Understanding the Equity Multiplier

What is Equity MultiplierWhether you are an investor, an owner, or an internal financial analyst, understanding how the equity multiplier works and how to interpret it is a helpful skill.

Defining the Equity Multiplier

The equity multiplier is a metric that tells the user what percentage of the company’s assets are loaned against shareholders’ equity. The smaller the calculated number for the equity multiplier, the less risky the financing is due to less debt owed by the company. It’s more favorable since there are lower debt servicing costs needed. When liabilities and/or assets change, the company’s equity multiplier changes.

Conversely, the bigger the equity multiplier, the more likely investors will be exposed to financial risk. This is due to the company having more outstanding debt, requiring more cash flows to service ongoing debt repayment, along with normal operations. A good rule of thumb is that anything lower than 2 is good, while anything higher than 2 signifies risk.

Putting It into Context

Since companies obtain financing through a mix of equity, debt, or both, it’s important to measure and monitor how the combination changes over time. Since investors look at the metric, among other financial yardsticks, it can influence how they determine if a company is worth investing in. Investors compare one company to others in the same industry and against historical measures to see how the company rates financially. The equity multiplier is measured relative to past measures, industry standards, or its sector competitors.

The ratio is calculated as follows:

Equity Multiplier = Total Assets / Total Shareholders’ Equity

Both input values are found on the company’s balance sheet, either on the quarterly or annual reports filed with the United States Securities and Exchange Commission.

If a company wants to go public, it can calculate this ratio to determine if its present results are robust for lenders’ review. Say a company has $2 million in total assets and $1.25 million in shareholders’ equity. Based on these numbers, it’s calculated as follows:

= $2,000,000 / $1,250,000 = 1.6  

The equity multiplier in this scenario, which shows a moderate amount of borrowing, may or may not pose an issue for the company’s financial health.

If a business’ total assets are $450 billion, and shareholders’ equity, according to the financial statements, was $150 billion, the company’s ratio is 3X ($450 / $150).

If a different company’s assets are $825 billion with $165 billion of shareholders’ equity, the same resulting ratio is 5X ($825 / $165).

These calculations show that as the ratio of liabilities and asset values adjusts, the equity multiplier also changes because a company uses less debt and more shareholders’ equity to finance the assets. While higher equity multipliers can help companies grow faster, especially during low interest rate and high-growth environments, if borrowing costs rise and/or sales fall dramatically, it can forecast negative growth. Investors favor businesses with low equity multipliers since this indicates the company is using more equity and less debt to finance the purchase of assets.

Regardless of the company or the industry, understanding how the ratio is calculated and used in making investment decisions makes sense for both companies and their potential investors.

Reclaiming the Rent: Why 2026 is the Year Businesses Switch from SaaS to Sovereign Ownership

Businesses Switch from SaaS to Sovereign OwnershipEvery modern business is paying rent. Not for office space or equipment, but for the digital infrastructure that runs the company. This might include the cost of CRMs, email platforms, project management tools, automation tools, analytical dashboards, and countless other tools designed to solve a specific business need. Individually, these tools seem affordable; collectively, they form a permanent tax on business growth.

For several years now, software-as-a-service (SaaS) has been sold as a form of freedom. Businesses were promised low upfront cost, instant deployment, and minimal complexity. For a long time, SaaS delivered on this promise. It helped companies move faster, scale quickl,y and compete globally regardless of size.

But this is shifting. Now, business leaders are beginning to question whether renting critical systems is still a worthy strategy.

The SaaS Era

The rise of SaaS was a necessary evolution. It lowered the entry barrier for tools that once required large IT teams and a huge capital investment.

However, this convenience turned into dependency. Businesses not only adapted SaaS tools, but they also built operations around them. Third-party platforms now hold business workflows, customer data, analytics, automations, and even institutional knowledge. This means that a business has dozens of subscriptions they don’t fully control, can’t meaningfully customize, and must keep paying for to keep operating.

What Sovereign Ownership Means

Sovereign ownership doesn’t mean abandoning the cloud or rejecting modern technology; it means owning the core logic of your business systems. The sovereign models emphasize self-management, control and long-term resilience.

