Microsoft, Windows, and Internet News - XML News Feed

Microsoft, Windows, and Internet News - XML News Feed - The Internet and Mobility News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:


IRS Gearing up to Audit and Monitor 1099s and W9 for Independent Contractors

A management site for IT

Independent Contractors in the crosshairs of the IRS

The IRS soon will add 85,000 agents.  They will be looking for work.  One of areas of that work will be in identifying unreported income of independent contractors.  In discussions with several internal IRS managers, we verified they are investigating how to identify and address IT Pros who were WFH employees that switched to an “independent contractor” status.  The crust of the initial audit attractivities would be driven by matching W2s, W9s, and 1099s of that universe.

Independent contractors do not receive W-2s from clients or companies they work for independently because they are not considered employees. Instead, an independent contractor receives 1099 (MISC most commonly) for every job over $600 that they complete during the tax year. The IRS considers any 1099 payment as taxable income, individuals are required to report 1099 payment on your tax return, meaning they need to report 1099 payments even if they do not receive a 1099 from a company. The government requires that organizations send their independent contractor's 1099-MISC forms by January 31st, indicating the income paid to each contractor over the prior year.

IT Pros Historical Job Market Size

IT Pros Job Market Historical Size

The key difference between W9 and 1099 is that the W9 is a form filed by independent contractors who provide services to companies, upon the request from the respective company.  The 1099 is a form used to provide information to the Internal Revenue Service (IRS) regarding specific types of income from non-employment related sources.

The W9 is an IRS form that is maintained by the individual who files the information return for verification purposes. W9 also serves as an important identification of the Social Security Number (TIN Taxpayer Identification Number) of the taxpayer. Companies who obtain services from third parties must request the W9 from a U.S. citizen or a foreign national. The information in this form becomes useful when the company is reporting to the Internal Revenue Service to indicate the amount of funds paid to independent contractors.

The 1099 is a form used to provide information to the (IRS) regarding specific types of income from non-employment related sources.  In general, 4 copies of 1099 are made: for the payer (company), payee (independent contractor), IRS and the State Tax Department. IRS also specifies regulations regarding filing tax return based on the number of 1099 forms. If the number of forms is less than 250, paper copies must be filed. When the number of forms exceeds 250, they must be filed electronically with the IRS.

The first companies that will be impacted by this new attention will be large employers. Once the full complement of 85,000 new IRS agents are on board, they will move to have all 1099s filed electronically.   The scope of activities will be significantly increased.

CIO - IT Manager Newsletter

- IRS Gearing up to Audit and Monitor 1099s and W9 for Independent Contractors


Chief Data Officer career path defined

Chief Data Officer more than a data expert, but also a seasoned enterprise manager

 The role is transformational, the CDO is responsible for the adoption of data technologies across the entire business. As with most senior executive titles, the responsibilities are set by the organization's board of directors or other authority, depending on the organization's legal structure. The CDO is responsible for user data experiences across the entire enterprise and its operations.

Chief Data Officer demand

Read on... Order Chief Data Officer Job Description

- Chief Data Officer career path defined


Security Management Team Job Descriptions

Information Security Management Team Job Descriptions

#computersecurityWho are the players and what roles do they exert?  We have reviewed management structure of over 100 world class security management teams and have identified the key players in those organization. Follow #computersecurity

Job descriptions included in the Security Management Team bundle are:

  • Chief Compliance Officer (CCO);
  • Chief Digital Officer;
  • Chief Mobility Officer;
  • Chief Security Officer (CSO);
  • Data Protection Officer (DPO);
  • Data Security Administrator;
  • Database Administrator;
  • Director e-Commerce;
  • Identity Management Protection Analyst
  • Information Security Analyst
  • Manager Data Security;
  • Manager Facilities and Equipment;
  • Manager Network & Computing
  • Manager Network Services
  • Manager Security and Workstations
  • Manager Training and Documentation
  • Manager Voice and Data Communication
  • Manager Wireless Systems
  • Network Security Analyst
  • System Administrator - Linux
  • System Administrator - Unix
  • System Administrator - Windows
  • VP Strategy and Architecture
  • Wi-Fi Administrator

Order Security Management Team Job Descriptions

 

- Security Management Team Job Descriptions


Security breaches are a CEO concern

Security BreachSecurity breaches are a CEO concern

Breaches have moved from the CIO or CISO to the CEO. All C-Level executives, Boards of Directors and other external bodies are now asking some pointed questions: What plans are in place to protect against an advanced attack or a data breach? What strategies are implemented for dealing with an incident if it does penetrate the security infrastructure?

