CPAs and Advisors with Your Growth in Mind

Technology and Health & Life Sciences

Cherry Bekaert Hosts International Business Seminar

Attended by representatives from Baker Tilly International member firms in China, India, Korea, Singapore and Hong Kong, and over 70 U.S. companies, along with C-Suite executives from various industry sectors, Cherry Bekaert recently hosted the international business seminar, “Insiders Advice to Doing Business in Asia Pacific.” Held on October 30th in Atlanta, Georgia, the seminar presented participants’ inside knowledge of strategies that have either worked or led to failure when competing in this challenging but lucrative market. Some of the topics covered included: How successful U.S. companies encourage innovation while protecting intellectual property; Important considerations regarding cash management; Exchange rate. Read More.

Pitchbook Releases U.S. Private Equity Middle Market Report

Revealing U.S. private equity (PE) middle market deal flow increased to 83 percent, leading research firm Pitchbook has released its 2H 2014 U.S. Private Equity Middle Market Report. According to the report, the nation’s PE middle market deal flow reached 918 buyouts in 1H 2014, with $201.5 billion in capital invested. Available for download , Pitchbook’s latest report focuses on 1H 2014 by analyzing deal flow, investment trends by deal size, industry and region, and fundraising and exit activities from the last decade. Breaking down middle market activity into lower, core and upper segments, the report also features key figures such. Read More.

CED’s Joan Siefert Rose Featured in Wall Street Journal

Cherry Bekaert would like to commend Joan Siefert Rose and our friends at CED on recently being featured in The Wall Street Journal. Congratulations on all their hard work, as well as being recognized for the positive contributions to the North Carolina technology community. To read Rose’s feature , visit The Wall Street Journal’s website. Also check out Cherry Bekaert’s Technology industry page for information on how we can guide you forward.

Considerations for Tech Entrepreneurs

So, you are starting a new technology or bio science company, and don’t know what type of business entity to use. Unless you are a serial entrepreneur, this might be an overlooked and frustrating task. However, the decision you make today will have a long-term effect on your business, and is critical to consider early on in forming your business. Selecting the right business legal entity in the technology space will be valuable in helping you achieve your goals. Considerations that you may not have thought about include the impact of tax implications the entity you select will have on. Read More.

Topics: , , ,

IRS to Review Tax-Exempt Meals at Companies

Listed as an administrative priority for the Treasury Department’s fiscal year, the Internal Revenue Service (“IRS”) is evaluating its rules surrounding company tax exemptions for free meals. Currently, companies qualify for the exemption if, as stated by the IRS, their workers cannot “otherwise eat proper meals within a reasonable period of time” and provide food “for the convenience of the employer.” If the IRS begins taxing such meals, company-provided breakfasts and dinners could be affected the most. While the effort is in its initial stages, a spokeswoman for the Treasury Department noted that the goal is essentially to offer additional. Read More.

Topics: , ,

Colleges More Prone to Cybersecurity Breaches

With colleges and universities preparing for the new academic year, a recent report by BitSight Technology suggests some institutions are not prepared for potential cybersecurity threats. Tracking each college within the major athletic conferences over a one-year period, BitSight discovered that all conferences had a major decline in security performance. Specifically, the report noted that security defenses at colleges become weaker throughout the year due to more students and devices connected to campus networks, making malware infections a major threat. As a result, hackers are more likely to steal students’ and faculty members’ personal information. For the complete article , visit the. Read More.

Topics: ,