As a business coach, I’ve often witnessed the power of familial bonds in the world of entrepreneurship. One strategy that has shown immense potential for both the business and the family is hiring children within the business. While some may raise eyebrows at the idea, there are numerous benefits to be reaped from such a decision, ranging from financial advantages to fostering a sense of responsibility and entrepreneurship in the younger generation.

Two Financial Benefits of Hiring Your Children in Your Business

Hiring your children and offering them a salary can be a mutually beneficial scenario, financially speaking:

  1. Salary Expenses: Instead of handing out allowances, you can pay them a reasonable wage for the work they do. The IRS allows business owners to deduct reasonable wages paid to their children as a business expense.
  1. Tax Advantages: Hiring your children can also offer tax advantages for both parties. Children can earn up to a certain amount (subject to change, so consulting a tax professional is advisable) without paying federal income tax. For the business, wages paid to children are deductible as a business expense, reducing the overall taxable income.

Tax Exemptions and Retirement Benefits Associated with Hiring Your Children

As a business owner, it’s also important to understand the potential tax benefits of providing certain benefits to your employees, including family members. In particular, offering retirement planning as a benefit to your children can both introduce them to the concept of saving early on and yield tax advantages for your family. Let’s get into the details:

Tax Exemptions for Certain Benefits: Depending on the structure of your business and the tax laws in your jurisdiction, certain benefits provided to employees, including your children, may be tax-exempt. This could include health insurance premiums or contributions to retirement plans.

Retirement Planning as a Benefit: By hiring your children, you can also introduce them to the concept of retirement savings early on. You may establish retirement accounts, such as a Roth IRA, and contribute a portion of their earnings. This not only helps them start saving for their future but also reduces the family’s overall tax liability.

Three Final Benefits of Hiring Your Children within Your Small Business

Hiring your children can reap benefits beyond providing you and them financial and tax-savings benefits. This decision can also offer them a meaningful learning opportunity and set the stage for their future success, both professionally and financially. Here are three final benefits of hiring your children within your small business:

  1. Hiring your children provides them with a learning opportunity: Working in the family business provides invaluable real-world experience for children. They learn important skills such as communication, teamwork, problem-solving, and financial literacy, all of which are crucial for their future endeavors.
  1. Hiring your children creates an opportunity for family bonding: Working together can strengthen family bonds and create shared experiences. It provides an opportunity for open communication and mutual understanding between generations, fostering a sense of unity and purpose within the family.
  1. Hiring your children allows for proactive succession planning: Hiring children can be a strategic move for succession planning. It allows them to gain firsthand experience and knowledge of the business, preparing them to take on leadership roles in the future.

Ultimately, hiring your children in your business can be a win-win situation for both the family and the business. This business strategy offers financial benefits, tax advantages, and valuable learning opportunities while fostering a strong sense of family unity and preparing the next generation for future success. 

However, it’s essential to approach this decision thoughtfully and in compliance with all legal and tax regulations. Consulting with a qualified tax advisor or financial planner is a great way to navigate the complexities–and maximize the benefits–of this arrangement.

When building a team, classifying your workforce correctly is vital to your business’s success and legal compliance. Employees and independent contractors are not interchangeable terms, and it’s important that you can distinguish between the two in your organization.

While it may seem like a simple solution to classify members of your workforce as independent contractors, there are actually very specific criteria that determine whether a worker can be classified as an independent contractor. Workforce classification is not a grey area – the IRS has an independent contractor test, as do many states, and they do not always follow the same criteria. In this article, we’ll discuss the differences between an employee and an independent contractor so you can ensure you’re operating your business correctly.

 

When is a worker considered an Employee?

Employees work under your direct control – they follow your schedule, use your company tools, and often receive benefits such as training, healthcare and/or retirement. You withhold taxes from their paychecks and contribute your share of payroll and unemployment taxes, you pay workers’ compensation insurance on the wages, and you file quarterly and annual returns with the IRS, Social Security Administration, and state agencies.

 

When is a worker considered an Independent Contractor?

Independent contractors maintain autonomy – they work for themselves and have their own company, they set their own schedule, they provide their own tools, they have their own general and/or professional liability insurance, and they handle their own income and/or self-employment taxes and pay their own expenses. They are typically hired for a specific project and under contract and take the risk of whether or not they make a profit.

 

What can happen if a worker is misclassified as an Independent Contractor?

If the IRS determines that you have been misclassifying an employee as an independent contractor, the penalty can equal 20% of the wages paid; 100% of the employee FICA taxes that should have been withheld; 100% of the employer FICA taxes that should have been paid; 20-75% of the underpayment of taxes; 25% of the late payment of taxes; and a per-worker fine.

