Tax Intelligence – State Targeted Hiring Tax Credits

state targeted hiring programs

Situation State targeted hiring programs provide tax credits for businesses who hire individuals falling into various categories such as disabled, unemployed, economically disadvantaged, and veterans.  Most states allow any business, regardless of industry, to take advantage of these programs.  Accessing and qualifying for these programs can vary from state to state. Solution To benefit from [Read More...]

California EZ – Third Party Vouchering

California EZ

Some good news in the “wind-down” of the California Enterprise Zone Program! The California HCD has assigned third-party agents to continue vouchering for all Los Angeles zones as of September 1, 2014 through the end of 2014. Previously, Los Angeles announced that they would no longer accept voucher applications after August 31, 2014. Even though [Read More...]

HSPD-12 – Ten Years On

white-house

Homeland Security Presidential Directive 12 (HSPD-12), signed by President Bush on August 27, 2004, was originally enacted to address the wide variety and differing security levels of identification credentials used to access secure facilities. The directive established standards for verifying an individual’s identity and issuing a tamper-proof credential that could be rapidly authenticated electronically. The [Read More...]

Identity Proofing Essentials for Effective Government Operations

socialServices_940x255

Who are you and how can you prove it? Seems like an easy question, yet in the digital environments where we work and live, this is no longer such a straightforward matter. Each individual is identified not only by a name, authoritative source (such as a Social Security Number, Passport, or Driver’s License), address, phone number, [Read More...]

Remote Access — Do You Know Who Is In Your Data?

remote user

Just over 80 percent of HR managers in a recent survey gave their agencies a grade of B or C for progress in meeting the Telework Enhancement Act’s goals of using telework to achieve greater flexibility in workforce management Letting workers access sensitive systems and data from off-site locations and, potentially, using uncontrolled devices raises a [Read More...]

Tax Intelligence – Maximizing WOTC ROI

August Tax Intelligence Bulletin

As the Work Opportunity Tax Credit (WOTC) is currently in hiatus status, it is more important than ever for companies that hire to ensure that their WOTC capture program is as effective as it can be to ensure maximum credit value generation once the program is renewed.  Recall that even when WOTC is in hiatus, [Read More...]

Protecting Against Willful Compromise

shutterstock_5675935

A lock is easily opened when the owner gives the key to somebody else. This is true for gaining access to online accounts with passwords as well as second factor authentication tokens and smart cards. A person can willfully share their credentials for a number of reasons. A husband may share password and token with [Read More...]

Authentication and Encryption Working Together

shutterstock_127894739

As online traffic increases, organizations are making decisions about appropriate levels of authentication for their consumer-facing portals. These organizations are determining how authentication “speed bumps” in front of consumers affect adoption and use because they want to make it easy for a consumer to get to his data. The problem, of course, is that making it easy [Read More...]

The Most Important Countdown to an Employer’s Bottom Line: Are you prepared for ACA?

ACA Compliance

The  clock is ticking on the amount of time employers have to figure out their ACA game plan. Many employers gave a sigh of relief as they thought the pressure to deal with the complicated regulations surrounding their workforce strategy was lifted from their shoulders when the Employer Mandate was delayed by one year, now [Read More...]

Authentication and “Defense-in-Depth”

Electronic Signature Security

In all successful data security systems, the goal of the organization should be to combine multiple authentication strategies with the right combination of enterprise security solutions to better assure the organization that the user on the opposite end of the online transaction is the person the company expects to be executing that specific transaction. Authentication [Read More...]