Quantum Computing Uses That Solve Business Problems

Quantum Computing for businessEarly technology adopters are more likely to gain better business results, including higher revenue growth and market position. With businesses facing complex problems every day, it is no doubt that they are always watching out for the next big tech that offers a better solution.

Although still in its infancy stages, quantum computing is a technology whose commercial use will disrupt the business environment.

What is Quantum Computing?

Quantum computing is a technology that focuses on manipulating and controlling different laws of physics. This non-classical technology uses quantum mechanical concepts like superposition and quantum entanglement.

The idea of quantum computing is not new and has come a long way. The first algorithm of large integer factorization for quantum computing was introduced in 1994. This algorithm intended to reduce the time it would take classical computers to find the prime factors of large numbers. It’s worth noting that the majority of the current infrastructure for encryption and information security is built on prime factorization.

Since the first algorithm was developed, more technological advances have been reported, and the field is continuously receiving funding. According to the McKinsey & Company Quantum Technology Monitor, funding from private and public sectors for this new technology is skyrocketing worldwide.

How it Works

Unlike classical computing, whose information is encoded by bits, in quantum computing a qubit is the basic unit of quantum information. Qubit allows all combinations of information to exist simultaneously so that quantum computers can solve problems exponentially faster and with less energy consumption than classical computers.

In 2019, Google, in partnership with NASA, achieved quantum supremacy by demonstrating that quantum computers can compute in seconds what would take advanced supercomputers thousands of years.

Advanced development in this technology has also seen the introduction of quantum-computing cloud infrastructure through Quantum as a Service (QaaS). QaaS provides access to quantum computing platforms over the internet to customers. Major technology companies, such as Amazon, Alibaba, IBM, Google, and Microsoft, have already launched commercial cloud services for quantum computing.

With the continued increase in the quantum computing ecosystem and emerging business use cases, business leaders must stay aware and prepare to adopt the new technology.

Business Use Cases for Quantum Computing

1. Quick Data Analytics

Today more than ever, businesses are faced with big data and a large quantity of information requiring analysis and storage. Since classical computers are built to solve one task at a time, it takes longer to solve these complex problems.

However, quantum technology has the potential to turn complex computations into simple calculations that are solved in less time.

2. Optimize Investment Strategies

Optimization is all about finding the most ideal solution in a situation. When many options are available, it takes a classical computer a long time to find a solution. Therefore, classical computers use shortcuts, and the final solution is partly optimal. But, with quantum computing, there will be better optimization.

3. Better Forecast and Prediction

Businesses rely on forecasts and predictions generated after analyzing complex and large data sets. Quantum computing is built to process huge amounts of data quickly and more accurately. As a result, better forecasts and predictions will enable better decision-making.

4. Solve Problems With Financial Services

There are various computationally intensive jobs in finance that could be facilitated by quantum computing, such as credit-risk management, financial crime reduction, and trading strategy optimization. These tasks will greatly benefit from quantum algorithms that increase the speed of financial calculations.

5. Improve Data Security

Quantum computers are built to break encryptions that ordinary computers cannot. This might become a problem if hackers were to acquire encrypted data and store it until large-scale quantum computers are operational. To handle this problem, postquantum cryptography, a type of cyber security that can be used by conventional computers, is currently being developed. Therefore, a switch to quantum-resistant cryptography will prevent the possibility of data being exposed. At the same time, it will ensure better protection of digital assets.

Final Thoughts

Quantum computers will not replace classical computers; however, the two will form a hybrid solution whereby each task will be assigned to the most suitable machine – either quantum or classical.

Achieving the aforementioned benefits will require businesses to have teams of experts who are knowledgeable about the implications of quantum computing and who can recognize the company’s potential future needs, opportunities, and vulnerabilities.

With signs of commercial quantum computing becoming a reality, it’s not too early for business leaders to consider how it will encourage digital investment, reshape industries and ignite innovation. Therefore, having a thorough understanding of quantum applications is essential for positioning a business to gain a competitive edge.

Auditing: What it is & Why It’s Done

What is AuditingThe Importance of Auditing

Auditing typically refers to an objective review of a company’s financial statements, which consists of the cash flow statement, the income statement and the balance sheet. It analyzes the level of accuracy that the business has characterized its financial records. The process looks at how a business documents investing, financing and operating ventures.

