Watch: Avoiding Falling Victim to Ransomware

Date August 24, 2022

Highlights from the August 24, 2022, webinar hosted by William J. Heaven, Senior Director, HBK Risk Advisory Services, with guests Justin Krentz, Senior Manager, Vertilocity, and Josh Prager, vCIO, Vertilocity

Watch On-Demand.

The How and Why of Ransomware Attacks

Ransomware is a virus that affects your devices, that can stop a device from working until you pay a ransom. They commonly come through malicious websites, email attachments to fake emails, links on emails, and downloadable applications. Paying a ransom doesn’t mean they’ll fix your computer or remove the virus and could even make you a target for more attacks.

Internal threats:

  • 67 percent of data breaches due to human error
  • The result of phishing attacks: socially engineered attacks
  • Passwords that can easily be guessed; using same passwords for multiple accounts
  • Data leaks: sending to or granting access to individuals who should not have access to your data
  • External threats:

  • Nonexistent or expired anti-virus software or lack of firewalls
  • Out-of-support hardware
  • Unpatched software
  • Unsecured devices
  • Why businesses don’t have the security they need – common misconceptions:

  • It’s too expensive.
  • It’s not a top priority: Should have enterprise protections in place.
  • It’s too complex: Doesn’t have to be expensive and cumbersome.
  • Assuming that compliance is enough.
  • Preventive options: Seven layers of cybersecurity:

  • Mission-crucial assets:Build a robust plan, Reveal any vulnerability that can be used to compromise your data, Identify your security objectives, Provide customized recommendations and best practices NS Create an actionable recovery plan.
  • Data security: Classify and label data: Will automatically encrypt if someone tries to access it, Limit account access to sensitive data with privileged access management, Move data to the cloud to take advantage of advanced backup and rollback features and exercise it regularly, Ensure regular, thorough backups and validate and Exercise your business continuity/disaster recovery plan: Know who to call first, what to do first; if you don’t have a plan ask your IT provider for one.
  • Endpoint and application security : Clients, servers and browsers: Have to have security on these devices, Exposed endpoints allow access: Make sure anti-virus is up to date, Implement risk-based conditional access, Enforce multi-factor authentication and Do available software updates and monitor them.
  • Network and perimeter security: Monitor resources for abnormal activity, Adopt best-in-class tools to detect known threats, Use automation tools to detect known threats and Employ real-time threat detection solutions.
  • The human layer: People are your biggest risk, Do security awareness training, Build a security culture: Needs to be a top-down initiative with C-suite leadership, Employ a dark-web monitoring service: Can do a scan to see if you have any credentials available for sale on the dark web and If you can’t implement cybersecurity program on your own, bring in a professional cybersecurity provider.
  • Surviving an Attack

  • Start with a plan to mitigate potential damage: Who do I notify, how do we recover?
  • Stop the bleeding: Disconnect from the internet immediately and segregate compromised hardware; quarantine the compromised files.
  • Data recovery: Back up your data outside your network; have data backup requirements in your plan; do a clean sweep of data and applications.
  • Install the latest software and security updates.
  • Best defense against cyber threats is an informed workplace.
  • Have a cyber insurance policy woven into your disaster recovery plan.
  • Ransomware threat report: 2021-22

  • Average ransom demand increased 144 percent.
  • 31 percent of U.S. companies closed after an attack.
  • At least one employee downloaded a malicious mobile application in 46 percent of organizations in 2021.
  • Ransomware breach response costs took up 52 percent of the overall cost of a ransomware attack in 2020.
  • Of the 32 percent of ransomware victims who paid the ransom in 2021, only 65 percent of the data was ultimately recovered.
  • Speak to one of our professionals about your organizational needs

    "*" indicates required fields

    hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.



    Webinar: Updates on Legislation Affecting Manufacturers

    Date August 17, 2022
    Categories

    Highlights from the August 17, 2022, webinar hosted by James Dascenzo, CPA, Principal, and National Director of HBK Manufacturing Solutions, and Nicholas Demetrious, CPA, MBA, Principal, HBK Tax Advisory Group

    The events of recent years relative to the pandemic have heightened the need to increase chip production in the U.S. U.S. share is currently 12 percent, down from 37 percent in 1990. China wants to control space by 2030. Most advanced chips are made in Taiwan. The CHIPS + Science Act, signed into law on August 9, commits $280 billion, much of which is not appropriated, to bolstering chip production in the U.S.

    The bill had bipartisan support in the House and also in the Senate, indicating politicians on both sides of the aisle recognized the need to step up efforts for on-shoring chip production.

    The CHIPS Act and Inflation Reduction Act complement each other. How politics and business go together is an interesting study.

    CHIPS Act

    Chips for America Fund; creates incentives to produce semiconductors. Total of $52.7 billion, $39 billion of which is set aside for incentive programs to promote manufacturing. $37 billion for assistance for construction and expansion of semiconductor fabrication facilities.

