The 5 W’s of HUBZones: What Are They and How Do I Qualify?
A Historically Underutilized Business Zone (HUBZone), is a set-aside program designed to help businesses in economically underdeveloped areas. Set-asides like HUBZones are incredibly useful for government contractors who are trying to win federal contracts. Keep reading to learn more about this valuable program and its eligibility requirements. Who can participate? Small businesses that have been …
Read MoreIRS Announces Pre-Breach Identity Protection Services Are Non-Taxable
On December 30th, 2015, the IRS officially announced that employers are not required to include the value of pre-breach identity protection services in employee gross income. This adds to a previous announcement where the IRS stated in August 2015, with announcement 2015-22, that post-breach identity protection benefits would have preferential tax treatment. The most recent announcement extends …
Read More5 Keys to Government Sales Success
How many times have you heard the phrase “failing to plan, is planning to fail”? This happens every day in the B2G marketplace. Companies don’t take the time to fully understand what is required to enter, compete, and grow a successful government practice. Many companies fail to understand how to develop and expand their business …
Read MoreDark Web ID Tracks and Identifies DHS and FBI “Data Dumps” Immediately After Release
Last weekend, more than 9,300 Department of Homeland Security (DHS) employees’ personal information was leaked online, all stemming from an apparent data breach to the DHS networks. Not only were those identities exposed, but the Twitter user that publicized the information immediately followed suit by exposing an additional 22,000 Federal Bureau of Investigation (FBI) employees’ information. …
Read MoreFive Steps to Protect Your C-Suite from Corporate Identity Theft
Since 2003, the FBI has tracked more than $740 million dollars lost to business email compromise (BEC) fraud in the United States. Who’s the main target? None other than the C-Suite. Led by organized online criminal groups, BEC is one of the fastest growing types of financial fraud. Company executives are more easily compromised than you may …
Read MoreWorking with a Prime: Your Benefits as a Veteran Owned Small Business
As a veteran-owned small business (VOSB) or a service-disabled veteran owned small business (SDVOSB), subcontracting can be the logical first step into the Federal Government marketplace. Participating in set-aside programs and putting forth quality goods and services will increase your chances of working with a prime contractor, and subsequently perpetuate your competitive edge. This partnership …
Read MoreBuilding a Small Business from the Ground Up – Appealing to the Federal Government
Client Spotlight – Avilar Technologies Inc, a Veteran Owned Small Business. At the dawn of the Internet era, Tom Grobicki, CEO of Avilar Technologies began envisioning a world with technological advances that would eventually propel the software industry and subsequently help the armed forces. After serving in the US Air Force and cultivating over 25 years …
Read MoreThree Types of Business E-Mail Compromise Scams You Need to Recognize
The internet has changed the way businesses operate around the world. Having access to a tool of this caliber is essential to the way corporations function today, but it also has its downfalls. In this case, we’re referring to the incredibly dangerous threat most business owners are either unaware of or hardly ever think about …
Read MoreWhy Employee Data May Pose Biggest Cyber Risk
Cyber risk is no longer a potential threat to put on the back burner for later review. The reality is that cyber risk is a threat right now. Many organizations are taking precautions to protect themselves and their people. However, despite the plethora of major companies and brands experiencing the repercussions of not instilling pre-breach precautions, …
Read MoreAre You Doing Enough to Protect Your Customers’ Data?
Protecting sensitive customer data on your networks isn’t just the right thing to do – it may now be a legally sanctioned practice. Recently the Federal Trade Commission (FTC) was granted broad authority to penalize companies that had inadequate cybersecurity practices in place to protect their customers’ information from data breaches. In the past, the …
Read More