Depending on the type of audit and what it aims to accomplish, it can be conducted by internal employees or independent, third-party examiners like a Certified Public Accountant (CPA) firm or a government agency such as the Internal Revenue Service. When it comes to the United States, the Generally Accepted Accounting Principles (GAAP) is what auditors look to when analyzing financial statement preparation. External audits are guided by the American Institute of Certified Public Accountants’ (AICPA) Auditing Standards Board (ASB). The AICPA requires that the generally accepted auditing standards (GAAS) are followed by external auditors to ensure proper protocol is followed.

When it comes to regulations, the Sarbanes-Oxley Act of 2002 requires publicly traded companies to have their internal controls’ impacts reviewed. It also states that companies that do not implement and enforce their internal controls may be subject to criminal charges.

Defining Internal Controls

These can be thought of as how businesses can manage operations by regulating permissions, documentation, congruency, protection/safety and partitioning of responsibilities for business processes. These are broken into preventative and detective activities.

Sometimes referred to as protective activities, responsibilities are compartmentalized and distributed among different individuals to dissuade mistakes or deceit from occurring.

It also integrates highly detailed written procedures and validation procedures for further cautionary measures. It’s meant to verify that no sole person is able to approve, document or be responsible for monetary transactions and final products. Permitting invoices and validation of expenses are examples of internal controls. Only permitting appropriate access to the fewest employees necessary and the fewest required business equipment is one way to implement this type of internal control.

Detective Controls Defined

These are redundant systems that are put in place to intercept issues that might have fallen through the initial round of quality control measures. Looking to reconciliation procedures, which matches data in question against known accurate data sets, it’s used to fix discrepancies.

Internal Audits

This type of audit is usually conducted by the business’ employees, primarily performed as a way to evaluate internal operations and internal controls. It looks to identify any deficiencies or weaknesses in the business’ operations, often occurring before an external auditor reviews its financial statements. It’s also meant to review and identify any legal or regulatory compliance issues.

External Audits

This type of audit occurs when an independent auditor, such as a third-party CPA firm, assesses a business’ internal controls and financial statements. It is performed to provide an objective opinion that an audit conducted by the business itself cannot. With a “clean opinion” or “unqualified opinion” provided by the independent auditor, businesses can provide those looking at financial statements confidence that such financial statements are reliable. It enables the outside entity to focus on the financials, the business’ internal controls, etc. by providing a conflict-of-interest-free perspective.

Government Audits

This type of audit is done to ensure that businesses have accurately reported their taxable income to respective government agencies. This can include federal agencies such as the Internal Revenue Service (IRS) and Canada Revenue Agency (CRA), which are the U.S. and Canada’s respective tax collection agencies.

When an IRS audit has concluded its review, there may be a few different preliminary results and resulting paths. The tax return may see no modification. There may be a modification the taxpayer agrees to, which could result in additional money being owed. The third result occurs when the filer doesn’t agree with the change, and it is worked out through an appeal process.

Whether it’s an investor for a publicly traded company or a business looking for creditors for help with money, materials, etc., having audited financial statements provides confidence that they’ll see a return on their investment or a high likelihood of their debts being satisfied in the future.

Sources

https://www.congress.gov/bill/107th-congress/house-bill/3763

 

 

Increase In Deepfake Attacks and How Enterprises Can Prepare

Deepfake AttacksDeepfake technology utilizes machine learning and artificial intelligence (AI) to manipulate or create synthetic audio, video and images that appear authentic. Deepfakes are commonly featured in entertainment and politics to spread false information and propaganda. For instance, deepfake has been used to show a celebrity or leader saying something that they didn’t, and this creates fake news.

Unfortunately, in deepfakes, cybercriminals have found a new tool for cyberattacks. Cybercriminals are now using deepfakes to pose a variety of enterprise risks.

How Cybercriminals Are Using Deepfakes

Deepfake technology is now used to create scams, hoaxes and false claims that undermine and destabilize organizations. For instance, a manipulated video might show a senior executive associated with fake news, such as admitting to a financial crime or spreading misinformation about a company’s products. Such corporate sabotage costs a lot of time and money to disprove and can impact a business’s reputation.

Another way businesses can be negatively impacted is through social engineering attacks such as phishing, which relies on impersonation to compromise an email. Similarly, social engineering using deepfakes can feature voice or video impersonations. A good example of such an impersonation was reported in The Wall Street Journal, in which fraudsters used AI to mimic a CEO’s voice. This incident happened in March 2019, when criminals impersonated a chief executive’s voice to direct a payment of $243,000.

Cybercriminals are able to execute social engineering attacks by accessing readily available information online. They can research a business, employees and executives. The criminal will even use an actual event picked from social media – for instance, a financial director who is just returned to work from a holiday – to sound more legitimate.