  • $2 billion for chips used in automotive and defense systems
  • $11 billion for semiconductor manufacturing research and workforce development
  • $2 billion for CHIPS for America Defense Fund
  • Plus:

  • $1.5 billion dedicated to a public wireless supply chain innovation fund to spur movement to open-architecture, software-based wireless technology. Designed to promote 5G networks throughout the U.S.
  • The biggest chunk of $200 billion is designated to support R&D in advance and emerging technologies. Much of the money will go to the National Science Foundation to increase research. The U.S. Energy Department’s Office of Science will receive up to $50 billion to enhance a series of programs focused on clean energy, nuclear physics and high-intensive lasers as they relate to semiconductor manufacturing. Also, the bill will establish 20 regional technology hubs to create more chip manufacturing employment.

    The bill also includes money for NASA for research that will lead to bringing Americans to Mars and put the first woman and first person of color on the Moon.

    The advance manufacturing investment credit: a 25% tax credit on qualifying investments or tangible property

  • Must be integral to the operation of an advanced manufacturing facility.
  • Must be constructed, reconstructed, or erected by the taxpayer.
  • Used for building and structural components, not for office, administrative or other functions unrelated to manufacturing. Demonstrating that will require a cost segregation study.
  • Can be used as a payment against tax for the year of the credit.
  • Subject to recapture but recapture amounts drop by 20% per year.
  • Reduces the basis of the property by the amount of the credit.
  • CHIPS Act investments should free us from exposure to Chinese supply chain issues and restore manufacturing jobs in U.S., including 3,000 new jobs with Intel in Ohio. That and spinoff businesses and employment combine for a potential boon to Ohio’s economy and other Midwest states. Likely to take three to five years to build Intel plant and get it running. South Korea will spend 450 billion and China will invest $1 trillion in semiconductor production over the next ten years. These investments will improve our viability in this very important industry.

    Inflation Reduction Act

    Signed into law August 16 by President Biden.

  • Whether or not it will reduce inflations is up for debate.
  • There are tax implications for some large companies and a slew of legislation to provide new credits and extend existing credits for clean energy.
  • Boosts budgets for the IRS whose resources have been gutted in recent years. Added IRS support is not designed to affect taxpayers making less than $400,000 per year.
  • Provides for an excise tax on large company stock buy-backs.
  • Returns a corporate minimum tax of 15 percent of the corporations’ adjusted financial statement income (AFSI) over its corporate AMT foreign tax credit. Applies to C-corps with an average annual incomes of more than $1 billion AFSI.

  • Has some adjustments, including taking accelerated depreciation and foreign tax credits: applied to taxable years beginning after 2022.
  • Designed to base current year tax on book income, which can be larger than tax income. Represents a change in the dynamics of U.S. tax law, where corporate taxes are generated from book income.
  • Excise tax of 1 percent on stock buy-backs by publicly traded corporations for tax years after 2022. Should not affect small, closely held businesses.

    Extends excess business loss limitation for non-corporate taxpayers two years. Won’t be able to take a business loss deduction of more than $524,000 for joint filers, $262,000, filing individually. Any excess carries forward like a net operating loss. Excess business loss limitation was included in the Tax Cuts and Jobs Act.

    IRS funding:

  • Funding had been reduced or cut in recent years leaving IRS with a lack of workers and outdated equipment.
  • Inadequacies became apparent during the pandemic.
  • Funding of $80 billion is to close the “tax gap” which is the difference between what should be collected by the IRS and what is actually collected.
  • Wants to hire 87,000 new workers over the next decade.
  • No IRS changes other than funding, again, to be used over the next ten years.
  • Should improve customer service and increase audits on large corporations.
  • The Act also:

  • Extends for three years Affordable Care Act subsidies ($84 billion)
  • Prescription drug reform to lower drug prices ($288 billion); Excise tax on drug companies that don’t comply could be onerous
  • Drought relief ($5 billion)
  • Intends to provide for a deficit reduction of $308 billion
  • Extends the insurance tax credit
  • Electric Vehicle tax credits

  • Extends current $7,500 EV tax credit through 2032
  • Credit of $4,000 for used cars priced $25,000 or less
  • Removes 2000,000 per manufacturer vehicle cap beginning in 2023
  • Requires U.S. assembly and encourages domestic sourcing of key battery materials
  • Income thresholds for buyers; cost limitations on vehicles
  • Applies for some plug-in hybrids
  • Clean energy tax credits:

  • Clean hydrogen production
  • Advanced manufacturing production
  • Nuclear power production
  • Extension of renewable electricity production
  • New clean energy products
  • Credit for residential clean energy
  • Credit for energy efficiency home improvements
  • -Deduction for energy improvements in commercial buildings

    -R&D tax credits of up to $250,000 against payroll taxes for businesses with less than $5 million gross receipts and less than five years old

    Many of the tax increases that were included in the Build Back Better plan are not in the Inflation Reduction Act.

    Speak to one of our professionals about your organizational needs

    "*" indicates required fields

    hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.