When a business practices sovereign ownership, it controls:

  • Where data resides (e.g., virtual private clouds or sovereign clouds)
  • Access permissions and encryption keys
  • Workflows and automations
  • Internal knowledge systems
  • AI models and training data
  • The ability to move, adapt, or rebuild without needing vendor permission

Self-sovereign identity has been a great support for this shift. SSI protocols allow businesses, employees, and customers to control their digital identities and credentials without relying on centralized identity providers. This means that identity is not locked inside the SaaS platform, as it is portable, verifiable, and owned by the entity itself.

The Real Cost of SaaS Goes Beyond the Invoice

SaaS costs more than renting the service. Aside from monthly or annual subscriptions that compound into a huge expense over time, vendor lock-in makes switching platforms painful and risky. The pricing models also keep changing. Features may be removed or placed under higher payment tiers. Other issues include broken integrations and limited or messy data exports.

More critically, companies adapt their workflows to match the SaaS tools, rather than the tool serving the business. Therefore, innovation is constrained by what the platform allows and not what the business needs.

The biggest risk is when a SaaS provider is acquired, suffers downtime, or shuts down entirely. When this happens, your business absorbs the impact without control or leverage.

Why 2026 Is the Turning Point

Why now? Because the alternatives have finally matured. Decentralized physical infrastructure (DePIN), the maturity of enterprise-grade, open-source software, and modular cloud architecture have made system ownership accessible without deep technical teams. AI has transformed how businesses build, automate, and maintain internal tools. Modular infrastructure allows companies to own their core while selectively renting specialized services.

At the same time, external pressure is increasing as data privacy regulations tighten. Regulatory frameworks like the U.S. Cloud Act, the GDRP and the EU’s Digital Operational Resilience Act (DORA) demand operational independence that SaaS cannot fully deliver. Gartner predicts that by 2030, 75 percent of enterprises outside of the United States will implement data sovereignty strategies due to regulatory scrutiny and geopolitical tensions.

Major players are already responding. IBM is one example of the shift, as they already announced IBM Sovereign Core, software that helps businesses take back control of their data and systems.

Customers are also more aware. They want to know how their data is stored, processed, and protected. AI models trained on proprietary information raise new questions of ownership and risk. In an uncertain global economy, businesses want cost predictability and not endless variable subscriptions.

The mindset is shifting from speed at any cost to resilience by design.

From Renters to Owners

SaaS helped businesses grow. But growth built on dependency has limits.

2026 represents a strategic window where ownership is finally accessible, affordable, and necessary. The shift toward sovereign systems is not about rebellion against technology that has previously helped businesses. It’s about leverage, resilience, and long-term value.

The future belongs to businesses that stop renting their foundations and start owning their future.

Completing FY2026 Budget Appropriations, Protecting Trafficked Victims, and Vetoing Special Interest Projects

HR 6938Commerce, Justice, Science; Energy and Water Development; and Interior and Environment Appropriations Act, 2026 (HR 6938) – This Act is one of the remaining budget bills to fund the government through Sept. 30, 2026. It includes funding for several agencies, including the Department of Commerce, the Department of Justice, the U.S. Army Corps of Engineers, the Department of Energy, and the Environmental Protection Agency. The bill was introduced by Rep. Tom Cole (R-OK) on Jan. 6. It passed in the House on Jan. 8, the Senate on Jan. 15, and was signed into law on Jan. 23.

Financial Services and General Government and National Security, Department of State, and Related Programs Appropriations Act, 2026 (HR 7006) – This Act was introduced by Rep. Tom Cole (R-OK) on Jan. 12. Yet another fiscal year 2026 budget bill, it authorizes investments to support economic growth and entrepreneurship, safeguard American security and authorize funding for the Executive and Judicial branches. The bill passed in the House on Jan. 14 and is awaiting passage in the Senate.

Trafficking Survivors Relief Act (HR 4323) – The purpose of this bipartisan bill is to help stop a vicious cycle that makes human trafficking victims vulnerable to further exploitation. The Act enables survivors to file motions to vacate non-violent convictions and purge arrest records for certain criminal offenses committed as a direct result of being trafficked. The current iteration of the bill was introduced by Rep. Russell Fry (R-SC) on July 19, 2025. It cleared the House on Dec. 1, the Senate on Dec. 18, and was signed into law on Jan. 23.

