Accounting for Net Charge Offs

Accounting for Net Charge OffsWhen it comes it understanding a net charge-off (NCO), it’s the difference between any recovery of delinquent debt and gross charge-offs a business sees in a defined accounting time frame. NCOs are debts a company projects with a low likelihood of being collected. It can happen when a customer stops paying outstanding invoices or sees a decline in their credit rating.  

The first step considers it as a gross charge-off; if any amount is recovered, it’s subtracted to arrive at net charge-offs. If businesses can recover a percentage of what’s been charged off, the recovered monies can be net against the gross charge-offs to realize net charge-offs. A business’ loan loss provision is lowered by the net charge-off amount at the end of the accounting time frame and then refilled for the next accounting time frame based on new estimates for loan losses. This is part of a business’ provision for credit losses (PCL) that projects a certain percentage of accounts unable to be collected.

Accounting in Detail

The following formula calculates net charge-offs (NCO). This assumes a gross charge-off booking of 6 percent of all outstanding loans, with 1 percent ultimately being recovered during a particular accounting time frame.

Net Charge-Offs = Gross Charge-Offs – Amount of Recovered Debt

= 6 percent – 1 percent = 5 percent

Once the figure is calculated, the 1 percent collected adjusts the loan loss provision in the accounting statements.

Financial Institutions Illustrate Accounting Considerations

Banks’ business models and financials demonstrate their ability to pay their depositors competitive interest rates while also being able to make loans. Since banks earn profits via net interest margin, earning a spread between what banks pay depositors on interest rates and what borrowers are charged on loans, the spread is integral to measuring profitability. To generate the total value of a bank’s balance sheet, it’s imperative for banks to estimate and project their charge-offs as accurately as possible.

Financial institutions determine credit loss provisions by analyzing their balance sheets and the level of risk represented by outstanding loans. They look at the ratio of loan losses to overall losses, which is their net charge-off rate. The net charge-off rate is used to evaluate a loan’s book quality against other banks.

How Different Risks Impact Net Charge-Off Levels

Banks that have different loan mixes will see different risk and reward payoffs. If one bank offers primarily secured loans, while it may have lower net interest margins, it will also have lower charge-offs because the collateral backing them is less risky overall. This is compared to other lenders that have a higher level of unsecured loans, such as credit cards and commercial loans. This scenario, in the case of riskier loans, may result in higher net interest margins, but also greater potential for higher losses.

Journal Entry Examples

The following journal entries illustrate how to account for bad debts. Using the direct write-off method, when debt collection efforts have been exhausted, bad debts are recorded as follows:

Expenses for bad debt: Debit $750

Accounts Receivable: Credit $750

If, however, the business recovers anything from the customer’s outstanding invoices, the following journal entries would be added if $200 were received:

Cash: Debit $200

Accounts Receivable: Credit $200

Conclusion

While this is primarily for early-stage companies with a low percentage of credit sales, it illustrates how businesses can update their books when projecting their numbers to account for net charge-offs.

What Seniors Actually Got in the Latest Tax Bill

What Seniors Actually Got in the Latest Tax Bill, SS CreditCampaign messaging would have you believe retirees just scored a major victory. The talking point is everywhere: Social Security benefits are now tax-free. But anyone who reads the One Big Beautiful Bill Act will discover something different. The legislation contains nothing that removes Social Security from federal taxation. Zero provisions. The tax structure that has applied to benefits for over four decades remains fully intact.

So, what did pass? A new deduction aimed at older Americans. And through some rhetorical gymnastics, that deduction is being sold as something it fundamentally is not.

A Deduction Is Not an Exemption

The OBBBA creates an additional deduction exclusively for seniors. Single filers get $6,000 while married couples receive $12,000. This stacks on top of what they already claim through the standard deduction, lowering their overall taxable income.

For retirees whose financial situation falls in a particular range, this extra write-off might be enough to cancel out whatever portion of their Social Security would normally face taxation. But here’s the catch: the deduction applies to all income equally. It doesn’t single out retirement benefits for protection. If your earnings came entirely from investments or a workplace pension, the math would work identically.

Decades of Unchanged Rules

Federal taxation of Social Security benefits dates back to 1983. President Reagan signed that change with support from both parties, making up to half of benefits taxable for seniors with higher earnings. Then in 1993, Congress and President Clinton pushed the ceiling higher. Under current rules, as much as 85 percent of benefits can count toward taxable income for upper-income retirees.

None of that changed with this bill.

The thresholds determining who pays what have remained frozen since the Clinton era. Single filers earning under $25,000 and couples under $32,000 owe nothing on their benefits. Those in the middle tier face taxes on up to half. And couples bringing in more than $44,000 can see 85 percent of their Social Security added to their taxable total.

Because these cutoffs have never adjusted for inflation, more retirees get pulled into taxable categories every single year. The OBBBA leaves this problem completely unaddressed.

Looking at the Administration’s Own Math

Treasury Department calculations highlighted by the White House reveal how limited the benefit truly is. Picture a single retiree receiving $40,000 annually from Social Security alongside another $40,000 from retirement accounts like an IRA or 401(k). Current law would put their 2026 tax bill at $7,190. Under the new legislation, the amount drops to $5,685, a reduction of roughly $1,500. The senior deduction accounts for approximately $900 of those savings.

Helpful? Sure. But this person still owes thousands in federal taxes. Their Social Security benefits remain part of the calculation. The deduction simply chips away at overall liability without treating retirement benefits any differently than other income sources.

