BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

RIP Section 179 Benefits on December 31, 2010

Posted November 23, 2010    Peter McCalister

The Economic Stimulus Act of 2008, which was extended to 2009 and 2010, is now coming to an end this year and the associated benefits with Section 179 will also be lost to businesses.  Section 179 of the IRS tax code encourages businesses to buy equipment/software and invest in themselves to help spur our economy.

Section 179 allows companies to write off the entire purchase price for qualifying software in the year of purchase (up to $500,000 for the first year) instead of forcing companies to depreciate that purchase over five years.  So, organizations looking to benefit from this provision to implement a “least privilege” solution must complete the purchase of a privilege identity management solution before December 31, 2010.  A countdown clock, as well as a comprehensive description of the logistics, impact and business scenarios, can be found atSection179.org.

Eligible software cannot be “custom code” and in general needs to be commercially available “off the shelf” and, according to Section179.org, the guidelines in order to be eligible for this deduction include:

  1. “The software must be purchased outright or financed (only specific leases or loans qualify) by the company taking the deduction.
  2. The software must be used by the business.
  3. The software must have a determinable useful life
  4. The software must be expected to last more than one year.”

If you are thinking of eliminating admin rights from your organization then start your research here now.

Leave a Reply

Additional articles

How To Implement The Australian Signals Directorate’s Top 4 Strategies

Posted October 20, 2014    Morey Haber

The Australian Signals Directorate (ASD), also known as the Defence Signals Directorate, has developed a list of strategies to mitigate targeted cyber intrusions. The recommended strategies were developed through ASD’s extensive experience in operational cyber security, including responding to serious security intrusions and performing vulnerability assessments and penetration testing for Australian government agencies. These recommendations…

Tags:
, , , ,
asp-mvc

Exploiting MS14-059 because sometimes XSS is fun, sometimes…

Posted October 17, 2014    BeyondTrust Research Team

This October, Microsoft has provided a security update for System.Web.Mvc.dll which addresses a ‘Security Feature Bypass’. The vulnerability itself is in ASP.NET MVC technology and given its wide adoption we thought we would take a closer look. Referring to the bulletin we can glean a few useful pieces of information: “A cross-site scripting (XSS) vulnerability exists…

Tags:
4bestpracticesaudits-blog

Four Best Practices for Passing Privileged Account Audits

Posted October 16, 2014    Chris Burd

Like most IT organizations, your team may periodically face the “dreaded” task of being audited. Your process for delegating privileged access to desktops, servers, and infrastructure devices is a massive target for the auditor’s microscope. An audit’s findings can have significant implications on technology and business strategy, so it’s critical to make sure you’re prepared…

Tags:
, , , ,