    Watch: EBSA Cybersecurity Guidance for Protecting Retirement Assets

    Date July 27, 2022

    Highlights from the July 27, 2022, webinar hosted by William J. Heaven, Senior Director, HBK Risk Advisory Services, with guest Joel Van Horn, CAP/CITP, CISA, Senior Manager, HBK Risk Advisory Services

    Watch On Demand.

    While the discussion relates to retirement plans, the information and tips apply broadly to industries and businesses.

    EBSA Guidance split into three forms:

    1. Tips for hiring a service provider

    2. Cybersecurity program best practices

    3. Online security tips

    Employee Retirement Income Security Act of 1974 (ERISA) sets the minimum standards for most voluntarily established benefit plans, like 401ks and 403bs. ERISA is split into four titles, including Title I: rules for reporting, disclosures, vesting, participation, and other regulations specific to retirement plans. It is administered by the U.S. Department of Labor (DOL), which is in charge of enforcing Title 1.

    The IRS is involved with ERISA, but if there is an issue that involves plan participants the DOL can step in.

    ERISA established fiduciary responsibilities and defines them.

    A fiduciary is a person or entity with discretionary authority to control and manage the operation and administration of a benefit plan covered by ERISA.

    Fiduciary responsibilities include:

  • Acting solely in the interests of plan participants and beneficiaries with the exclusive purpose of providing benefits
  • Carrying out their duties prudently
  • Following the plan’s overarching document guiding how the plan will be administered
  • Diversifying plan investments properly
  • Employee Benefits Security Administration (EBSA):

  • Balances proactive enforcement with compliance assistance
  • Is responsible for administering and enforcing provisions of ERISA: reporting and disclosure, fiduciary responsibilities and ultimately acting as a watchdog for the plans
  • EBSA issued cybersecurity guidance in 2021 to help safeguard retirement benefits and personal information:

  • Applies to plan sponsors, fiduciaries, record keepers and participants
  • Emphasizes the importance plan sponsors and fiduciaries must put on cybersecurity
  • Meant to complement existing EBSA regulations on electronic storage of records, and the electronic delivery of disclosures to plan participant and beneficiaries
  • Help defend against possible future claims brought under ERISA or data breach laws
  • EBSA Form 1: Tips for hiring a service provider

    Many functions of plans are outsourced to third-party service providers, who should have strong cybersecurity programs.

    Information security standards

  • Allow the organization to coordinate and enforce a security program and communicate that to third parties
  • Audit the results of the program – test the standards and ensure they are implemented
  • Compare your standards to industry standards for benefit plans
  • SOC 2 is a comprehensive report on third parties that lists procedures in place, tests the procedures, and lists any exception and how management will address them.

    Validation of practices

  • How are vendors validating their practices?
  • What levels of security standards have they met and implemented?
  • Are they using a third party to validate?
  • Track vendor’s record in their industry

  • Public information on security breaches
  • Other litigation
  • Legal proceedings related to vendor’s services
  • Ask about data breaches

  • SOC 2 report will have some information
  • What happened and how they responded
  • Insurance policies

  • Coverage for losses by cybersecurity and identify the breaches from internal as well as external threats
  • Service provider contracts

  • Require ongoing cybersecurity compliance
  • Beware of provisions that limit responsibility for breaches and amend those
  • Include terms for enhancing cybersecurity protection:
    • information security reporting
    • clear provisions related to use and sharing of information and confidentiality
    • notification of cybersecurity breaches
    • compliance with records retention and destruction, privacy and other information security laws
    • cybersecurity insurance policies in place
  • EBSA Form 2: best practices

    Have a formal, well-documented cybersecurity program:

  • Establish strong policies and guidelines: base on NIST or other cybersecurity framework
  • Conduct prudent annual risk assessments
  • Prioritize according to biggest risks
  • Keep current on where highest risks exist
  • Have a reliable, annual third-party audit of security controls.

    Clearly define and assign information security roles and responsibilities.

  • Must be taken seriously by top management for success
  • Have strong access control procedures.

  • Assign responsibilities on lease/privilege
  • Review system access at least quarterly
  • Name/user ID’s
  • Dual or multi-factor authentication
  • Ensure that any assets or data stored in a cloud or managed by a third part service provider are subject to appropriate security reviews and independent assessments.

    Conduct periodic cybersecurity awareness training.

    Implement a secure system development life cycle program.

    Have an effective business resiliency program addressing business continuity, disaster recovery, and incident response.

    Encrypt sensitive data, stores and in transit.

  • Starting with an inventory of what you have
  • Implement and update strong technical controls in accordance with best practices.

    Appropriately respond to any past cybersecurity incidents:

  • Fix the problems that caused the breach
  • EBSA Form 3: Online security tips

    Register, set up, and routinely monitor your online account.

    Use strong and unique passwords.

  • No dictionary words
  • Combination of numbers, letters, and special characters
  • Nothing in sequence
  • 14 or more characters
  • Passwords not written down
  • Consider a secure password manager
  • Don’t respond to email requests for account numbers or personal information
  • Use multi-factor authentication.

    Keep personal and contact information current.

    Close or delete unused accounts.