This emerging security threat is also made possible by the development of video editing software that can swap faces and alter facial expressions. Such developments have enabled deepfakes to fool biometric checks (like facial recognition) to verify user identities.

The deepfake cybersecurity threat has become such a concern that the Federal Bureau of Investigation (FBI) has issued a Private Industry Notification (PIN) cautioning companies of the possible use of fake content in a newly defined cyberattack vector referred to as Business Identity Compromise (BIC).

How to be Prepared and Protect Against Deepfakes

Deepfake videos and images can be recognized by checking for unnatural body shape, lack of blinking in videos, unnatural facial expressions, abnormal skin color, bad lip-syncing, odd lighting, awkward head and body positioning, etc. However, cybercriminals keep evolving and creating more convincing deepfakes.

Other measures introduced to combat deepfakes include creating solutions that detect deepfakes. There also was an introduction of deepfake legislation in the National Defense Authorization Act (NDAA) in December 2019.

Unfortunately, this has not been enough, and enterprises have the task of helping reduce the impact of these attacks. The following measures can help:

  1. Use anti-fake technologies
    Businesses should explore automated technologies that help identify deepfake attacks. They should also consider watermarking images and videos.
  2. Enforce robust security protocols
    Implement security protocols to help avoid deepfakes, such as automatic checks for any procedure involving payments. For instance, putting systems that allow verification through other mediums.
  3. Develop new security standards
    As security threats keep evolving, so should security standards within a company. For instance, introduce new security standards involving phone and video calls.
  4. Training and awareness
    Enterprises should enforce regular training and raise awareness among employees, management, and shareholders on the dangers of deepfakes to businesses. When all involved parties are trained to identify deepfake social engineering efforts, this will help reduce the chances of falling victim.
  5. Keep user data private
    Deepfake attackers use the information found in public domains such as social media. Although not a failsafe procedure, company profiles can be made private. Users also should avoid adding or connecting with strangers they don’t know and posting too much personal information online.
  6. Disinformation response policy
    Some deepfake incidents are out of control for an enterprise, such as fake videos purporting to be from top management. However, establishing a disinformation response plan will help in cases of a reputation crisis. This should include monitoring and curating all multimedia output – which will help present original content to the public as authentic content.

Conclusion

Deepfake is an emerging cybersecurity concern that requires enterprises to be aware of its potential threats and stay prepared. Although it might be possible to identify a poorly generated deepfake with the naked eye, the technology continues to advance. In response, countermeasures must keep pace.

Shoring up Protections for Sexually Abused Children, the Mentally Ill in Crises, and a Benefit Increase for Disabled Veterans

Shoring up Protections for Sexually Abused Children, the Mentally Ill in Crises, and a Benefit Increase for Disabled VeteransEliminating Limits to Justice for Child Sex Abuse Victims Act of 2022 (S 3103) – Introduced by Sen. Richard Durbin (D-IL) on Oct. 28, 2021, this Act eliminates the statute of limitations for civil lawsuits by anyone who, as a minor, was a victim of human trafficking or a federal sex crime. The bill passed in the Senate on March 2, in the House on Sept. 13, and was signed into law on Sept. 16 by President Biden.

Law Enforcement De-Escalation Training Act of 2022 (S 4003) – This bill would authorize training for de-escalation and alternatives to the use of force when law enforcement officers are called to a scene involving mental and behavioral health and suicidal crises. The Act was introduced by Sen. John Cornyn (R-TX) on April 5. It passed in the Senate on Aug. 1 and is currently under consideration in the House.

National Aviation Preparedness Plan Act of 2022 (HR 884) – This legislation directs the Department of Transportation (DOT), in consultation with the aviation industry and labor stakeholders such as air carriers, to develop a national aviation preparedness plan for future outbreaks of communicable diseases. The plan must include provisions for frontline, at-risk workers to be equipped with the appropriate personal protective equipment (PPE) to reduce exposure and spread of the disease. The bill was introduced by Rep. Rick Larson (D-WA) on Feb. 5, 2021. It was passed in the House on Sept.14and has moved to the Senate.

Veterans’ Compensation Cost-of-Living Adjustment Act of 2022 (HR 7846) – This legislation was introduced by Rep. Elaine Luria (D-VA) on May 19. It proposes a cost-of-living increase beginning Dec. 1 for the compensation of veterans with service-connected disabilities as well as dependency and indemnity compensation for the survivors of certain disabled veterans. The bill passed in the House on Sept. 14 and is currently under consideration in the Senate.

