Passive Income 101

What is Passive Income 101If you’re tired of the 9-to-5 grind, then passive income could be for you. While not a get-rich-quick scheme, it’s a way to build systems that contribute to financial stability and extra money. It can even support long-term goals like early retirement. Here’s a high-level look at what it is and how it works.

Types of Passive Income Sources

  1. Investment Income
    This includes individual stocks or mutual funds, interest payments from corporate bonds, or capital gains from selling securities at a profit. While they all involve risk, these types of investments can compound and grow over time.
  2. Rental Income
    Depending on where your property is, this could be a cash cow. The money you earn can cover the mortgage, taxes, maintenance, and other miscellaneous expenses. The best part? You could earn a sweet sum of money.
  3. REITs and Crowdfunded Real Estate
    REITs (real estate investment trusts) and crowdfunded real estate platforms allow you to invest in properties without having to buy them yourself. You earn net rental income in the form of dividends without the headache of managing the property. Not bad, right?
  4. Business Income
    You earn this money by not actually participating in the operations. For example, you might invest in a restaurant. Others run the daily business while you receive a percentage of the profits. Sweet.
  5. Intellectual Property Royalties
    Pen a book. Write a song. Create an online course. You’ll reap the rewards long after the work is completed.
  6. High-Yield Savings Accounts
    Yes, this might yield small returns, but it’s a great way to put your money to work.

What are the benefits? There are many.

  • Wealth Building
    When you reinvest your dividends, save and invest your rental profits and royalties, you’ll steadily create a nest egg that will compound and grow, grow, grow.
  • Financial Freedom
    While this type of capital building takes time, it can supplement, if not replace, your day job.
  • Time Flexibility
    You don’t have to work on this revenue stream every day, which is the beauty of it. It clears up time for you to live your life.
  • Diversification
    When you have more than one income source, it can act as somewhat of a safety net, should your main way of earning a living dry up.

Risks and Taxes

While passive income can and does build wealth, it’s not without risks. Markets may fluctuate. Property values might decrease. Companies that are part of third-party crowdfunding could shut down. You’ll also have to pay taxes, as you must report your earnings. Selling stocks or properties can trigger capital gains.

Passive income has pros and cons. Only you can decide how risk-averse or tolerant you are. If this type of investing is for you, the sooner you start, the sooner you’ll create financial security – and freedom.

Sources

https://www.crediful.com/what-is-passive-income/

 

How to Account for Accretion

What is Accretion?Whether it’s an individual investor or a business owner looking to increase their earning power, understanding how accretion works is essential for individual and business investors to make the correct decisions going forward.

How Accretion Works for Bonds

Accretion is the gradual increase of a bond’s value over time. As a bond moves toward its maturity date, it increases in value until it reaches its face or par value – or what’s paid to the bondholder upon maturity.

If a bond has a face value of $2,000, yet it’s discounted at $1,900 when it’s offered for sale, the present value of the bond is $1,900, leaving the difference of $100 as the discount. Between the time of purchase and when it matures, the value of the bond will appreciate, up to its par value of $2,000. As the bond increases in value, this is referred to as an accretion discount. 

When it comes to accounting for bond accretion, there are two common methods.

Straight-Line Method

This approach documents the bond’s appreciated monetary gain and is laid out equally over the bond’s time frame until maturity. For a bond with a term of 10 years and a business that publishes its earnings once a quarter, there are 40 earnings releases.

If there’s a $100 discount, spread across 40 quarters, that is $2.50 every three months. The $2.50 is the quarterly accretion until the bond matures.

Constant Yield Method

This method is different from the straight-line method in that the bond’s value appreciation increases in value closer to the bond’s maturity date.

Acquisitions and Accretion

Companies can also benefit from accretion. Through the concept of synergy, where there’s more output from combining multiple entities than the sum of them if still separate, an acquiring company adds the earnings before interest, taxes, depreciation, and amortization (EBITDA), for example, to add to its existing shareholders’ value.

Illustrating How it Works

If Company X wants to increase its earnings per share for its shareholders, an acquisition is one way to do so. Assume Company X earned $1 million in net income the preceding year and has 3 million shares. And then there is Company Z, which had $500,000 in net income over the same time frame, with 1 million shares issued to raise cash. The following is a way to calculate the acquisition accretion value of the new combined company.

