Category: News & Announcements

How To Avoid Receiving A CP2100 or CP2100A Notice From The IRS

In April, the IRS sent CP2100 and CP2100A notices to banks, credit unions, businesses or payers who filed returns that don't match IRS records. These information returns include: Form 1099-B, Proceeds from Broker and Barter Exchange Transactions Form 1099-DIV, Dividends and Distributions Form 1099-G, Certain Government Payments Form 1099-INT, Interest Income Form 1099-K, Payment Card and Third-Party Network Transactions Form 1099-MISC, Miscellaneous Income Form 1099-NEC, Nonemployee Co…

What You Need To Know About The 1099K For 2022

A 1099-K is a transaction record from third-party payment networks such as PayPal or Venmo and credit card providers. They fill out the 1099-K and send copies to the IRS, state and person receiving the payments. The objective is to ensure people report their business income on their tax returns. An entities are required to file and send a 1099-K if it transfers at least $600 to you during the year. The $600 threshold is an aggregate, meaning that even if different people send you small amount…

1099-G: How To Help If An Employee Has Fallen Victim To A Fraudulent Unemployment Claim

The 1099-G form is used by government agencies to report payments made to businesses or individuals to the Internal Revenue Service (IRS). This does not include wages. The most common use is to report unemployment compensation or tax refunds. Have You Fallen Victim To A Fraudulent Unemployment Claim? Things to look for: While you were still employed your employer notifies you that they received a request for information about an unemployment claim in your name. A government agency mailed…

Aatrix Has You Covered: What To Do If You Receive A Notice From A Federal Or State Agency

As we work our way through the first quarterly filing period of 2022, most of us hope we don’t get a surprise from the Federal or State agencies we work with in the form of an official notice. If you do happen to get a notice from one of the many agencies you work with, Aatrix is here to help with any filing issue you encounter after eFiling using the Aatrix eFile Center.

What You Need To Know About Filing Your 2021 EEO-1, Component 1 Data

Employers with 100 or more employees, federal contractors with 50 or more employees, and a limited number of additional employers detailed on the EEOC website are required to file an EEO-1. The 2021 EEO-1 Component 1 data collection is tentatively scheduled to open on Tuesday, April 12, 2022. The tentative deadline to file the 2021 EEO-1 Component 1 Report is Tuesday, May 17, 2022.

Important State and Federal Withholding, Dependent Care, HSA, And Other Changes For 2022

While We Don’t Know All The Changes That We’ll See To Payroll in 2022 - Here Is What We Know So Far! Changes already released this year include: State Unemployment Wage Bases; Social Security Wage Base; Medicare Tax; Dependent Care Limits; Limits To Health Savings Accounts & Health Flexible Spending Accounts; IRA and 401K Contribution Limits; Updated Federal Standard Mileage Rate.

What You Need To Know About Paying Employees Using Cryptocurrency

Employers interested in offering wage payments in cryptocurrency should be aware of and comply with applicable withholding, wage and hour, and wage payment requirements at the Federal and State levels. Although employers can not currently pay employee’s base salaries, hourly pay, and overtime pay in the U.S. they may offer bonuses or incentive payments in cryptocurrency. Additionally, employers can use a third-party cryptocurrency payment processing company (e.g., Bitpay) or conversion service r…

Log4J Zero-Day Vulnerability

Log4J Zero-Day Vulnerability On Friday, December 10, 2021, the world found out about vulnerability CVE-2021-44228 in the Log4J Java component. That component is commonly installed on Web servers and Java application-based systems and servers to log or write system messages and other messages to the computer. This particular vulnerability has been rated a 10.0 out of 10.0 regarding the dangerous abilities that this vulnerability poses to computer systems and its ease of being exploited.