Securing and Enabling Commerce Using Remote and Electronic Notarization Act of 2022 (HR 3962) – Introduced by Rep. Madeleine Dean (D-PA) on June 17, 2021, this bill would permit notaries public to perform electronic notarizations and remote notarizations for matters pertaining to interstate commerce. The Act specifies that minimum standards be established, and that all Federal courts be required to recognize notarizations performed by a notarial officer of any state. This bipartisan bill passed in the House on July 27 and has a very high chance of passing in the Senate.

Jenna Quinn Law (S 734) – On March 11, 2021, Sen. John Cornyn (R-TX), re-introduced this bill from an earlier version he proposed in 2019. The legislation would amend the Child Abuse Prevention and Treatment Act to authorize grants for training and education to teachers (as well as other school personnel, students and the community)for sexual abuse awareness and prevention programs among primary and secondary school students. The bill passed unanimously in the Senate on Aug. 3 and is awaiting further action by the House.

How to Host Awesome Holiday Office Parties

How to Host Awesome Holiday Office PartiesFall is here and so are many of the holidays we love. Whether it’s Halloween, Thanksgiving or December holidays, here are some fail-safe things you can do to make sure everyone shows up and has a good time.

Throw a Potluck

One of the easiest ways to lure people away from their desks is – you guessed it – food. Create a sign-up sheet with different categories to make sure you have enough savory and sweet dishes, and provide options for those with dietary restrictions. If you’re the organizer, you might supply the drinks and utensils, maybe even some appetizers or snacks. Depending on the holiday, you might also suggest a theme. If it’s Halloween, you could ask folks to bring their spookiest fare.

Have a Raffle

This is yet another way to get people out of their offices. Everyone who shows up gets a ticket and on the back they’ll sign their name. At different times during the party, have a drawing. Maybe leave the big prize to the end. You could even stipulate that people must be present to win. Some of the prizes you could offer are: gift cards, smart watches, paid time off (PTO) or tickets to an event (a sporting event, a concert, etc.). A weekend at a local hotel (think staycation) or airline tickets are also attractive options. If resources allow, the sky’s the limit.

Designate Secret Santas

During December, this is always a big hit. Employees draw random names and get paired up with someone. The Secret Santa is given a wish list to choose from to give to their giftee. A smart idea is to set a monetary limit, such as gifts for under $25. After opening the present, the giftee has to guess who gave them the gift.

Set Up Games

Think giant Jenga. Pin the carrot nose on the snowman. Cornhole. These can be scheduled or ongoing. And best of all, it’s easy and uncomplicated. Employees can come and go as they wish. A little competition while everyone is noshing is a surefire way to foster employee bonding.

Host a White Elephant Gift Exchange

This is another classic. Everyone brings a wrapped gift and then you draw numbers. People sit in a circle with the presents in the middle, select their gifts in numerical order and unwrap them for all to see. But here’s the fun part: You can steal a gift that someone before you has unwrapped, which causes that person to either select a gift from the pile or steal from someone else. After three steals, the gift is frozen with whoever has it.

Volunteer Together

Working side by side with your colleagues for a purpose greater than yourself always cultivates a sense of community. For example, you could print off blank cards with your company logo on them, then ask employees to send a note of thanks to deployed military members. Another thing you could do with the cards is send a word of encouragement to those who live at places like The Salvation Army. The holidays can bring up lots of emotions, and sending positive messages to others is always a reward in and of itself. After all, when you give, you receive.

If you try one or all of these ideas, taking a break from the grind and enjoying a little non-work fun is not just necessary, it’s critical. When employees can cut loose, as well as feel appreciated and cared for, it’s highly likely you’ll have a happier, healthier workplace.

Sources

https://www.indeed.com/career-advice/career-development/office-holiday-party

How to Increase After-Tax Returns on Investments

How to Increase After-Tax Returns on InvestmentsIt is all about how much you keep after taxes – not what you earn from your job, a business, or investments. While it is always great to see fabulous investment gains, the only financial metric that really matters is what is in your bank account at the end of the day. One of the ways you can influence this is by minimizing the taxes you pay on your investments.

Unfortunately, many people do not think about how taxes impact their investment returns until near the end of the year; however, you should act all year round. Taking part in investment tax planning throughout the year will give you opportunities to keep more of what you earn. Here are some rules and strategies to keep in mind.

Know When to Take Your Losses

Psychologically, many investors are averse to taking losses, holding out to “make their money back.” Instead of emotion, logic and investment acumen needs to be applied here. If an investment does not have a fundamental reason to turn around, then you are better off selling it and taking a tax loss.

