Act now

Buy new hardware by December 31 & enjoy this little-known business tax relief
Executive summary:
Hidden government benefit: There’s a little known tax relief called Section 179. Where you can write off the entire spend on new IT hardware in this tax year (rather than depreciate over a few years)
The clause: To qualify you must make the purchase and put it into service by the end of the day on December 31.
The urgency: Hardware supplies can be unreliable at this time of year. The earlier you order, the less risk of missing out on your benefit.

Have you heard of Section 179?

It’s part of the IRS tax code that’s aimed at helping small businesses, just like yours.

When you buy new equipment or some software you can deduct the full purchase price from your gross income this year, rather than depreciate it over a few years.

It was designed to encourage you to invest in your business. And it’s a generous relief… you can write off up to $1,160,000 in this tax year.

There’s a comprehensive guide with illustrations, and information you can run by your CPA here.

< May 2024 >
MondayTuesdayWednesdayThursdayFridaySaturdaySunday
    1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31    

If you want new computers, technology, or software, you need to act TODAY

The one clause is that you must have purchased the equipment or software and put it into service by the end of the day on December 31.

Hardware supplies can be unreliable at this time of year. The earlier you order, the less risk of missing out on your benefit.

You really should invest now in anything you think you’ll need in 2024.

This is serious! It needs urgent action if you want new technology in time to benefit from the tax relief.

I have a team on standby to help you

Unlike most IT support companies, we know all about Section 179, and how important it is to act now. We’ve been getting ready for this for months. Here’s how to talk to us.

Dropsuite:

Dropsuite is a cloud software platform enabling businesses and organizations globally to easily backup, recover and protect their important business information including emails, contacts, calendars and OneDrive/Sharepoint files. Compliant email backup and archive system with a 10-year retention policy.

Vade Secure:

Vade Secure is an AI-based email security solution to improve security for Office 365 and block advanced phishing, spear phishing, and advanced malware threats. Vade Secure analyzes emails, webpages, attachments, and images with machine learning and deep learning algorithms that are trained to detect behaviors and anomalies common to advanced email threats.

Office Protect:

Office Protect is a service that’s designed to help you secure your Microsoft 365 tenant. Using our powerful in-house security software, our analysts actively monitor for threats, investigate alerts, eliminate false positives, and provide guided response and remediation. Protects against account break-ins, data exfiltration, business email compromise, phishing, internal threats, lateral movement, ransomware, and attacks by nation states.

Dark Cubed:

Dark Cubed focuses on real-time monitoring, threat intelligence, predictive analytics, elegant dashboard, streamlined workflow, executive reporting and active blocking. This is another layer of security that integrates with the firewall.

ThreatLocker:

ThreatLocker is a zero-trust endpoint security tool giving companies control over what software can run, by whom, and what data can be accessed.

It keeps a full detailed audit of what applications are used and data accessed/transferred/deleted and by what users (signature tracking, etc.) If something unusual happens, such as a signature change, or a user opens an application that is out of their normal routine the administrator is alerted. This is a crucial tool in identifying malware threats, as well as helping organizations identify if users are accessing applications and/or data/ files they should not be.

ThreatLocker provides a solution that allows businesses to control the content that runs on their network. Unlike AntiVirus software ThreatLocker is not looking for known viruses or malware. ThreatLocker uses a complex set of rules to determine what can be executed on a network and stops anything that has not been approved before it can even execute.

Huntress:

Huntress is a supplement to SentinelOne. Hackers are becoming more sophisticated, and Huntress actively seeks out these threat actors with a "defend forward" mentality. This software combines both advanced security tools along with human intervention to ensure even the most advanced hackers can't penetrate your network.

SentinelOne:

SentinelOne is a comprehensive enterprise security platform that provides threat detection, hunting, and response features that enable organizations to discover vulnerabilities and protect IT operations. SentinelOne integrates static artificial intelligence (AI) to provide real-time endpoint protection and reduce false positives that derail investigations or make threat detection a capital-intensive process. This will replace Webroot in your current environment.