How to Increase After-Tax Returns on Investments

Financial Accounting Overview

Statement of Cash Flow

Per the SEC, a statement of cash flow features three sections that detail sources and utilization of the business’ operating, financing and investing cash flows. It paints a picture of inflows and outflows of the business’s cash levels. At the end of the day, it helps anyone interested in the company’s financials, especially potential and current investors, see the latest status and trends of cash flow.

One way to calculate cash flow, according to the SEC, is to look at a company’s free cash flow (FCF). This is calculated as follows:

Free Cash Flow = Operating Cash Flow – Capital Expenditures

Free Cash Flow = $50 million – $20 million = $30 million

This information is helpful because free cash flow can help determine a company’s financial health, how well (or not) the business model is performing, and its overall likelihood of success moving forward. Additionally, understanding the difference in accounting methods is another helpful piece of financial accounting analysis.

Accrual Method vs. Cash Method

Accrual Method

When it comes to the accrual method, according to the Congressional Research Service, when a business is paid for services or products to be rendered in the future, the payment is permitted to be recognized as revenue only when the product or service has been rendered. When it comes to accounting for expenses that are presumably deductible, under the accrual method, the expense can be recorded when it’s experienced by the business, not when payment has been made to the utility, raw material supplier, etc.

Cash Method

If a consultant gets payment immediately but isn’t expected to do said job until the following month, this approach requires revenue to be recognized when the cash has been received. Similarly, when expenses are paid is when expenses are recorded.

Considerations

For any businesses that handles inventory or sells to customers on credit, accrual accounting is required by the Internal Revenue Service. Similarly, for companies with average gross receipt of revenues greater than $25 million for the past 36 months, the IRS mandates accrual accounting. For companies with average gross receipt of revenues of less than $25 million, depending on the exact circumstances of the company’s business nature, cash or accrual may be used.

Financial accounting provides investors, business owners and those providing businesses with legal and accountability a way to monitor performance and compliance.

Sources

https://www.irs.gov/publications/p538#en_US_202112_publink1000270704

https://www.irs.gov/pub/irs-drop/rp-22-09.pdf

https://www.irs.gov/pub/irs-pdf/p538.pdf

https://sgp.fas.org/crs/misc/R43811.pdf

https://www.sec.gov/oiea/reports-and-publications/investor-publications/beginners-guide-financial-statements

https://www.sec.gov/Archives/edgar/data/104169/000119312508177102/dex992.htm

Recent Trends in Long Term Care Insurance

How to Host Awesome Holiday Office Parties

Increase In Deepfake Attacks and How Enterprises Can Prepare

fraudsters used AI to mimic a CEO’s voice. This incident happened in March 2019, when criminals impersonated a chief executive’s voice to direct a payment of $243,000.

Cybercriminals are able to execute social engineering attacks by accessing readily available information online. They can research a business, employees and executives. The criminal will even use an actual event picked from social media – for instance, a financial director who is just returned to work from a holiday – to sound more legitimate.

This emerging security threat is also made possible by the development of video editing software that can swap faces and alter facial expressions. Such developments have enabled deepfakes to fool biometric checks (like facial recognition) to verify user identities.

The deepfake cybersecurity threat has become such a concern that the Federal Bureau of Investigation (FBI) has issued a Private Industry Notification (PIN) cautioning companies of the possible use of fake content in a newly defined cyberattack vector referred to as Business Identity Compromise (BIC).

How to be Prepared and Protect Against Deepfakes

Deepfake videos and images can be recognized by checking for unnatural body shape, lack of blinking in videos, unnatural facial expressions, abnormal skin color, bad lip-syncing, odd lighting, awkward head and body positioning, etc. However, cybercriminals keep evolving and creating more convincing deepfakes.

Other measures introduced to combat deepfakes include creating solutions that detect deepfakes. There also was an introduction of deepfake legislation in the National Defense Authorization Act (NDAA) in December 2019.

Unfortunately, this has not been enough, and enterprises have the task of helping reduce the impact of these attacks. The following measures can help:

  1. Use anti-fake technologies
    Businesses should explore automated technologies that help identify deepfake attacks. They should also consider watermarking images and videos.
  2. Enforce robust security protocols
    Implement security protocols to help avoid deepfakes, such as automatic checks for any procedure involving payments. For instance, putting systems that allow verification through other mediums.
  3. Develop new security standards
    As security threats keep evolving, so should security standards within a company. For instance, introduce new security standards involving phone and video calls.
  4. Training and awareness
    Enterprises should enforce regular training and raise awareness among employees, management, and shareholders on the dangers of deepfakes to businesses. When all involved parties are trained to identify deepfake social engineering efforts, this will help reduce the chances of falling victim.
  5. Keep user data private
    Deepfake attackers use the information found in public domains such as social media. Although not a failsafe procedure, company profiles can be made private. Users also should avoid adding or connecting with strangers they don’t know and posting too much personal information online.
  6. Disinformation response policy
    Some deepfake incidents are out of control for an enterprise, such as fake videos purporting to be from top management. However, establishing a disinformation response plan will help in cases of a reputation crisis. This should include monitoring and curating all multimedia output – which will help present original content to the public as authentic content.

Conclusion

Deepfake is an emerging cybersecurity concern that requires enterprises to be aware of its potential threats and stay prepared. Although it might be possible to identify a poorly generated deepfake with the naked eye, the technology continues to advance. In response, countermeasures must keep pace.

Shoring up Protections for Sexually Abused Children, the Mentally Ill in Crises, and a Benefit Increase for Disabled Veterans