Losses reduce taxes on either your capital gains for the year or, when losses exceed gains, up to $3,000 on other income. Excess losses can be carried forward to future years. Plus, you will have the proceeds to reinvest in something more likely to produce a return.

Let Winners Run

Unlike long-term capital gains, short-term capital gains are taxed as ordinary income. This means your marginal income tax rate (the highest rate applied to you) can impact your investment gains.

While you should not let the tax tail wag the investment dog, ideally you want to hold a winning investment for at least a year and a day to benefit from long-term capital gains tax treatment. This means you will pay only a 20 percent maximum tax versus whatever your marginal rate is.

As with losses, the fundamentals of the investment are key. Therefore you should not sell a holding if you think the gains are at risk just to save on taxes. If you believe in the investment for the long term, then holding out for preferred capital gains treatment can be a clever idea.

Give the Gift of Appreciation

Making charitable donations you would not otherwise give is generally not a viable tax strategy. However, if you are already charitably inclined then consider donating stock or mutual funds instead of cash.

When you donate property such as stocks, your charitable deduction is based on the fair market value of the asset on the date of the gift. It is much better to do this than donate cash.

For example, if you have a stock you purchased for $35 and it is now worth $135, when you donate it you will receive a charitable deduction of $135. If you were to sell the stock first, you would have to pay tax on the $100 gains and then have only $103 to donate in cash – assuming you are in the 32 percent tax bracket. The only winner in this situation is the IRS; both you and the charity lose. This is because the charity is excluded from paying capital gains taxes on the appreciation that occurred while you owned the asset.

Hold Until You Die

This strategy does not benefit you directly, but rather your heirs. When someone inherits an asset such as real estate, stocks, bonds, mutual funds, etc., the cost basis of the asset is reset to the fair market value at the date of death.

This means that if you have stock in company XYZ that you bought for $50 and now it is worth $500, you would pay tax on the gain of $450 per share. However, your heir would pay $0 if he sold it on the day you died. If your heir continues to hold the stock, the benefit still applies as his cost basis in the stock of XYZ would reset to $500, so he will pay taxes only on gains over that amount.

Conclusion

While you should never cheat on your taxes or do anything unethical, it is foolish to pay any more than legally necessary to the IRS. Engage in investment tax planning year-round and you may see better after-tax returns and more money in your bank account.

Financial Accounting Overview

What are financial statementsFinancial accounting is how accounting professionals document, compile and outline how a business performs financially over a discrete period of time. Unlike cost accounting, which is used primarily for internal short and long-term strategic planning, financial accounting focuses primarily on producing relevant documentation for outside parties interested in short- and long-term financial performance.

Small businesses, large corporations and nonprofits use the following financial statements produced for relevant parties: the Balance Sheet, the Cash Flow Statement and the Income Statement. When it comes to publicly traded companies, their financial accounting standards are overseen by generally accepted accounting principles (GAAP). It’s one way to provide a standardized means to communicate the business’s monetary details to potential and current shareholders, lenders, government oversight and tax enforcement agencies.

Balance Sheet

As the U.S. Securities and Exchange Commission (SEC) explains, the balance sheet is a financial statement that informs readers about a business’s assets, financial obligations and shareholders’ equity. It’s how a business documents its asset valuation, its financial obligations and cash holdings. It provides owners, lending institutions and investors a way to analyze a business. The current ratio shows the ratio of current assets to current liabilities. This is a way to evaluate a business’ ability to manage financial obligations over the next year. Shareholders’ equity represents how much cash would remain if the business satisfied all creditors and all assets were liquidated; whatever remains would be the property of the shareholders.

Income Statement

Released once a month, every quarter or once per year, an income statement reports revenue, expenses, and net earnings or losses of a company for a given period. A company’s net revenue is calculated by subtracting allowances for uncollectable accounts, discounts, etc. from a business’s gross sales or revenues. From there, subtract the cost of sales, or how much the lot of products or services cost to make for the accounting period, from the net revenues figure. This results in gross profit or gross margin. Depreciation, along with amortization, or the cost of machinery and equipment losing life over time, is subtracted from the gross profit figure.

From there, operating expenses, which aren’t directly attributable to product or service production but are running day-to-day operations, are deducted from the resulting gross profit figure. This number is now called income from operations or operating profit before interest and income expense. Depending on the number, the interest income or interest expense is either added or subtracted from operating profits to arrive at the operating profit before income tax. Finally, income tax is deducted, resulting in net profit (net income or net earnings) or net losses. For publicly traded companies, it gives investors insight as to how much the company is making per share, so-called “earnings per share” (EPS).