    Be wary of free wi-fi; don’t log into accounts from public wi-fi.

    Beware of phishing attacks: how most attacks originate.

    Use antivirus software and keep apps and software current.

    Know where and how to report identity theft and cybersecurity incidents, internally and externally.

    Following EBSA best practices will help you ensure the fiduciary responsibilities required by ERISA are met.

    Speak to one of our professionals about your organizational needs

    "*" indicates required fields

    hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.



    EBSA Security Guidance for Protecting Retirement Assets: An HBK Risk Advisory Services Webinar

    Date July 21, 2022

    Date: July 27, 2022

    Time: 10:00 – 11:00 am ET

    Host: William J. Heaven, CPA/CITP, CISA, CSCP, Senior Director and Joel Van Horn, CPA/CITP, CISA, Senior Manager

    On July 27, our webinar will feature a review of the Employee Benefits Security Administration’s (EBSA) Cybersecurity Guidelines. The U.S. Department of Labor released the guidance to protect the retirement benefits of America’s workers, who combined count more than $9.3 trillion in retirement assets. The guidance is directed at plan sponsors, plan fiduciaries, record keepers and plan participants.

    The EBSA cybersecurity guidance is provided in three forms: Tips for hiring a service provider, Cybersecurity best practices, and Online security tips.

    We will cover:

    • The cybersecurity guidance forms recommended by EBSA
    • EBSA estimates of covered plan participants and assets
    • How to identify service providers with stringent cybersecurity practices
    • Best practices designed to assist plan fiduciaries and record keepers with managing cybersecurity risk
    • Tips to help retirement participants and beneficiaries reduce the risk of online fraud

    Join us on July 27, 2022, for a discussion of how the suggested guidance can mitigate risk for the retirement industry and plan participants as well as improve your business’s cybersecurity posture.

    Register today!

    Speak to one of our professionals about your organizational needs

    "*" indicates required fields

    hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.



    Webinar: Business Intelligence Solutions: Using Data Analytics to Improve Operations

    Date July 20, 2022
    Authors
    Categories

    Highlights from the July 20, 2022, webinar hosted by Corey Shaner, HBK Director of Business Intelligence, and Amy Reynallt, MBA, Senior Manager, HBK Manufacturing Solutions.

    Business Intelligence is a new service offering at HBK designed to help businesses understand the value of leveraging data to drive decision-making and improve performance. Recognizing the value of connecting tables of data, businesses can create a dashboard using a tool called Power BI that allows business to spend time spotting and acting on trends in their businesses rather than analyzing data.

    “What gets measured gets managed.” – Peter Drucker

    As an organization matures, there is a need for more information, but it may not exist because it wasn’t measured. There is an opportunity to put in place a way to capture data points that will allow you to measure a process or person better.

    Our lives are becoming increasingly connected by the devices we use for work and leisure each day. If data can be harnessed and packaged appropriately, we can deliver the information we need to enhance the performance of our organization.

    By 2025 the world will create 181 zettabytes of data annually, so much data it would require seven Empire State buildings full of servers to capture it all.

    Business Intelligence helps organizations analyze historical and current data so they can quickly uncover insights for making strategic decisions. Business intelligence tools make that possible by processing large data sets across multiple sources and presenting the findings in visual formats easy to understand and share.

    Start the process of implementing business intelligence tools by understanding the wants and needs of key stakeholders in order to complete a Business Requirement Document as the roadmap for the project. The completed document will include identification of the software program needed to complete the process. Once the software vendors have amassed the data and granted access, the developers will create APIs that extract the client’s data from the vendor’s database, which can then be transformed if needed and loaded into a data warehouse where BI tools can be used to display the performance metrics. The warehouse can be hosted on a client-owned server or in a cloud-based environment, most commonly a SQL warehouse.

    In the warehouse we’ll see multiple tables of data. Each table has a primary key structure, which allow us to connect tables and pull previously unrelated information together. The discovered relationships should be documented in a catalog that acts as the playbook for developers and helps keep projects on track in case of employee turnover.

    The dashboard and reports provide real-time insights into the performance of the business, real-time analytics that highlight opportunities and potential problems as they occur so decision makers can make data-driven decisions faster, including creating predictive models that can be used for budgeting and forecasting.

    Two platforms for dashboards and reports are Power BI and Tableau. They allow the used to consume the information and make data-driven decisions in real time.

    Power BI: Power BI is the preferred application, for one, because it allows integration seamlessly with other Microsoft products. Features includes:

    • Power Apps for application development
    • Power Automate for process automation based on triggers
    • Power Virtual Agent: an AI-based tool that connects consumers with staff by recognizing keywords

    Power BI is extremely efficient in the way it stores and displays large amounts of data. Dashboards are completely customizable, including changing formats to accommodate whatever level you are targeting or benchmarking.

    The process produces reports that can be saved in a variety of ways, including producing an app, a preferred way to get information to the user. The reports could generate questions about employees or processes. Whatever the case is, there’s a way to measure it and eliminate future problems. Power BI can be used to measure any kind of information, financial or operational, for which data exists.