Finish the Arkansas Valley Conduit Act (HR 131) – Introduced by Rep. Lauren Boebert (R-CO) on January 3, 2025, this bill is related to a Colorado water infrastructure pipeline currently under construction, designed to port clean water from the Pueblo Reservoir to 50,000 Coloradans in the local area. The bill would have extended the repayment period for local municipalities and removed interest payments. The bill passed in the House on July 21 and in the Senate on Dec. 16; it was vetoed by the President on Dec. 31, 2025.

Miccosukee Reserved Area Amendments Act (HR 504) – This bill would have authorized the expansion of the Miccosukee Reserved Area to include a portion of Everglades National Park in Florida. In recent years, the area, known as Osceola Camp, has been prone to flooding, and this bill would have authorized safeguard measures to protect structures within the camp. The bill was introduced on Jan. 16, 2025, by Rep. Carlos Gimenez (R-FL). It passed in the House on July 14 and in the Senate on Dec. 11, 2025. The bill was vetoed by the President on Dec. 30 and failed an override vote in the House on Jan. 8.

Whole Milk for Healthy Kids Act of 2025 (S 222) – This Act amends the existing National School Lunch Act to allow schools participating in the federal school lunch program to serve whole milk. It was introduced by Sen. Roger Marshall (R-KS) on Jan. 23, 2025, passed the Senate on Nov. 20, the House on Dec. 15 and was signed into law by the President on Jan. 14.

Scam-Proof Guidelines for Wiring Money

Scam-Proof Guidelines for Wiring MoneyWiring money is like sending cash: Once you’ve sent it, it’s gone. It is very difficult to retrieve – in fact, more difficult than recovering physical dollar bills.

For businesses, always call the recipient to verify ACH details before sending; this is required by law in 50 states. This law does not require calling, but if the sender’s or recipient’s email is hacked, calling will help prevent the hacker from changing ACH details in a hacked email account.

If wire fraud takes place due to a security breach, such as a hacker infiltrating your account and initiating a wire transfer, you may have protection. Reputable financial institutions will generally cover your losses in the case of a cyber attack. Recoverability is dependent, however, on whether the wire was properly authorized or unauthorized and the payment type (wire vs. ACH).  However, if you fall for a scam and initiate the wire transfer yourself, you’re probably out of luck.

Another scenario is having an incorrect address or account number in your wire transfer instructions. For example, say you want to send a large sum of money to your lender to pay off your mortgage. It’s a good idea to contact the institution directly (by phone or in person) and ask them to tell you where to send your wire transfer to match it with the printed instructions you may have received. Always proofread the wire transfer instructions carefully.

Should you accidentally transpose the numbers in a wire transfer, you could lose that money. If you contact your bank immediately to report the error, they may be able to recall the funds. However, if the recipient has already accepted the transfer, particularly if they have transferred the money elsewhere, it is almost impossible to recover.

Remember, wire transfers settle quickly and are typically irreversible once accepted. That is why they are one of the prime targets for cybercriminals. If you are unfamiliar with the person or institution where you are wiring money, research them first to confirm their identity and see if there are any complaints or red flags associated with the entity. If you had no reason to initiate the wire transfer before being contacted, you should be especially suspicious.  Be extremely skeptical of unsolicited urgent requests, especially when instructions change, or you can’t verify independently

The following are some common scams perpetuated today.

Bank Fraud

Your bank or investment firm calls you directly to alert you to a possible scam; someone is attempting to hack into your account and steal your money. They may even verify your account with details they have obtained – such as your name, address, and perhaps even your Social Security and account numbers. Rather than an affirmation of their legitimacy, this should be a red flag. First of all, no legitimate financial institution or government agency would relay this information over the phone. Second, a fraudster may tell you the best way to block the potential hack is to open a new account and transfer your money there. This is a red flag. Third, the scammer may insist that time is of the essence – you must act immediately before your money is stolen.

If you get a call like this, hang up and either call (the number on your statement or debit/credit card) or visit your local bank branch to inquire about the call. Chances are good that the bank will confirm there is no breach and that your account is safe.

Dating Apps

Dating apps are the 21st-century version of blind dates. According to Statista, more than 60 million Americans used dating apps in 2024. Instead of meeting organically in a bar or at a party, users peruse dating profiles to find a prospective mate. Unfortunately, these platforms are rife with money-seeking predators – and they can be very patient.