Statement of Cash Flow

Per the SEC, a statement of cash flow features three sections that detail sources and utilization of the business’ operating, financing and investing cash flows. It paints a picture of inflows and outflows of the business’s cash levels. At the end of the day, it helps anyone interested in the company’s financials, especially potential and current investors, see the latest status and trends of cash flow.

One way to calculate cash flow, according to the SEC, is to look at a company’s free cash flow (FCF). This is calculated as follows:

Free Cash Flow = Operating Cash Flow – Capital Expenditures

Free Cash Flow = $50 million – $20 million = $30 million

This information is helpful because free cash flow can help determine a company’s financial health, how well (or not) the business model is performing, and its overall likelihood of success moving forward. Additionally, understanding the difference in accounting methods is another helpful piece of financial accounting analysis.

Accrual Method vs. Cash Method

Accrual Method

When it comes to the accrual method, according to the Congressional Research Service, when a business is paid for services or products to be rendered in the future, the payment is permitted to be recognized as revenue only when the product or service has been rendered. When it comes to accounting for expenses that are presumably deductible, under the accrual method, the expense can be recorded when it’s experienced by the business, not when payment has been made to the utility, raw material supplier, etc.

Cash Method

If a consultant gets payment immediately but isn’t expected to do said job until the following month, this approach requires revenue to be recognized when the cash has been received. Similarly, when expenses are paid is when expenses are recorded.

Considerations

For any business that handles inventory or sells to customers on credit, accrual accounting is required by the Internal Revenue Service. Similarly, for companies with average gross receipts of revenues greater than $25 million for the past 36 months, the IRS mandates accrual accounting. For companies with average gross receipt of revenues of less than $25 million, depending on the exact circumstances of the company’s business nature, cash or accrual may be used.

Financial accounting provides investors, business owners, and those providing businesses with legal and accountability a way to monitor performance and compliance.

Sources

IRS, IRS, IRS, FAS, SEC, SEC

Recent Trends in Long Term Care Insurance

Long Term Care InsuranceLong term care (LTC) is associated with the elderly for good reason. Over the past 50 years, life expectancy has increased significantly and is therefore something all families should be prepared to address. Even though we may live to a ripe old age, that doesn’t mean we will be healthy or able to live independently. Most people develop one or more chronic conditions that require living assistance – and many live with that ailment for years. Conditions such as arthritis, joint and muscle deterioration, or back pain often lead to chronic disability, making it difficult to impossible to take care of your own physical and lifestyle needs. Among even healthy seniors, about half of people age 80 and older experience some form of dementia or cognitive impairment.

Most LTC insurance (LTCi) contracts require that the policyowner no longer be able to perform at least two of the basic activities of daily living (ADL), which including dressing, bathing, toileting, feeding, and moving without assistance. However, before getting to that stage, many people may live for years needing help with domestic ADLs, such as preparing meals, paying bills, shopping, attending appointments, etc.

New Criteria for LTC Insurance

An unfortunate influence of the pandemic is that some LTC insurance carriers now require an in-person medical exam as part of the application process. In the past, underwriting generally involved a telephone interview, a completed questionnaire and medical records review. These days, in addition to an exam, issuers have increased the number of pre-existing conditions that are excluded from coverage. Furthermore, insurers are declining more applications for medical reasons. In fact, there is preliminary data that suggests more LTCi applications are declined or higher premiums charged in geographical areas where populations have persistently higher rates of serious COVID-19 infections. Not surprisingly, these areas are generally correlated with lower vaccine rates.

New Policy Options

Even before the pandemic, LTCi sales were on the decline and many insurers exited the market. This is because, with longer life expectancies, carriers increased premiums to cover the financial risk. This priced many policies out of range for most households. In recent years, the life insurance industry has found a strong market in sales of hybrid policies, which guarantee benefits one way or another. For example, a contract might include a rider that allows the policyowner to use the future death benefit in the present to pay for LTC expenses while she is still alive. If she doesn’t need the money, her beneficiaries will receive the value when she dies. Another benefit of hybrid policies that they guarantee premiums will not increase. In many cases, a policy can be purchased with a single lump sum.

New Focus for LTC: Live at Home

Apart from exploring new ways to pay for long-term care, there is political interest in finding ways to provide LTC more efficiently than in the past. For perspective, consider that the current U.S. system of placing Medicaid recipients into nursing home facilities proved to be one of the most vulnerable components of the pandemic. As of February 2021, more than 170,000 residents in long-term care facilities had died due to the coronavirus.