    Speak to one of our professionals about your organizational needs

    "*" indicates required fields

    hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.



    Watch: Finding Operational and Financial Growth Internally

    Date June 22, 2022

    Highlights from the June 22 HBK Risk Advisory Series webinar hosted by William J. Heaven, CPA/CITP, CISA, CSCP, Senior Director, HBK Risk Advisory, and featuring guest speaker Tyler M. Gargano, CFE, Director of Risk Compliance and Controls, HBK Risk Advisory Services

    Watch On Demand

    Operational and financial excellence is a perfect world: all operations running smoothly, without hiccups, from moving inventory to corporate strategy to payroll processing. Financial excellence is having a grasp on what is allowing for financial success and what is causing problems.

    All companies have issues in their operations and financials. What they must do well is collaborate. Most important is how the people work together to close operational gaps and understand what’s going on in operations and financials. The key aspect is having the right people in the right positions.

    Operational Excellence

    Defined: the philosophy that integrates problem solving and leadership to ensure continuous improvement. The goal is to be “clean and clear.” Have to have a clear understanding of what’s going on in terms of transactions and what that is going to look like in the next three to five years.

    Brickwork of foundational success:

  • Strategy: knowing your vision and goals: what you want to see
  • Organization/Structure: having the right people in the right jobs to get where you want to be
  • Processes and systems: having the right systems and understanding that the business, operations, and reporting are going to continuously change; ensuring you have the best strategies in place for IT
  • Products and services: understanding what your products and services are and how you provide them successfully
  • Enablers of operational and financial growth:

  • Performance management: can achieve much success through KPI management
  • Leadership, people and culture
  • Continuous Improvement: what you are doing to get better, to stay ahead, to work collaboratively
  • Risk and quality management
  • Financial Excellence

    Consider both mindsets, focus on internal goals, and tactical, the things you do

    Tactical items:

  • Financial reporting: should provide an understanding of what the company is doing
  • Financial modeling: how your business performs under specific scenarios, like a spike in inventory, or a decline in orders
  • Financial analysis: understanding your financial problems and solutions
  • Mindset items:

  • Financial Acumen: understand your numbers and what’s behind them, the true story of what is taking place in your company
  • Financial goals and objectives: aligning your goals with your objectives and having the company values speak to those goals; finances need to be in line with operations, and operations with goals and objectives
  • Financial planning – understand whether a process is doable, whether objectives can be achieved
  • Have to understand where you are today and where you want to be and how are we going to get there.

    Operational jealousy is real: what you are doing to be the best, understanding why you are making changes.

    Enhancing Internal methodology

    Three key questions related to methodology maintenance:

  • What is your process methodology?
  • How can methodology be updated? Starts with process flow charts: a visual representation of what the organization looks like. Points out what internal controls the company has or what they don’t have and where they need controls. Charts can show you where your controls take place, where you have gaps, and where you have alignment.
  • What is the benefit of updating internal methodology? Not only helps for an external audit, but keeps internal group procedures fresh. Can use an external source with expertise in specific areas to help you understand where the company is and what changes to make to achieve operational and financial excellence.
  • Risk assessment evaluation and creation

    There are many different risk assessment strategies, but four primary factors:

  • Materiality of amounts: how you are valuing large or high volume transactions: how much risk you are willing to take
  • Complexity of the process: areas in your process that are difficult
  • History of adjustments: errors or other issues with financial statements
  • Propensity to change: Are your business, financial, IT processes ready to change and what is the process to go through to make a change? What the change will look like is an extremely important conversation.
  • Rate the risks according to high, medium, or low.

    Risk assessments should be completed every year for every company.

    Takeaways

    How can I best communicate and implement strategies into my company’s best practices? Use strategies that work for you, which is different for each company. Understand how we benefit by identifying the strategies we employ in operational and financial management.

    Industry trends: Understand what’s going on in your industry from a financial and operational standpoint.

    Controls have changed significantly over the past years. Your business might have changed from what it was with you noticing it as you responded to your changing market.

    Company culture makes a vital contribution: being able to work collaboratively and have discussions around changes is key to successful change implementation of changes.

    Strategy Execution

    Key questions:

  • What training does the organization provide to managers and employees related to organizational changes, and how are they held accountable for completing the training?
  • How do you monitor, identify, and address employee change fatigue, and what preventive measures do you use?
  • How do you assess the potential impact of strategic change initiatives on your employee environment?
  • How do you assess your employee’s motivations and engagement levels, especially for employees responsible for managing risk or controls?
  • What role, if any, do employees play in change management and implementation?
  • How are operating model considerations factored into strategy formulation and execution?
  • What percentage of strategic projects are progressing according to plan, moving faster than planned, and moving slower than planned?
  • How do you determine if and when a change initiative should be terminated or adjusted?
  • How is staff working on digital initiatives trained on the risk implications of their projects?
  • Speak to one of our professionals about your organizational needs

    "*" indicates required fields

    hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.



