools have also contributed to ransomware campaigns. This is through attackers bypassing perimeter defenses by exploiting a misconfigured VPN portal.

IoT weaknesses have also seen entire networks of smart devices compromised, simply because administrators did not change the default login credentials. The entry points ranged from security cameras to industrial sensors, allowing attackers to access more sensitive corporate systems.

Why Organizations Keep Making the Same Mistakes

  • Talent shortage – Many IT teams are stretched and lack sufficient experts to catch every misstep.
  • False confidence in automation – While automated tools are a great help, they are not foolproof. Overreliance on these tools and having a set-and-forget mindset can leave room for security breaches.
  • Velocity over security – This happens when rapid delivery of product features overshadows the slower discipline of security reviews.
  • Siloed responsibility – In many organizations, security is delegated to a separate team instead of being embedded across different units like the development, operations, and business units.
  • Awareness gap – Many teams underestimate how a single overlooked setting, like an open test environment, can escalate into a full-scale breach.

Prevention Strategies and Best Practices

Fortunately, misconfigurations are one of the preventable causes of security breaches. Preventing misconfigurations requires proactive measures that include:

  • Continuous auditing and testing – It is crucial to ensure regular audits and testing of automated tools for configuration management to detect and reduce the window of exposure.
  • Adopt zero-trust models – No device or user should be trusted by default; grant only minimum access where required.
  • Strengthen access controls – Always change default device credentials, partition networks, and enforce MFA across all accounts.
  • Automated detection tools – Use cloud security posture management, compliance-as-code, and drift detection to catch misconfigurations in real time.
  • Cross-functional training and culture – Employee training is vital, as human error accounts for 82 percent of incidents. Security literacy should extend to both technical and non-technical teams.
  • Follow industry guidelines – Align with recognized security frameworks (NIST, ISO, CIS) and CISA’s published guidance on the Top Ten Cybersecurity Misconfigurations. For example, avoid using default configurations, enforce patch management, and properly segment networks.
  • Incident response readiness – Have a well-drilled response playbook to ensure minor disruption in case the defenses fail.

Conclusion

Simple misconfiguration remains a silent enabler of devastating cyberattacks through avoidable errors. Business owners must prioritize configuration hygiene to build resilient digital infrastructures and protect against future threats.

It is a clear lesson that cybersecurity doesn’t always depend on battling sophisticated hackers but rather ensuring they don’t get an easy way in.

Initial Look at the New Tax Form Schedule 1-A: Four Key Deductions for 2025

Tax Form Schedule 1-AThe IRS has released draft Schedule 1-A, introducing four new temporary deductions within the One Big Beautiful Bill Act. If you are wondering what the new form looks like and how the calculations work, read on as we explore each below.

Modified Adjusted Gross Income (MAGI)

It is important to note that all four deductions require calculating your MAGI first, which determines eligibility and phaseout amounts for each deduction.

The Four New Deductions and How the Calculations Work

These deductions are all referred to on the schedule by their colloquial names, for example: “No Tax on Tips,” “No Tax on Overtime” and “No Tax on Car Loan Interest.” The sole exception, however, is popularly referred to as the “No Tax on Social Security” provision, which is called the “Enhanced Deduction for Seniors” on the form.

1. Tips Deduction

  • Maximum: $25,000 annually
  • Eligibility: Must receive qualified tips in customarily tipped occupations
  • Phaseout: Begins at $150,000 MAGI ($300,000 joint filers)
  • Rate: $100 reduction per $1,000 over threshold
  • Requirements: Valid Social Security number; married couples must file jointly

2. Overtime Deduction

  • Maximum: $12,500 single ($25,000 joint filers)
  • Eligibility: Only the premium portion of overtime pay (the “half” of time-and-a-half)
  • Phaseout: Same as tips deduction – begins at $150,000 MAGI
  • Rate: $100 reduction per $1,000 over threshold

3. Car Interest Deduction

  • Maximum: $10,000 annually
  • Eligibility: Interest on loans for new vehicles under 14,000 pounds and assembled in the United States
  • Phaseout: Begins at $100,000 MAGI ($200,000 joint filers)
  • Rate: $200 reduction per $1,000 over threshold
  • Requirements: Must provide VIN; loan must originate after Dec. 31, 2024

4. Enhanced Deduction for Seniors

  • Amount: $6,000 fixed deduction
  • Eligibility: All taxpayers (replaces “No Tax on Social Security” promise)
  • Phaseout: Begins at $75,000 MAGI ($150,000 joint filers)
  • Rate: 6 percent reduction of excess income over threshold

Key Points to Remember

  • All deductions are available whether you itemize or take the standard deduction
  • All require valid Social Security numbers
  • Married couples must file jointly to claim these benefits
  • Income limits mean higher earners receive reduced or no benefits
  • These are deductions, not exclusions – income is still reportable for state/local taxes

Final Steps

After you have calculated everything applicable for the four possible deductions, you will enter the total on the new line 13b on Form 1040. The total amount of the deductions entered here is removed from your income prior to calculating your tax. Remember, these are deductions and not credits, so they only reduce your taxable income and are not a direct reduction in your tax due.

You can see an example of the new draft Form 1040 illustrating this below.

Screenshot of new Form 1040

Conclusion and Draft from Status – and IRS Warning

The above provides guidance to taxpayers and professionals on how both the deductions calculations work and flow through Form 1040. The IRS warns, however, that the forms and instructions currently released are in draft form at this point. Before any forms or instructions can be released in their final state, they need to be approved by the OMB. It is not unusual for draft releases of instructions and publications to have some changes before their final release, even if only minor.