Various public agencies and non-government organizations (NGOs) are looking at new paradigms for caregiving as an alternative to high-volume residencies in order to minimize the risk of disease contagion. Some recent proposals include the following:

  • Enhance our current public programs that support independent living (e.g., Original Medicare, Medicare Advantage (MA) plans and Special Needs Plans (SNPs) with integrated benefits such as wellness care, behavioral healthcare, case management, home-delivered meals, transportation and adult day services.
  • Allow Medicaid’s long-term services and supports (LTSS) programs to reimburse long-term care expenses at home and for community-based services.
  • Expand efforts already originated in a handful of states (e.g., Illinois, Michigan, Minnesota, Washington) for state-sponsored, long-term care insurance plans.
  • Consider building on state initiatives such as California’s Master Plan for Aging, which includes plans to:
    • Create community housing solutions that that are age-, disability- and dementia-friendly, as well as climate- and disaster-prepared.
    • Improve quality of life for the elderly and disabled by presenting opportunities for work, volunteering, engagement and leadership regardless of age or disability. The purpose of this initiative is to reduce isolation, discrimination, abuse, neglect and exploitation.
    • Generate up to1 million highly-qualified, well-paid caregiving jobs.
    • Improve financial security for the elderly population by making long-term care affordable.
  • Reimagine nursing homes using continuum of care housing models designed for 8 to 10 residents with integrated staffing.

The current trend in the caregiving industry is to help seniors be able to live at home for as long as possible. In many cases this increases the burden on families. Since some people have to leave the workforce to care for family members, this hampers economic growth and tax revenues that could be used to fund better options. While LTC insurance remains expensive, it’s important that potential buyers are aware that most policies pay out benefits regardless of where care is bestowed, including nursing homes, assisted living facilities, the insured’s home or even if the insured has moved to a family member’s home.

Risk of Browser Extensions and How to Stay Safe

Risk of Browser ExtensionsWeb browsers such as Google Chrome, Firefox, Safari and Edge, among others, play an essential role in enabling access to websites on the internet. Most browsers allow users to install extensions, also referred to as add-ons or plug-ins. These extensions are applications or small software modules that add functionality and other useful features to a browser.

By means of the extensions, users can carry out various tasks such as password management, cookie management, ad blocking, interface modification, productivity tracking, grammar and spell-checking, etc.

However, although the extensions offer different useful functionalities, cybercriminals have taken advantage of them, creating a security risk to users and their data.

The Need to Beware of Browser Extensions

Browsers enable websites to collect information such as viewing history, adding cookies, etc. Also, when installing the extensions, some require to be allowed various permissions, like the ability to read or change data. For instance, according to a recent study by Talon, a digital security company, most Chrome Web Store extensions (62.43 percent of extensions) require dangerous permissions, including permission to read or change user data and activity. This means that an extension can see the sites visited, keystrokes, login credentials and private data, such as payment card details.

Since this information is readily available on a user’s web browser, cybercriminals can use a malicious extension to collect the data for their gain. At the same time, the data collected is sold without user consent or knowledge and used by third-party data brokers to send users tailor-made ads.

Although not all browser extensions are a security risk, some might be built to impersonate legitimate extensions, especially those from third-party resources. In other cases, legitimate extensions have been compromised or bought by a developer who uses them for malicious purposes.

Some browser add-ons are built to download malware onto your device, redirect search traffic to malicious websites or download ad ware and Trojan horse viruses.

The extensions can automatically update without requiring any action from a user. This means that if a legitimate extension is compromised, it can be used to install malware without user knowledge. Even secure extensions are prone to attacks or can be compromised, enabling attackers to gain access to data stored by browsers.

Additionally, malicious extensions can be built to bypass fraud detection by official Web stores. For instance, in 2020, Google removed over 500 extensions from its web store that violated policies, with some already having infected users and stolen their data. This followed the discovery of some malicious extensions that users had already downloaded.

A recent report released by Kaspersky, a cybersecurity firm, shows just how dangerous malicious add-ons are. After the firm analyzed data from January 2020 to June 2022, it discovered that over this time frame, 4.3 million users were attacked by adware hiding in browser extensions. This put adware as the highest representative of browser extension risks, with malware coming second. The report also indicates that Kaspersky products prevented more than 6 million users from downloading adware, malware or riskware disguised as browser extensions.

Such figures from just one cybersecurity firm are worrying, considering the study focused only on users that use their security solutions. This creates a need for users to be more vigilant when using browser extensions.