CEOs and Boards have raised the discussion to calculating risk and building effective solutions to prepare for what many see as inevitable. The traditional perimeter-based protection strategies are no longer enough.

Read on Order Security Manual Template Download sample

- Security breaches are a CEO concern


IT Governance and service desk effectiveness

IT GovernanceThe right tool - IT Infrastructure Architecture for CIOs who want to create a world class IT function

The business operations environment has changed and IT Governance model needs to adapt to the remote work force.

An effective, efficient service desk is a critical component of any successful organization. By choosing a flexible, integrated solution that delivers secure, comprehensive incident management and request fulfillment, you can improve user productivity and satisfaction while reducing costs, ensuring compliance with SLAs, maximizing value and positioning IT as a strategic business partner within the larger organization.

Read On  Order IT Governance Infrastructure Strategy

- IT Governance and service desk effectiveness


WFH & Telecommuting environment prefered by many

WFH PolicyWFH & Telecommuting employees do not want to go back to the office

A survey of 3,500 US workers who have worked from home (WGH) found that 68% would choose remote working over working from an office.  This is a common refrain by white-collar workers who have enjoyed the freedom and flexibility of WFH during the pandemic.

Many employees are hesitant to return to the office. 61% of those surveyed said they would be willing to take a pay cut in exchange for being able to WFH permanently. Some even suggested they'd sacrifice up to 50% of their current wage to do so.

Order WFH & Telecommuting Policy  Download Selected Pages

- WFH & Telecommuting environment prefered by many


Employment picture continues to improve

State Unemployment continues to improve

The National unemployment data provides a measure of the health of the over-all labor market.   A more granular metric is one that considers local condition - i.e. state and local unemployment.  

High unemployment states - June 2021

Full Employment States - June 2021

- Employment picture continues to improve


CIO and CSO Post Pandemic Security Concerns

CIO and CSO Security Concerns With Increase with WFH and in the number of Cyberattacks

The top security management issues and metrics that we have found which address the security concern are:

  • The dollar amount and percentage of the operational budget allocated to incident detection. Fully 30% of all organization do not have any budget at all allocated to this.
  • Quality and availability of cyber-intelligence to use to monitor intrusions and minimize the number of false positives. We have found that on average organizations spend over $1,000,000 per year addressing false positives.
  • Work From Home security risks and exposure of sensitive data with proper control and monitoring
  • Availability and quality of a dedicated response team that can immediately address the incident and take remedial steps to stopping the further damage.
  • Availability and quality of additional staffing resources, both internal and external, to be able to "surge" to an incident as it is occurring. All of the budget in the world will not help if the CIO or CSO cannot get the right resources are not identified before the event occurs.
  • Ability to have visibility to incidents as they are occurring. The worst case scenario is one in which an incident occurs and is not discovered for some time magnifying the extent of the damage.
  • Lack of ability and resources to segregate suspicious traffic from normal activity. When this happens a company only know that an incident has occurred after it is made public by someone other than the IT or security team.

CIO and CSO Security Post Pandemic Security Issues

Read on Order Security Manual Template

- CIO and CSO Post Pandemic Security Concerns


Data Security - Top 10 Best Practices

Security Best Practices

Security Best PracticesThere are best practices that CIOs need to implement in order to protect a businesses' data:

  1. Understand who is accessing data via frequent auditing and real-time monitoring of data access
  2. Keep current records on data access permissions
  3. Classify data by sensitivity 
  4. Minimize and remove global access rights
  5. Identify data owners and users 
  6. Include data access reviews when individuals are transferred, promoted, or terminated 
  7. Align groups to data ownership and management
  8. Audit permissions and group changes 
  9. Lock down, delete or archive stale, unused data 
  10. Clean up security groupings

Order Security Manual Template Download sample

- Data Security - Top 10 Best Practices


Social Neworking Policy is missing in many companies

Electronic forms make implementing a Social Networking Policy easier

In Januay 2018 Facebook had over 2.2 billion active users, 90% of which are outside of the United States.  The scope of the user base with the large numbers outside of the US create significant exposure to enterprises and companies of all sizes and types.

A social netwoking policy along with rules for how employees an associates of firms interact with the Internet is now a core requirement.

There are several such templates for a Social Networking Policies.  One of the best, as reported by the American Productivity Society is the one published by Janco Associates.

Read on...

Order social networking Policy  Download Selected Pages 

- Social Neworking Policy is missing in many companies