    Webinar: Managing Cost Increases for Manufacturers

    Date June 15, 2022
    Authors
    Categories

    Highlights from the June 15 webinar hosted by Amy Reynallt, Senior Manager and Co-Director, HBK Manufacturing Solutions

    Manufacturer Challenges

    The surprise is not about the challenges themselves, including labor shortages, supply chain interruptions, and inflation, but how long they have persisted.

    Manufacturers are struggling to hire as well as maintain workers. We are seeing higher turnover numbers because of:

    • increases in compensation
    • workers seeking a different environment or looking for more flexible workplaces, which is hard to offer for many manufacturers, including those with continuous processes.

    Unemployment is low, at 3.6 percent at the end of May; anticipating unemployment will remain below 4 percent through 2024.

    Growing compensation: Wage growth is slowing, but manufacturers have seen compensation increase dramatically in the past year. It continues growing if at a slower pace.

    Supply chain disruption continues and the question now is how long into 2023 before we see some relief; the timeline is being extended. Imports are back up, but manufacturers using domestic suppliers still face significant challenges in terms of delays and cost increases.

    Current trends:

    • away from single source supply to having a second or third source to ensure availability
    • away from just-in-time to just-in-case inventory

    Costs and inflation:

    • Cost of freight and fuel increasing significantly, but also for raw materials and labor—costs across the board
    • Government will continue to make adjustments in an effort to address inflation, but increased interest rates will make borrowing more expensive.
    • Capital purchases remain strong, but increased interest rates may level or decrease capital purchases

    Increasing Prices

    Considerations include the cost of making products is increasing due to increases in costs of materials, competitors’ pricing, customers’ demands, customers’ alternatives, contractual obligations which prevent manufacturers from changing prices, and projected costs. We look at these issues even under normal circumstances, but more critically in the current environment.

    Customers expect price increases, so manufacturers shouldn’t have trouble passing along their increased costs. But it could be challenging with certain types of customers, such as larger customers.

    Ways to increase prices:

    • Some are using a surcharge as a way to pass along increased costs, such as a fuel surcharge; surcharges might be a quicker way to increase prices than raising product prices.
    • Some tie increases to an index, but have to be careful about the timing of the index release and its relevance to your operation.
    • Some are working escalator clauses into a contract for automatic price rises as certain costs increase.

    Be cautious about using volume-based pricing in light of labor or supply chain disruption which could leave you unable to fulfill the volume discount.

    Need to mitigate supply chain disruption:

    • Forecasting will help you look for the best way to keep costs as close to current as possible.
    • Quick pay discounts are a win-win option.
    • Blanket orders have been a popular way to plan future needs, but manufacturers need to ensure you can meet blanket orders before offering them.
    • Pressures on supply chains lead to questioning the value of lead-time penalties that could damage relationships with suppliers.

    Best practices include giving advance notice to customers on upcoming price increases. But have to consider how to adjust when the trend turns around to decreasing prices.

    Evaluating Performance

    Carefully monitor key indicators of performance, including:

    • Raw material costs as a percentage of sales
    • Raw material price various/usage variance compared to price increases, including considering alternative materials. Have to keep an eye on the impact of changes on your costs, including overhead costs.
    • Total compensation as a percentage of sales
    • Labor costs variance: what you were paying previously versus now, but also other pieces than just wages, like increased employee taxes and employee insurance costs
    • Freight costs vs. reimbursements: what you are being charged as well as what you are charging customers
    • Margins: to ensure profitability levels are what they need to be
    • Absorption vs. variable costing: a variable costs model as a management tool; determine contribution margin, then how fixed overhead and SGA costs impact that to determine operating income.

    Forward-thinking

    Use a continuous or rolling budget for a future focus:

    • Similar to looking at trailing 12 months, but looking forward, changing the budget month by month
    • Allows for continuously changing and updating for new circumstances.
    • More time-consuming than calendar-year budgets, but a mechanism to accommodate changes and ultimately plan for what’s ahead

    Keys Takeways:

    • Continue to communicate with customers and suppliers.
    • Actively manage your financial situation.
    • Look at how your costs are changing, the impact on your business, and how to increase customer prices as quickly and effectively as possible.

    Speak to one of our professionals about your organizational needs

    "*" indicates required fields

    hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.



    Using Internal Processes and Controls to Encourage Operational and Financial Growth: An HBK Risk Advisory Services Webinar

    Date June 13, 2022
    Authors Tyler Gargano

    Date: June 22, 2022

    Time: 10:00 – 11:00 am ET

    Host: William J. Heaven, CPA/CITP, CISA, CSCP, Senior Director, with guest Tyler Gargano, CFE, Director of HBK Risk, Compliance, and Controls

    Our June 22 webinar, “Using Internal Processes and Controls to Encourage Operational and Financial Growth,” will feature a discussion of how management can access internal functions to create efficiencies and strengthen internal processes and controls.