How to Make Sure Browser Extensions Are Safe

There are various ways to help reduce the risks posed by browser extensions:

  1. Ensure the extension is from an official web store. Since these extensions can also be compromised, it is best to find out more information about the developer.
  2. Check reviews as they help to know what other users think of the extension and if there have been any complaints. However, users should be cautious of identical comments or too many 5-star reviews, as these could be fake.
  3. Check whether the extension is updated regularly. An extension last updated many years ago might not be reliable.
  4. Review extension permissions for each extension.
  5. Check that you are not installing clones of the original extension. For instance, if you search for an extension, you can find other similar ones that look legit.
  6. Uninstall browser extensions that you don’t recognize or those you no longer need.
  7. Use browsers that have the features you want.
  8. Install reliable antivirus software that will help spot malicious activities or applications.

Conclusion

Browser extensions play an important role in the user browsing experience. Although not all extensions are dangerous, users must conduct due diligence to ensure they install legitimate extensions.

How Cost Accounting Helps Businesses Measure Performance

Cost AccountingCost accounting is a type of accounting that analyzes a business’ complete production costs by looking at both variable and fixed costs. This includes the concepts of marginal costing, lean accounting, standard costing and activity-based costing. It’s used by a business’ management to evaluate fixed and variable costs involved in the manufacturing operations.

The initial step is to assess and document such costs one-by-one. Once production is finished, it will contrast projected costs to what actual costs ended up being and see how processes can be improved. Management gleans information on how funds are used, revenue is earned, and where funds might be misdirected. It can help businesses create greater productivity and financial efficiencies after analyzing such information.

Looking at it more in-depth, there are different types of costs analyzed. The first is fixed costs, such as a monthly mortgage or lease payment, or those that are static regardless of the production level. The next is a variable cost that correlates directly with the production level. Operating costs can be either fixed or variable, depending on each business’ type of operation. Other types of costs include direct or directly connected; and indirect costs, which are costs such as administrative expenses that are less directly associated with production.  

Variable Cost Ratio

Variable Cost Ratio (VCR) looks at what percentage a business’ variable production costs is of its net sales. Businesses can calculate the VCR by:

VCR = Variable Costs / Net Sales. Net sales is a business’ gross sales after subtracting any discounting, customer returns and allowances.

It can also be calculated this way: VCR = 1 – Contribution Margin

If each widget’s variable unit cost is $40 and it sells for $200 individually, the VCR equals 0.2 or 20 percent. It’s also possible to be completed within a certain time frame. For example, if a single month’s total variable production costs are $6,000, and the business has revenues of $30,000 within that same month, the variable cost ratio is 0.2 or 20 percent.

The VCR shows if a company is able to earn a higher rate of revenues and a slower growth in input costs. It can help businesses determine when it hits an equilibrium between a loss and profit. It’s also important to note that fixed costs are excluded.

Marginal Costing

Marginal costing, or cost-volume-profit analysis, is a way to determine how much more it would cost a company to increase its manufacturing by one more widget.

It helps analyze the impact of varying levels of costs and volume on operating profit. This calculation looks at potentially profitable new products, sales prices to establish for existing products, and the impact of marketing campaigns. It assumes that the retail price and the variable and fixed costs per unit don’t change. It’s a way for businesses to calculate when they’ve developed a price point to cover all expenses. It also can indicate when the business can obtain profits at a particular price point and mix of manufacturing output. It’s a way for businesses to determine which levels are unprofitable, break-even and make a profit.

When it comes to determining how much sales volume a business needs to break even, the formula is as follows:

Sales Volume = Fixed Costs / Contribution Margin (Contribution Margin = Sales – Variable Costs)

If a business is looking to determine its break-even sales revenue figure, it must determine what its fixed costs are and its contribution margin. This calculation would be as follows:

$210,000 in fixed costs and a contribution margin of 30 percent = 210,000 / 0.30 = $700,000

However, it’s important to note that there’s no profit with the first calculation. If the business wanted to make $100,000 in profit, it would add that to the $210,000 in fixed costs. This would be calculated as follows: $310,000 / 0.30 = $1,033,333.33

Considerations of Marginal Costing/Cost-Volume-Profit Analysis

This formula tells a company if a widget is profitable. The contribution margin is what’s left over after each item or a lot of items is sold after deducting the variable costs for the respective number of units sold. When the contribution margin exceeds the fixed cost for the item or respective number of units sold, this signifies a profit. 

Companies that have the time and resources to analyze their performance beyond the traditional financial statements can see what’s right with their processes; but can more importantly, they can find out what’s wrong and how to fix it going forward.