Temporary Relief with Built-In Limits

Unlike corporate tax provisions and cuts benefiting wealthy taxpayers, which received permanent status in the bill, the senior deduction disappears after 2028. It was written with an expiration date from the start.

Income limits further narrow who benefits. Single filers with earnings above $75,000 and married couples exceeding $150,000 see the deduction phase-out entirely. Ironically, these higher-earning retirees facing the steepest Social Security taxation are exactly the ones shut out from this supposed fix.

Conclusion and Why This Framing Succeeds

Announcing a supplemental deduction for older taxpayers generates little excitement. Declaring that Social Security taxation has ended makes waves. Political strategists understand that most people absorb information through headlines rather than legislative analysis. Few voters examine IRS guidance or compare statutory language.

The outcome is clever stagecraft masquerading as meaningful reform. Benefits remain taxable under the same formulas established decades ago. Inflation continues to drag more retirees across taxation thresholds, and this temporary, income-restricted deduction is merely wrapped in revolutionary packaging.

The New Face of Phishing: Techniques, Targets and Prevention

Phishing Attacks Phishing is a major threat that keeps evolving and has now become a sophisticated and costly cyber risk facing businesses of all sizes. Previously linked to malicious links in an email, phishing is now powered by AI, automation, and social engineering. The attacks have become harder to detect; they are faster to execute; and they can be very damaging if successful. With many business processes happening online – such as payments, approvals, and customer engagement – the attack surface has expanded, and so has the creativity of cybercriminals.

The Changing Landscape of Phishing

Modern phishing is unlike the previous suspicious and poorly written emails, and today cybercriminals are using AI tools to do many things, including:

  • Generate perfectly written and personalized messages – attackers can now easily analyze company websites, social media profiles, public reports, and employee profiles to clone the tone, style, and communication patterns. Messages appear legitimate when they reference recent projects or internal updates.
  • Generate deepfake audio and video – with readily available AI voice-cloning tools, a scammer can easily impersonate CEOs or CFOs and request urgent wire transfers or credential access.
  • Bypass MFA using real-time phishing kits – these kits mirror login screens of popular business tools such as Microsoft 365 or Google Workspace. An employee enters credentials and authentication codes into the fake page, giving attackers instant access.
  • Launch automated hyper-targeted attacks – with automation, criminals can target specific departments using tailored messages relevant to their daily tasks.

High-Value Targets Inside Organizations

Phishing attacks are no longer random but very strategic:

  • C-Suite executives – executives are prime targets due to their authority and access levels. If an executive is compromised, their inbox can be used to authorize payments or request sensitive data.
  • Financial teams – the accounts department faces fake invoice scams, fraudulent banking instructions, and impersonated vendor messages.
  • HR departments – attackers send fake resumes loaded with malware. They might also pose as job applicants to access employee data.
  • Remote and hybrid workers – these workers use shared Wi-Fi, personal devices, and unsupervised collaboration tools. This creates a wider entry point for attackers.
  • Customers and partners – attackers impersonate brands and trick customers into submitting payments or sensitive information through fake lookalike pages.
  • IT admins and system engineers are also valuable as they have privileged access.

Modern Phishing Techniques

Emails remain the dominant delivery method, but attackers have diversified to:

  • Quishing (QR Code Phishing)
    QR codes are everywhere: on flyers, delivery packages, restaurant menus, conference badge,s and more. However, QR codes can lead to malicious sites or credential harvesting pages.
  • Search Engine Phishing or Malvertising
    Fake ads appear above legitimate brands on search results that a user can click on –thinking it’s a legitimate link.
  • Browser-in-the-Browser Attacks
    These are fake login pop-ups that replicate trusted login screens. An employee will enter their credentials, thinking it’s a legitimate site, and this goes straight to attackers.
  • OAuth Application Scams
    Here, attackers don’t steal passwords. Instead, they trick users into granting access to a malicious app. Once the access is granted, the attacker has total access.
  • Deepfake Calls and Video Messages
    These may come as high-pressure video calls or messages from an executive requesting urgent action, emergency payment, or private documents.
  • Fake Travel and Expense Scams
    Taking advantage of corporate travel, attackers clone legit travel sites in order to steal credit card and employee information.

Prevention Strategies Every Business Must Adopt

Phishing is a problem that can’t be eliminated but can only be significantly reduced through a combination of technical measures and human risk management.

Prevention requires a combination of technology, processes, and people.

  1. Build a Security-Aware Culture
    Training must be continuous, engaging, and realistic. It should be conducted via simulation and scenario-based learning.
  2. Strengthen Email Authentication
    Implement modern AI-based email filtering tools to help detect anomalies that human eyes miss. Include identity verification protocols like DMARC, SPF, and DKIM to reduce spoofing attacks.
  3. Adopt Zero Trust Security
    Implement the “never trust, always verify” approach. Access should be limited, monitored, and timed out automatically. High-risk actions should trigger additional verification.
  4. Secure Remote Work
    Implement VPNs, approved devices, endpoint protection, encrypted storage, and clear policies.
  5. Implement Multistep Verification for Financial Transactions
    Require verbal confirmation or dual approvals for high-value transfers.
  6. Monitor Vendors and Partners
    Keep in mind, there is a sharp rise in supply-chain attacks. Regularly verify domains, emails, and communication from suppliers and partners.
  7. Have an Incident Response Plan
    Be ready with a response plan in case of a breach. Acting quickly will reduce potential losses.

Conclusion

Phishing has transitioned into a sophisticated threat targeting the core operations of a business. New phishing variants reveal how attackers continually evolve their techniques. With the right awareness, technology, and processes, organizations can significantly reduce exposure.