In addition, there are Department of Labor and state penalties for misclassifying employees as contractors, which can equal any overtime that should have been paid. Plus, courts can award an additional 100% of unpaid overtime payments.

Penalties can also include severe criminal sanctions, including felony charges.

There’s a lot at stake when it comes to classifying your workforce correctly, and cutting corners here can be a costly decision for your business. Proper classification safeguards your company from legal issues and ensures compliance with labor laws, workers’ compensation laws, and Federal and state laws. If you have questions about the classification of your workforce or need support with payroll in your business, reach out to our team at newbusinessdirections.com/contact.

Most small businesses own at least some type of fixed asset, which could include items like land, buildings, equipment, and automobiles. The investments of adding, replacing, or improving upon fixed assets are called capital expenditures (or “capex” for short).

It seems like there is never enough money for all the capital expenditures that are on a business’s wish list. To make the best spending decisions, it’s a good idea to establish a process for capex activities in your organization. There should be three phases of your process: 

  1. Initiation, estimating, and evaluating return on investment for each capex project.
  2. Prioritization of projects based on ROI
  3. Managing and monitoring the projects once they have started.

Step 1: Initiate, Estimate, and Evaluate the capex initiatives you’re considering

The first step is to list all the capital projects you’re considering. Here are some examples:

  • Buy an additional truck for deliveries.
  • Expand the warehouse space.
  • Purchase a piece of equipment for the manufacturing line.
  • Redo the dock area to improve loading efficiency.

Once you’ve made your list, you can begin to formalize your capital expenditure process. Each project should be detailed and estimated, with bids from vendors, so you have a realistic idea of the cost.

Step 2: Prioritize your capex initiatives

The next step is the most important. What are the estimated savings for each project? In other words, what will your return on investment (ROI) be? In capital expenditure spending, this answer is crucial. For each project, estimate the expected savings in time, money, and intangible benefits, and determine the break-even point.

This step can be challenging because the savings might be more qualitative than quantitative. For example, the benefit could be an improved customer experience, which should result in future sales. In this case, you’ll still want to estimate how you think future sales will be impacted. In many cases, it can take years for an item of capital expenditure to start paying off from a cash flow standpoint.

Next, it’s time to visualize the data you’ve accumulated into something like this: 

Project Cost Anticipated Savings Benefit Notes
Truck $40,000
  • Increases sales by $1,000 per week.
  • Marketing spending (non-capex) increases by $3,000/year.
  • Assume cash sale – if loan, figure interest expense.
First year: $9,000 savings.

Second year savings: $49,000.

(Break-even comes in second year.)

Increases sales capacity and reduces delivery times.
Redo the dock area $20,000 Time saved – payroll costs decrease by 1/2 headcount. Savings of $27,000. If attrition is used, defer savings. First year savings: -$7,000.

Second year savings: $27,000.

(Break-even comes at end of second year.)

Employee happiness, reduced turnover are intangibles.

When deciding which project to choose, return on investment is only one factor to consider. You must also consider employee satisfaction and turnover issues, customer service, capacity management, tax breaks, break-even time, cash flow, lending limits and financial ratios, and other factors specific to your industry.

The key is to have a process that makes sense for your organization. If you don’t have a process, choosing the cheapest project first could seem like the best decision, but it may not have the highest return on investment. This missing link in insight today could lead to cashflow and profitability issues tomorrow.

Tax implications also need to be considered, and we want to point out that these have been left off of the above example since every business’s tax planning circumstance is unique. Always consult with your tax accountant before making a capex decision and as you approach year-end. They can provide valuable feedback about how certain purchases will affect your tax liability. For example, making a capex investment before year-end when you’ve had high profits could be a strategic way to offset your tax obligations. 

Another factor to consider is whether you’ll need a loan to complete these capital improvement(s). Interest rates have been rising in 2023, and these costs, plus your cash flow impact, need to be evaluated. As your debt increases, your financial ratios also need to be assessed. You have to be careful not to go into too much debt overall.

After documenting all considerations, you’ll be poised to make a well-informed decision on which capex project to prioritize next. You might even consider creating a capex committee to help you decide. Be sure to include your accounting advisor on the committee!

Step 3: Manage your capex initiative

You’ve decided on the capex project you want to take on now. Great! You’ll want to appoint a project manager to oversee the project’s progress and take action for any necessary course corrections. Once the project is complete, set milestones so that you can see how accurate your estimates of costs and benefits were. You might need to set milestones every year for several years in order to accurately measure the actual ROI, and taking these measures will make you a more accurate estimator in the future.