    We will cover:

    • Operational excellence
    • Internal controls/internal frameworks
    • Resource utilization
    • Industry trends
    • Reporting functions
    • Company culture

    HBK Risk, Compliance, and Controls offers solutions ranging from operational guidance to full audit procedures. We work to solve the question of “what keeps you up at night?” In our June 22 webinar, we will discuss process and control issues companies of all sizes face and how to mitigate the related risks through internal tailored solutions.

    Register today!

    Speak to one of our professionals about your organizational needs

    "*" indicates required fields

    hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.



    Watch: What the 2022 Verizon Data Breach Investigations Report Means for Your Business

    Date May 25, 2022

    Highlights from the May 25 HBK Risk Advisory Services webinar featuring William J. Heaven, CPA/CITP, CISA, CSCP; Senior Director, IT.

    This year is 15th consecutive year Verizon has released the DBIR. The 2022 report was released May 24, 2022.

  • Expanded in 2021 to cover 20 industries.
  • Includes 87 contributing organizations wither impacted by breach or had clients impacted by the breach.
  • 2022 report examines 23,896 incidents and 5,212 confirmed data breaches.
  • Types of breaches include:

  • Denial of service: hackers sending large amounts of data to compromise the availability of your networks and systems
  • Lost and stolen assets: information missing through misplacement or malice
  • Miscellaneous events: unintentional actions that compromise a security attribute of an information asset
  • Privilege misuse: unapproved or malicious use of legitimate privileges
  • Social engineering: altering a person’s behavior into taking action of breaching confidentiality; a major issue
  • System intrusion: complex attacks that leverage malware or hacking to achieve objectives including deploying ransomware
  • Web applications: gaining access, stealing data, and moving one
  • Everything else: a catch-all category for incidents that don’t fit in the other categories
  • Terminology:

  • Incident: a security event that compromises, the integrity, confidentiality, or availability of an information asset; not a breach until they take possession of the data
  • Breach: confirmed disclosure of data by an unauthorized party
  • Most common types of breaches by industry sector

  • Financial and insurance: miscellaneous errors, system intrusion and web applications
  • Healthcare: miscellaneous errors, system intrusion and web applications
  • Manufacturing: social engineering, system intrusion and web applications
  • Retail: social engineering, system intrusion and web applications
  • Most common incidents by industry sector:

  • Financial and insurance: miscellaneous errors, system intrusion and web applications
  • Healthcare: miscellaneous errors, social engineering, system intrusion and web applications
  • Manufacturing: social engineering, system intrusion and web applications
  • Retail: social engineering, system intrusion and web applications
  • The DBIR is important because the more you know about the cyber threats you face, the better your chances of keeping your data secure. Whether an organization will be attacked is unpredictable. You also have a common language and helps you to report consistently. Also provides links to other useful databases.

    You can get the Verizon DBIR through Verson.com/dbir: the full report, which is 108 pages, or an executive summary, which is 20 pages. You can view the report online or download it. The executive summary provides a great deal of information, and you can go to the full report to look deeper into something specific.

    Key paths to your data. Need to address all of these:

  • Credential theft: about 50 percent of total attacks
  • Phishing: 18 percent, but often steal credentials by phishing
  • Exploiting vulnerability: 10 percent
  • Botnets: small portion of hacks
  • Major takeaway from DBIR: ransomware continued its upward trend, currently 25 percent of all breaches, a 13 percent increase over 2021, and as many as the previous five years combined.

    Supply chain breaches can be a force multiplier, and were 61 percent of this year’s report incidents. Try to vet third party vendors to ensure they are as secure as possible.

    Errors accounted for 14 percent of all breaches. They are starting to level out. But humans remain weakest link in protection chain. Human element is responsible for 82 percent of breaches.

    The gap between large and small companies is closing. Payoffs are not as great from small companies but easier for hackers. Ransomware and phishing are having the biggest impact on small businesses.

    Attack pattern summary for selected industries:

  • Financial and insurance: miscellaneous errors, social engineering, and web applications
  • Healthcare: miscellaneous errors, system intrusion, and web applications
  • Retail: social engineering, system intrusion, and web applications
  • Financial gain is the main actor motivation. Threats are coming more from external actors than internal, though internal threats are more prominent in healthcare and financial services than other industries due to curiosity about certain individuals who are patients or clients.

    Every business should do a risk assessment at least annually. The DBIR will help you identify and analyze your risks.

    The top 18 CIS controls are available free for risk mitigation. The DBIR provides a priority list of controls by industry. Security awareness training is one of the easiest ways to prevent system breaches to help create an environment of skepticism. Make sure you create user awareness, have data backed up, and patch your vulnerabilities.

    The most interesting aspects of the 2022 DBIR are the details on ransomware and the fact that with migration to the cloud you have to keep an eye on what’s going on there.

    Speak to one of our professionals about your organizational needs

    "*" indicates required fields

    hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.



