Need New Technology? Calculate Your End-of-Year Section 179 Deduction for 2020

Time is running out to leverage the Section 179 deduction for this year…

Section 179 of the federal tax code allows businesses to deduct the full purchase or lease price of new technology the first tax year – up to $1,040,000.

Yes, this deduction applies to both leased and purchased equipment. When you buy or lease, you can deduct the full amount on your taxes. When you lease, you pay the monthly lease payments and you still get to deduct the full purchase price on your taxes.

Whether you choose to purchase or lease, you’ll need to put the equipment/software into service by the end of the day December 31, 2020.

Follow this link for more information about Section 179, which includes a savings calculator. Click here.

Then reach out to TCI to discuss new solutions that can help your business get ahead. Contact us today at (703) 321-3030 or info@tcicomm.com.

 

Stay Vigilant… 5 Techniques Bad Guys are Using to Breach Your IT

While we all know security is important, sometimes day-to-day operations overwhelm our good intentions to keep up with fast-moving technology threats. Staying safe means being continually aware and taking precautions against the more common techniques bad guys are using to breach businesses every day:

1. Spoofing – Email spoofing is when the sender address is forged to make it appear that their email comes from a trusted source, such as your bank. The email can send you to a bogus website where your account details can be stolen. Or it appears to come from inside your own organization, asking you to change your password or confirm your details.

2. Phishing – Often posing as a request for data from a trusted source, this attack is launched via email and asks users to click on a link. Over time, phishing has evolved to include Spear Phishing (targeted attempts highly personalized for a specific individual) and Whaling (phishing scams that target high-profile users and decision makers).

3. Hijacking – This attack changes a computer’s settings to either ignore DNS or use a DNS server that is controlled by malicious hackers. The attackers then redirect communication to fraudulent sites. Website hijacking is commonly used to redirect users to fake login pages for banks and other online services in order to steal their login credentials. It can also be used to redirect security sites to non-existent servers to prevent affected users from updating their security software.

4. Malware Insertion – This refers to a variety of cyber threats including Trojans, viruses and worms which typically steal data or destroy key computer functions; usually introduced through email attachments, website visits, software downloads, or operating system vulnerabilities.

5. Ransomware – This is a specific type of malware that requires some sort of ransom payment to either remove it or to retrieve files that had been encrypted. Ransomware has been around for a long time, but it made news in recent years when payments started to be demanded in Bitcoin, making this activity virtually risk-free for cyber criminals.

IT security is a big challenge. TCI security experts can help keep your business safe. Contact us today at (703) 321-3030 or info@tcicomm.com.

 

Wi-Fi as a Service Offers Faster Broadband Connections & Simplifies IT

Wireless Made Easy… From growing offices to large corporate enterprises, TCI designs, implements and maintains the wireless networks that keep local businesses connected and running strong. Our expertise includes:

  • Wireless site surveys
  • Wireless coverage testing
  • Access point cabling
  • Wireless security
  • Wireless network management

TCI’s Managed Wi-Fi Service… Simplify and speed up your day-to-day operations. Our Managed Wi-Fi puts intuitive yet powerful tools in the hands of your network administrators:

  • Add wireless capacity in minutes with fully automatic provisioning
  • Manage complex, dynamic environments using Auto RF
  • Throttle bandwidth and block unauthorized applications
  • Streamline device onboarding with built-in Mobile Device Management

Wi-Fi 6 Support… TCI supports enterprise-class Wi-Fi 6 (802.11ax) access points to solve density and throughput challenges. With up to 8 transmit and 8 receive antennas, your applications will always operate at peak performance. In addition to 2.4 GHz and 5 GHz radios, many APs offer a dedicated security radio that:

  • Continuously scans and protects against security threats
  • Senses the RF environment and adapts to interference
  • Automatically configures RF settings to maximize performance

Whatever your environment and business goals, TCI can design, deploy and support a cloud managed wireless solution for you.

Our certified infrastructure experts will ensure your mobile workforce has access to the technology they need to stay productive… Contact TCI today at (703) 321-3030 or info@tcicomm.com.

 

The ABCs of Successful Remote Work – “Always Be Communicating”

Remote working can be tough if you haven’t done it before – especially when many people have had to embrace our new reality whether they like it or not. Fortunately, the transition is easier for everyone when processes and systems are in place to keep lines of communication open.

If you don’t share information and give team members visibility over what you’re working on, important files disappear, deadlines get missed, productivity collapses, and projects are scrapped.

  • Use Collaboration Tools – You need to make it as easy as possible to communicate with other members of the team. Email is the most common means to communicate easily, but it is not always the best platform, especially for conversations about ongoing matters or real-time progress updates. Collaboration tools like MiTeam Collaboration Software or Teamwork provide an instant messaging approach to team communication. Ideas, suggestions, feedback, and comments can be pinged back and forth between the team easily, regardless of where they are and what device they’re using. It’s a simple, easy, and fast way to keep everyone in the loop.
  • Centralize your files – Once you’ve ensured your lines of communication are firmly open, you then need to make sure all your files are centralized. This allows relevant parties to access key documents, even when you’re not present. The easiest way to store documents centrally is to use cloud apps such as Dropbox or Google Drive. If you can work and organize in the cloud, then your ability to perform together effectively as a team is greatly improved.
  • Document your processes – You can’t achieve success without having documented processes to follow. Laying out your standard operating procedures in black and white not only gives you a consistent approach to your regular tasks, but it narrows any mistakes made down to two causes: the workflow wasn’t followed or your process needs updating. Achieving effective communication is done through a process of trial and error built upon identifying pain points. Each time you try something new, you create a new process and fine-tune that process until you’re happy with it.

When everyone has a shared sense of how to update one another – and by implementing the right software solutions to achieve this end – you will improve work practices across the organization and see dramatic results.

Need help getting the most out of your remote work initiatives? Contact TCI today at (703) 321-3030 or info@tcicomm.com.