Earnings Per Share of Company X: 1,000,000 / 3,000,000 = 0.33

Earnings Per Share of the new company post-acquisition: ($1,000,000 + $500,000) / (3,000,000 + 1,000,000) = $1,500,000 / 4,000,000 = 0.375

Based on the calculation, the earnings per share of the post-acquisition company are $0.375. Compared to the EPS for the original, pre-acquisition Company X, the post-acquisition company is $0.045, resulting in a positive acquisition accretion.

Whether an individual investor is looking to see how bond accretion works or a company is looking at whether an acquisition makes business sense, understanding how accretion works is essential to ensure it’s accounted for properly.

Partial Government Funding, Promoting Transparency and Protecting Against Foreign Terrorism

Government Promoting TransparencyEpstein Files Transparency Act (HR 4405) – The purpose of this bill is to require the Department of Justice to release all documents and records in its possession of investigations and court cases related to Jeffrey Epstein. Epstein was previously convicted of soliciting prostitution from an underage girl, and also faced new sex trafficking charges prior to his 2019 death in custody. The files are expected to reveal the names of other people involved in the sex trafficking scheme. The act was initially introduced by Rep. Ro Khanna (D-CA) on July 15. It was updated and passed in the House on Nov. 18, in the Senate the next day, with only one opposing vote between the two chambers. The bill was signed into law by the president on Nov. 19. The DOJ has up to 30 days to release the documents, which may be lightly redacted to protect against unwarranted invasion of privacy, such as victim names and medical data.

Continuing Appropriations, Agriculture, Legislative Branch, Military Construction and Veterans Affairs, and Extensions Act, 2026 (HR 5371) – This is the bill that ended the federal government shutdown. It includes funding for the remainder of the fiscal year for the food assistance program SNAP, the Department of Agriculture, the FDA, the military, Veterans Affairs, and Congress through Sept. 30, 2026. However, it stops short of funding approval beyond Jan. 30, 2026, for Commerce, Justice and Science (CJS); Defense, Energy and Water; Financial Services and General Government (FSGG); Homeland Security; Interior, Environment, and Related Agencies; Labor, Health and Human Services, and Education (LHHS); State, Foreign Operations and Related Programs; Transportation; and Housing and Urban Development. The continuing resolution did contain a few ancillary provisions, including mandatory backpay and rehiring of all federal employees furloughed or laid off during the shutdown. The original version of the bill was introduced on Sept. 16 by Rep. Tom Cole (R-OK). It passed in the House on Sept. 19 and failed in the Senate 14 times before a revised bill was passed on Nov. 10. The final bill, with changes, passed in the House on Nov. 12 and was signed into law on the same day.

District of Columbia Cash Bail Reform Act of 2025 (HR 5214) – This bill was introduced on Sept. 8 by Rep. Elise Stefanik (R-NY). It represents Republicans’ ongoing battle over who has jurisdiction over Washington, D.C.’s law enforcement and justice system. The bill would return to a cash bail system and require automatic detention of those charged under a wider set of offenses. The new confinement rule counters D.C.’s long-standing system of judge discretion regarding detention or supervised release. The bill passed in the House on Nov. 19 and currently lies in the Senate.

Strengthening Cyber Resilience Against State-Sponsored Threats Act (HR 2659) – This bipartisan legislation represents a federal strategy to strengthen U.S. cyber defenses to counter China’s attempts to actively target American infrastructure. Unfortunately, the bill does not apply to other hostile state-sponsored cyber actors such as Russia, Iran, or North Korea. Introduced by Rep. Andrew Ogles (R-TN) on April 7, the bill passed in the House on Nov. 17 and currently rests with the Senate.

Department of Homeland Security Vehicular Terrorism Prevention and Mitigation Act of 2025 (HR 1608) – This bipartisan bill seeks to address the rising threat of vehicle-based attacks, including the possible misuse of autonomous vehicles, rideshare platforms, and connected vehicle technologies. The legislation was introduced by Rep. Carlos Gimenez (R-FL) on Feb. 26 and passed in the House on Nov. 17. It currently awaits consideration by the Senate.