Many online relationship predators interact for months before the scammer mentions that he or she is having money trouble. They may even wait for their paramour to offer money to help them out. Remember that the red flags apply – you didn’t initiate the need. The need for funds should never be immediate. You should research and verify the legitimacy of any person who would agree to accept money from someone they met online. Remember, once you send money, you may never hear from that person again. Or they may continue to interact, but you could get another request for funds a little further down the road.

One way to detect a dating app fraudster is by noticing clues that they are not who they claim to be. For example, many scammers live in other countries. They may not be familiar with common local interests in the town or city where they say they are from. Or, you may notice unusual grammar or phrasing in their communications, indicating English is not their native language.

The Friend or Relative Scam

One of the most heart-rending scams is when a person – often a senior citizen – is asked by a struggling friend or family member to send money. For example, a grandchild away at college who says she doesn’t want her parents to know she needs money. Pulling at the heartstrings, paired with aging cognitive decline, is a recipe for wire transfer fraud. It’s a good idea to establish a “family password” with which to verify proof of identity for suspicious scenarios. Also, call the family member or friend back at a known number for verification before sending money.

Investment Scam

The too-good-to-be-true investment opportunity is an old scam still used today, often to entice the purchase of cryptocurrency with cash. As with all these potential scams, do your due diligence and confirm the legitimacy of the receiver and their details.

The best way to prevent money wire fraud is to stay up to date with the latest scams and trust your gut: Do not act until you have thoroughly researched the details.

Accounting for Net Charge Offs

Accounting for Net Charge OffsWhen it comes it understanding a net charge-off (NCO), it’s the difference between any recovery of delinquent debt and gross charge-offs a business sees in a defined accounting time frame. NCOs are debts a company projects with a low likelihood of being collected. It can happen when a customer stops paying outstanding invoices or sees a decline in their credit rating.  

The first step considers it as a gross charge-off; if any amount is recovered, it’s subtracted to arrive at net charge-offs. If businesses can recover a percentage of what’s been charged off, the recovered monies can be net against the gross charge-offs to realize net charge-offs. A business’ loan loss provision is lowered by the net charge-off amount at the end of the accounting time frame and then refilled for the next accounting time frame based on new estimates for loan losses. This is part of a business’ provision for credit losses (PCL) that projects a certain percentage of accounts unable to be collected.

Accounting in Detail

The following formula calculates net charge-offs (NCO). This assumes a gross charge-off booking of 6 percent of all outstanding loans, with 1 percent ultimately being recovered during a particular accounting time frame.

Net Charge-Offs = Gross Charge-Offs – Amount of Recovered Debt

= 6 percent – 1 percent = 5 percent

Once the figure is calculated, the 1 percent collected adjusts the loan loss provision in the accounting statements.

Financial Institutions Illustrate Accounting Considerations

Banks’ business models and financials demonstrate their ability to pay their depositors competitive interest rates while also being able to make loans. Since banks earn profits via net interest margin, earning a spread between what banks pay depositors on interest rates and what borrowers are charged on loans, the spread is integral to measuring profitability. To generate the total value of a bank’s balance sheet, it’s imperative for banks to estimate and project their charge-offs as accurately as possible.

Financial institutions determine credit loss provisions by analyzing their balance sheets and the level of risk represented by outstanding loans. They look at the ratio of loan losses to overall losses, which is their net charge-off rate. The net charge-off rate is used to evaluate a loan’s book quality against other banks.

How Different Risks Impact Net Charge-Off Levels

Banks that have different loan mixes will see different risk and reward payoffs. If one bank offers primarily secured loans, while it may have lower net interest margins, it will also have lower charge-offs because the collateral backing them is less risky overall. This is compared to other lenders that have a higher level of unsecured loans, such as credit cards and commercial loans. This scenario, in the case of riskier loans, may result in higher net interest margins, but also greater potential for higher losses.

Journal Entry Examples

The following journal entries illustrate how to account for bad debts. Using the direct write-off method, when debt collection efforts have been exhausted, bad debts are recorded as follows:

Expenses for bad debt: Debit $750

Accounts Receivable: Credit $750

If, however, the business recovers anything from the customer’s outstanding invoices, the following journal entries would be added if $200 were received:

Cash: Debit $200

Accounts Receivable: Credit $200

Conclusion

While this is primarily for early-stage companies with a low percentage of credit sales, it illustrates how businesses can update their books when projecting their numbers to account for net charge-offs.