Spending at the right time on capex projects is as much an art as a science. However, putting formal processes into place will improve your chances for a better return, smoother cash flow, and improved profits.

We’ve heard more than a few horror stories in the past few months of business owners falling for phishing scams that compromise their company, cost them thousands of dollars, and put their customers and contacts at risk. Hackers are getting more sophisticated by the day, and it’s becoming harder to tell a malicious threat from an ordinary email.

We share this insight to empower, not scare. The good news is that most threats are avoidable with a vigilant eye. In 2021, think of a phisher as more of a vampire than a heister: you have to invite them in before they can cause any harm. Below, we’ve pinpointed a few common threats for 2021 and 2022, along with best ways to avoid them. These suggestions should help keep your sensitive data secure from current phishing trends. 

Common Threat 1: QuickBooks Impersonation

One common trend we’re seeing involves solicitations from QuickBooksⓇ impersonators falsely notifying you that your QuickBooksⓇ file is corrupt, your automatic payment is about to expire, or your version of QuickBooksⓇ needs to be updated. These phishers will try to get you to pay for a phony upgrade over the phone or grant them access to your desktop to “fix” your accounting software. Here’s the thing: if you work with an accounting company like New Business Directions, we’ll probably be the first ones to know if something is wrong with your QuickBooksⓇ file. And if you’re a New Business Directions customer, QuickBooksⓇ knows you’re working with a QuickBooksⓇ Solution Provider and will often notify us of any issues your account may be experiencing, too.

How to dodge the threat: If an email appears to come from QuickBooksⓇ, check the email addresses for the correct website. If it doesn’t end in “@Intuit.com” or “@QuickBooks.com” the sender is fraudulent (even if the name before the @ symbol looks convincing). Always contact your accountant before engaging with a solicitation like this and never provide payment information or authorize remote access to your computer or QuickBooksⓇ file to anyone besides your accountant or IT solutions provider.

Common Threat 2: Download this Attachment

Another major threat to watch out for involves an email from an address you recognize (say, a customer, vendor, or team member), but asks you to enter your Microsoft credentials to view the attachment. This scam comes from a person you know, and their email address matches the one you have on file. The MicrosoftⓇ log-in screen looks legit, but the web address is not. Do not enter your Microsoft credentials. As soon as you do, the hackers have access to your email and all sensitive information you have ever sent or received via email. The phishers will then send the exact same email that you fell for to every contact in your address book.

How to dodge the threat: never enter your log-in credentials to view an attachment. If an email includes a hyperlink, hover over the link with your mouse (don’t click) and watch for a link preview to appear in the corner of your screen. In Outlook, this will be the bottom left corner. You’ll be able to see a preview of the web address the hyperlink is trying to send you to, and if it’s different from the one typed out in the email. In this case, if the domain isn’t “office.com” the email is fraudulent. This is a fast and simple step you should always take before clicking a hyperlink in an email. And when it comes to sharing sensitive information like bank statements and government IDs, you should always use a secure, encrypted file sharing application like SmartVault instead of sending the document as an email attachment. 

Common Threat 3: “You Have a Voicemail” emails

Are you surprised to be receiving an email notifying you about a new voicemail? Does it have an attachment? Is the sender posing as RingCentral or another VOIP phone system provider you use? Remember: if it seems suspicious, it probably is.

How to dodge the threat: don’t download the voicemail. If you want to be sure you’re caught up on your voice messages, navigate to your voice mailbox the way you usually do and avoid interacting with the email in question.

Common Threat #4: The QR Code Swap

QR codes have become so mainstream that we interact with them weekly, if not daily. From restaurant menus to sign up forms, they make accessing the information you need quick and simple. But there are emerging trends in which bad actors will replace a QR code with their own – by overlaying a sticker. They may also come in the form of seemingly-legit emails. But as soon as you scan these phony codes, you could be putting your sensitive data at risk or downloading malware.

How to dodge the threat: Review the preview of the web address when you scan the code, and before you click on the link that appears. Make sure it’s spelled correctly, and seems like it’s coming from the correct person or business. When dealing with QR codes that exist in a public space, take a second glance to make sure the QR code hasn’t been tampered with, such as replaced by a sticker. When in doubt: don’t scan that code!

