Government Insights

Hackers Leave Customers Everywhere At Risk

shutterstock_77899243

Before most systems are hacked, a personal or corporate identity is compromised – online or offline. An initial compromise may be a very sophisticated, software-driven breach of a website’s infrastructure; such as the recent data breach reported last month at JP Morgan, where it’s reported that Russian-based hackers took advantage of a technical flaw in [Read More...]

Charge Auditing: Prevent Improper UC Benefits Payments

charge auditing

While the prevention of improper unemployment benefits via compliant claims response remains the primary focus of UI integrity legislation, the rapid identification of these charges (after they begin) can also go a long way toward reducing the $5 billion in overpayments. Improper charges can have a direct effect on your company’s unemployment experience, potentially causing [Read More...]

ACA and IRS Reporting Demystified

Think you still have plenty of time to prepare for the ACA? 

Think again.

Webinar:  Tuesday | September 30 | 2:30 PM EDT Many employers believe they do not have to worry about ACA and IRS reporting until 2016, but the reality is that they must begin preparing in 2015 to file in 2016. And because the fines you (and your employees) may face in 2016 will be determined [Read More...]

WOTC Update: Aaron Schock Pushes WOTC extension; IRS Urges Extension of WOTC Extender Bill

WOTC extension

In August, Rep Aaron Schock of Illinois introduced H.R. 5264 “To amend the Internal Revenue Code of 1986 to make the work opportunity credit permanent.”  The bill would extend WOTC one year retroactive to cover the current hiatus and would also make WOTC permanent.  Mr. Schock and his Co-sponsor Charles Rangel of NY have published [Read More...]

Tax Intelligence – State Targeted Hiring Tax Credits

state targeted hiring programs

Situation State targeted hiring programs provide tax credits for businesses who hire individuals falling into various categories such as disabled, unemployed, economically disadvantaged, and veterans.  Most states allow any business, regardless of industry, to take advantage of these programs.  Accessing and qualifying for these programs can vary from state to state. Solution To benefit from [Read More...]

Combating Transaction Fraud

prevent fraud

We have all heard the news that data breaches and the subsequent identity theft of all types is the fastest growing crime in the US today. More people and businesses are being impacted for larger dollar amounts − witness the impact of the Target and Home Depot breaches. Unfortunately, there is no such thing as [Read More...]

California EZ – Third Party Vouchering

California EZ

Some good news in the “wind-down” of the California Enterprise Zone Program! The California HCD has assigned third-party agents to continue vouchering for all Los Angeles zones as of September 1, 2014 through the end of 2014. Previously, Los Angeles announced that they would no longer accept voucher applications after August 31, 2014. Even though [Read More...]

We’re the government. Trust us.

government_slide

Posted with premission from FCW. By Troy K. Schneider Aug 13, 2014 The Federal Housing Administration works with lenders to insure more than $1 trillion in mortgage loans. The Department of Homeland Security shares vital information with thousands of partners at the international, federal, state, local, territorial and tribal levels, as well as in the [Read More...]

Protecting Data Privacy

marketing efficiency

Theft of consumer financial and identity information is rising, and the subsequent use of those stolen identities to attempt breaches of other sites compounds the problem. So far this year there have been more than 100 data breaches caused by hacking or similar reasons according to the Privacy Rights Clearinghouse, with more than 200 breaches from all reasons. [Read More...]

HSPD-12 – Ten Years On

white-house

Homeland Security Presidential Directive 12 (HSPD-12), signed by President Bush on August 27, 2004, was originally enacted to address the wide variety and differing security levels of identification credentials used to access secure facilities. The directive established standards for verifying an individual’s identity and issuing a tamper-proof credential that could be rapidly authenticated electronically. The [Read More...]