    Webinar: Tax Saving Strategies for Manufacturers

    Date May 18, 2022
    Authors
    Categories

    Highlights from the May 18 webinar hosted by Amy Reynallt, Senior Manager and Co-Director of HBK Manufacturing Solutions; and featuring Source Advisors executives Al Schmitt, Director for the Midwest, Great Lakes Region; Brian Coddington, Director, Tax Accounting Methods & Credits; and Jordan Fazio, Director, R&D Tax Credit Consulting. Source Advisors is an HBK partner and specializes in tax credits and strategies to reduce tax liabilities, including LIFO inventory valuation and R&D credits.

    R&D Tax Credit

    Enacted in 1981 to encourage American investment in innovation, to keep manufacturing in the U.S. as opposed to going offshore. Has evolved over time to become more applicable and beneficial to many more companies. Was renewed year to year, but is now permanent. The TCJA helped increase the net credit amount from 5 to 6.5 percent to 10 percent of qualified research expenses and had a positive impact on use of the credits by both C-corps and pass-throughs. Permitted Purpose: making a new product or process, or improving a product or process

  • Technological in nature: applying hard sciences
  • Elimination of uncertainty: figuring determining how to eliminate technical uncertainty in developing or improving a product or process
  • Process of experimentation: activities involved in ensuring a new product and process will work, such as testing and prototyping
  • Qualifying research expenditures include salaries and wages, which are typically the largest cost, but also supplies, contractor/outsourced assistance, and computer rental and cloud costs.

    Credits can be carried back one year and forward up to two years. Can amend back three years.

    R&D lifecycle often starts in sales and marketing, then goes to research and design, testing and prototyping, and can extend to production. Production doesn’t typically qualify, but some things done in production and manufacturing can qualify as process improvements.

    Understanding how to feather out and incorporate all individuals touching R&D tends to lead to a better and more accurate tax credit.

    Two main qualifying industry buckets: manufacturing—making something work faster, better, safer, cheaper, more reliably—and software development

    There is no correlation to revenue or sales but is about the people doing the work and the type of work being done.

    There are also state credits available, though not in all states. Generally, just for the technical people working in that particular state.

    Qualifying manufacturing activities include but are not limited to:

  • product development using computer-aided design
  • development of second-generation or improved products
  • tooling and equipment fixture design and development
  • designing innovative manufacturing equipment
  • creating alternative materials
  • streamlining manufacturing processes through automation
  • The general rule of thumb for qualifying software is that it will need to be the development of proprietary software, not implementing software generated by a third party. Have to own the rights to the software; must carry the financial risk and rights.

    Potential challenges

  • For federal credits, you need to be paying federal income taxes.
  • To qualify, you need to have more than 50 percent control or ownership of the product or process.
  • Have to consider whether passive shareholders will be negatively impacted by taking the credit.
  • Documentation is key to substantiating or justifying claims, if needed.
  • LIFO

    An accounting methodology that allows companies to reduce taxable income by the inflation cost in ending-year inventory, removing the negative effect of inflation on inventory costs. It assumes older, less expensive inventory remains on hand for the calculation of taxable income. It is an annual adjustment that does not affect daily operations. It involves comparing costs of inventory at a certain point with costs for prior years to calculate an inflation index.

    There have been discussions over the past 20 years of getting rid of LIFO, but tax reform rendered the threat to LIFO no longer present.

    Any company not on LIFO but with considerable inventory should consider it.

    Misconceptions about using LIFO include:

  • inventory turning too often
  • bankers not understanding the method
  • what would happen if inflation ceases
  • the effect of falling inventory levels
  • permanence of using LIFO once you start.
  • None of these are generally relevant.

    Can elect to be on LIFO for tax and book purposes. IRS allows you to get off LIFO after five years, so we look at LIFO as a five-year commitment. But the IRS does allow the taxpayer to submit a manual accounting method change and pay a user fee, and they’ll review the facts to determine if they can go off LIFO before five years. But those requests don’t often occur, because LIFO tends to be beneficial.

    Companies on LIFO should look at the IPIC (Inventory Price Index Computation) method. Sometimes referred to as external vs. the traditional LIFO internal index method. Analyze internal vs. IPIC methods to maximize the tax benefit.

    Often IPIC reveals more inflation than people are typically seeing. Most years companies should consider both methods, but IPIC has been better from a tax perspective in recent years.

    Internal method measures year-ending actual cost as an inflation factor. With IPIC there are sub-methodologies that can provide benefits and options to maximize the tax benefit over and above the traditional method.

    Traditional LIFO method:

  • Most companies that have adopted LIFO are using the traditional method.
  • Measures inflation based on changes in internal costs.
  • Has many different variations.
  • Weaknesses include lack of documentation from previous years’ calculations.
  • Can be more complicated and invite more controversy with the IRS.
  • Possibly provides a better tax benefit vs. IPIC method.
  • Can automatically switch from internal to IPI if IPIC becomes better.
  • Must compare identical items or be able to argue a reconstruction method properly reflects income.
  • The lower your inventory the higher inflation has to be to maximize the LIFO tax benefit.

    LIFO can produce significant tax benefits at times of high inflation.

    Adoption and ongoing calculation of LIFO requires minimal investment in time.

    Speak to one of our professionals about your organizational needs

    "*" indicates required fields

    hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.