Best Practices

There are so many ways to avoid phishing scams, but the most important thing to do is stay observant. If something seems off about an email, it probably is. Below, we’ve outlined a few specific best practices that should help you avoid scams:

  • Set-up two factor authentication. Do this for all websites/applications you have log-in credentials for. It might seem inconvenient to go through one more step to access your online accounts, but this practice is still more convenient than dealing with a successful cyber security attack. Apps like LastPass Authenticator or Google Authenticator are an option. These apps provide a six-digit code for you to enter once you’ve logged in to your desired online account. Many other web-based companies offer the option to have an authentication code sent to your personal cell phone or the email associated with the account. How does two factor authentication help? Even if a phisher gets your credentials, they still need access to your email, text messages, or authenticator app to get the authentication code and hack your account, making it significantly less likely they’ll be successful in their attempted breach.
  • Keep up with phishing scam trends. Check for updates from Forbes.com, PCMag.com, or your favorite trusted business news source for updates on phishing trends and recent cyber security threats.
    1. Don’t open the door for strangers. Never grant access to your computer to someone you don’t personally know, even if they look like a QuickBooksⓇ rep. Your accountant and your IT Support vendor/employee are the only people you should ever allow access to.
  • Watch for inconsistencies and typos. Are there misspellings in a marketing email? Does the subject line have five exclamation points? Is your name or the name of your company spelled wrong? When it comes to emails, if it smells like a phish and looks like a phish…well, you know the rest.
  •  Double-check the sender. Always check the sender’s email address. If the name associated with the email address says “Rhonda Rosand” but the email address differs from the one you have on file for Rhonda Rosand, the sender is a fraud. In cases like this, you should check with the individual through another previously established method of communication, be it a phone call to a number or email you already have on file to confirm your contact actually sent the email you’re looking at. Don’t reply to the questionable email with, “Rhonda, is this really you?” If you were a hacker, how would you respond to that email? Red flags include a professional email that includes an @gmail.com (or similar) domain, a slightly misspelled name, or a domain that differs from that of their company’s website.
  • Train your Team. If you received a sketchy email, chances are your team received it, too. Send out an all-company message about the threat and tell employees to notify you or your IT professional immediately if they interacted with the threat. Share trends in cyber security threats, and host frequent training on cyber security best practices.
  • Trust your gut. Even if the sender looks familiar, if they’re asking for weird information or are trying to send you an attachment in an unusual way and it seems suspicious, trust your gut. Look for other clues that they might be an imposter: is a hyperlinked web address different from what it should be? Is their email address different from the one they typically use? Is their tone or communication style different than usual? 
  • Keep your passwords strong and secure. LastPass is a great solution for dual factor authentication, generating complex passwords, and storing sensitive information securely. You can read more about this helpful cyber security solution in a recent blog post of ours here.
  • Don’t send sensitive information via email. Avoid sending credit card information, banking information, W-2s and 1099s, pictures of vital documents like drivers licenses, social security cards, etc. via email altogether. Instead, use a secure document management system both parties are already aware of.

When in doubt, don’t click that sh!t

When it comes to Cyber Security, It’s always better to be safe than sorry. Be suspicious of communication that seems a little off. Avoid unusual emails and contact your IT security provider (or accountant, if it’s related to accounting) to ask for their insight right away, especially if you’ve already accidentally interacted with the phishing attempt. New Business Directions is well versed in phishing scams, and we have a keen eye for malicious emails. If you’re a current customer and feel unsure about an email or solicitation you recently received involving your accounting software, reach out to us.

Join Rhonda Rosand, CPA and Advanced Certified QuickBooks ProAdvisor of New Business Directions, LLC, and learn how to Record PPP or EID Loans in QuickBooks Desktop and QuickBooks Online:

Nobody likes, them, but sometimes it happens. This is how you record it in QuickBooks if this happens to you.

Learn How to Record a Bounced Check From a Customer in QuickBooks® with Rhonda Rosand, CPA and QuickBooks® ProAdvisor from New Business Directions, LLC

If you want to swap services with a vendor or customer, great! But did you know barter transactions are taxable, and they need to be recorded on your books. Here’s a video from Rhonda on exactly how to record barter transactions: https://www.youtube.com/watch?v=iOAaOrojGhI

Learn How To Add & Edit Multiple List Entries in QuickBooks with Rhonda Rosand CPA and Advanced Certified QuickBooks ProAdvisor

Learn how to back up your QuickBooks file with Rhonda Rosand, CPA of New Business Directions, LLC.

Have a receivable you can’t collect on? Learn how to write off a bad debt in QuickBooks with Rhonda Rosand, CPA, Advanced Certified QuickBooks Proadvisor of New Business Directions, LLC.