The New Face of Phishing: Techniques, Targets and Prevention

Phishing Attacks Phishing is a major threat that keeps evolving and has now become a sophisticated and costly cyber risk facing businesses of all sizes. Previously linked to malicious links in an email, phishing is now powered by AI, automation, and social engineering. The attacks have become harder to detect; they are faster to execute; and they can be very damaging if successful. With many business processes happening online – such as payments, approvals, and customer engagement – the attack surface has expanded, and so has the creativity of cybercriminals.

The Changing Landscape of Phishing

Modern phishing is unlike the previous suspicious and poorly written emails, and today cybercriminals are using AI tools to do many things, including:

  • Generate perfectly written and personalized messages – attackers can now easily analyze company websites, social media profiles, public reports, and employee profiles to clone the tone, style, and communication patterns. Messages appear legitimate when they reference recent projects or internal updates.
  • Generate deepfake audio and video – with readily available AI voice-cloning tools, a scammer can easily impersonate CEOs or CFOs and request urgent wire transfers or credential access.
  • Bypass MFA using real-time phishing kits – these kits mirror login screens of popular business tools such as Microsoft 365 or Google Workspace. An employee enters credentials and authentication codes into the fake page, giving attackers instant access.
  • Launch automated hyper-targeted attacks – with automation, criminals can target specific departments using tailored messages relevant to their daily tasks.

High-Value Targets Inside Organizations

Phishing attacks are no longer random but very strategic:

  • C-Suite executives – executives are prime targets due to their authority and access levels. If an executive is compromised, their inbox can be used to authorize payments or request sensitive data.
  • Financial teams – the accounts department faces fake invoice scams, fraudulent banking instructions, and impersonated vendor messages.
  • HR departments – attackers send fake resumes loaded with malware. They might also pose as job applicants to access employee data.
  • Remote and hybrid workers – these workers use shared Wi-Fi, personal devices, and unsupervised collaboration tools. This creates a wider entry point for attackers.
  • Customers and partners – attackers impersonate brands and trick customers into submitting payments or sensitive information through fake lookalike pages.
  • IT admins and system engineers are also valuable as they have privileged access.

Modern Phishing Techniques

Emails remain the dominant delivery method, but attackers have diversified to:

  • Quishing (QR Code Phishing)
    QR codes are everywhere: on flyers, delivery packages, restaurant menus, conference badge,s and more. However, QR codes can lead to malicious sites or credential harvesting pages.
  • Search Engine Phishing or Malvertising
    Fake ads appear above legitimate brands on search results that a user can click on –thinking it’s a legitimate link.
  • Browser-in-the-Browser Attacks
    These are fake login pop-ups that replicate trusted login screens. An employee will enter their credentials, thinking it’s a legitimate site, and this goes straight to attackers.
  • OAuth Application Scams
    Here, attackers don’t steal passwords. Instead, they trick users into granting access to a malicious app. Once the access is granted, the attacker has total access.
  • Deepfake Calls and Video Messages
    These may come as high-pressure video calls or messages from an executive requesting urgent action, emergency payment, or private documents.
  • Fake Travel and Expense Scams
    Taking advantage of corporate travel, attackers clone legit travel sites in order to steal credit card and employee information.

Prevention Strategies Every Business Must Adopt

Phishing is a problem that can’t be eliminated but can only be significantly reduced through a combination of technical measures and human risk management.

Prevention requires a combination of technology, processes, and people.

  1. Build a Security-Aware Culture
    Training must be continuous, engaging, and realistic. It should be conducted via simulation and scenario-based learning.
  2. Strengthen Email Authentication
    Implement modern AI-based email filtering tools to help detect anomalies that human eyes miss. Include identity verification protocols like DMARC, SPF, and DKIM to reduce spoofing attacks.
  3. Adopt Zero Trust Security
    Implement the “never trust, always verify” approach. Access should be limited, monitored, and timed out automatically. High-risk actions should trigger additional verification.
  4. Secure Remote Work
    Implement VPNs, approved devices, endpoint protection, encrypted storage, and clear policies.
  5. Implement Multistep Verification for Financial Transactions
    Require verbal confirmation or dual approvals for high-value transfers.
  6. Monitor Vendors and Partners
    Keep in mind, there is a sharp rise in supply-chain attacks. Regularly verify domains, emails, and communication from suppliers and partners.
  7. Have an Incident Response Plan
    Be ready with a response plan in case of a breach. Acting quickly will reduce potential losses.

