Article

 States Redefine Nexus to Tackle Online Sales Taxes

June 20, 2016 

States Redefine Nexus to Tackle Online Sales Taxes

As the middle of the year approaches, it’s worth taking stock of remote sales tax. Numerous states have enacted or are considering legislation enabling them to collect sales and use tax revenue from remote retailers lacking a physical presence in the ...

Gail Cole

small business accounting 5 reasons 1  574b247b657a6

June 14, 2016 

Small Businesses Have Many Accounting Options

While the reviews included in this issue offer a good selection of both on-premise and cloud products that can work well for small to mid-sized businesses, there are other alternatives available to accountants and CPA’s that wish to offer bookkeeping ...

Mary Girsch-Bock

vertex logo detail 1  57437b0345b9a

June 13, 2016 

Vertex Indirect Tax O Series

Larger corporations with more complex needs may want to look into Vertex Indirect Tax from Vertex Inc. which offers a host of tax solutions including sales and use tax calculations, along with consumer use tax and VAT. Part of the O Series of ...

State Sales Taxes 2016 01 1  5743669b3b628

June 13, 2016 

2016 Reviews of Sales and Use Tax Systems

With the complicated rules, and the inordinate amount of time it would take today’s business owner to research and implement tax rates for cities, counties, states, and even countries, it’s imperative that today’s business owners invest in a software ...

Mary Girsch-Bock

SaaSMarketAdoptionSmall20160427 5743639172a16

June 10, 2016 

SMB Accounting – What’s Up With This Market?

Most of you who know me understand that I’ve had the privilege of having a long career in technology. The opportunities to help vendors build hardware products, as well as networking, productivity, accounting and document management software have been som

Randy Johnston

phising whaling 1  57437d040affd

June 9, 2016 

Scammers Move From Phish to Whales

Whaling is a form of phishing attack where senior executives and others with access to valuable and sensitive data are sent very personal and well researched emails. The attacker may send the target an email that appears to be from someone they ...

Jim Boomer