Conclusion

Phishing has transitioned into a sophisticated threat targeting the core operations of a business. New phishing variants reveal how attackers continually evolve their techniques. With the right awareness, technology, and processes, organizations can significantly reduce exposure.

Long Term Care Insurance Options

What is Long Term Care Insurance?In 2024, the median household income in the United States was $83,730. However, the national average annual cost of 24-hour paid long-term care (LTC) for a retiree age 65 and older was more than $125,000, according to the Department of Health and Human Services. Moreover, one in five seniors will require care for more than five years.

Obviously, the math varies by household, but the reality is that the majority of older Americans who rely on paid caregiving will use much of their retirement savings and investments to pay for it. When considering insurance, there are presently two options: Long Term Care Insurance (LTCi) and Hybrid Life Insurance with an LTC component. Be aware that each policy offers a throng of variations and exclusions, so it is important to dig into the details of individual policies before making a decision.

Long Term Care Insurance

Purchasing a long-term care insurance policy can help offset the cost of caregiving for either in-home care (in some cases, even payouts for family caregivers) or care outside the home (e.g., adult daycare services, assisted living, memory care, nursing home). However, it’s important to understand the following about LTCi.

It can be quite expensive.

Premiums can range from $2,000 a year for a man in his 50s to more than $12,000 a year for a woman in her 70s. Furthermore, premiums increase annually until benefits begin (premiums cease while benefits are paid).

It may not cover the full cost of care.

Unless care is needed for only a few hours a day, long-term care policies generally do not cover the full cost of paid caregiving. For example, let’s say a policy pays $150 a day, but the owner needs care for eight hours a day. His in-home caregiver charges $30 an hour. That means his cost is $240 a day, so he’ll have to pay the additional $90 a day out of his own pocket. That’s

up to $2,790 a month or $32,850 a year. So, while LTCi can help defray the cost, someone who needs extensive care must have other assets to cover the rest of the cost. For an elderly person who needs 24-hour home care, the cost can be exponential.

Many new policies cover only a handful of years.

When you purchase an LTCi policy, you choose from various options that increase or decrease your premium. For example, coverage periods may range from two years to five years to life. You may also select a waiting period before coverage begins after purchase, which could range from 30 days to 365 days. The longer the wait period, the lower the premium. If you have an immediate need for coverage, you might be denied coverage altogether. That is why it’s best to purchase coverage when you are younger (50s) and presumably healthy.

You don’t get to choose when to start benefits.

LTCi coverage doesn’t kick in until you qualify, which generally means you are no longer able to independently conduct some or all of the prescribed daily living activities. The five primary qualifiers are bathing, going to the toilet, dressing yourself, feeding yourself, and the ability to move from bed to chair/wheelchair. Qualification to begin taking LTCi benefits usually requires physician verification.

The downside of a standalone LTCi policy is that it is a “use-it-or-lose-it” type of contract, much like auto or homeowner’s insurance. In other words, you may pay for it for decades but never actually use it, so all the premiums paid are lost.

Hybrid Life/Long Term Care Insurance

On the other hand, a hybrid insurance policy will pay out some portion of unused proceeds to beneficiaries upon the death of the policyowner. A hybrid policy is basically a life insurance policy with an LTCi rider or an accelerated benefit clause, which, either way, means it will cost more.

First and foremost, it works just like life insurance – once the owner passes away, the beneficiary receives a payout. However, if the owner needs money to pay for long-term care while he is still alive, he can tap the rider or life insurance payout to pay for the care. Then, when he passes away, his heirs receive any amount of the unused proceeds. With this type of policy, the owner doesn’t pay for LTCi coverage he does not need, but it’s available if he does need it.

Premiums for a hybrid policy, like any life insurance, depend on the age, gender, health, and amount of insurance proceeds desired, as well as any additional charge for the LTCi rider. Some policies include LTC benefits as a standard feature.

Employer-Sponsored Benefit

If your employer offers long-term care insurance as a voluntary benefit, it’s worth considering because group rates are generally cheaper than on the individual market. However, while employer-sponsored LTCi policies are usually portable – meaning you can keep paying for it after you leave your employer – your premiums may increase when no longer part of the group policy.

As always, reach out to a professional when it comes to planning for you and your family’s future care.