Before you apply for a loan-READ THIS

Tired of being turned down? We are tired of turning you down – we want to approve everybody – however below is why (generally) businesses never get loans approved. 

Check your credit, make any repairs or statements of explanation for any negative items the items below are what you will need, be prepared, don’t try and cheat with false information or omissions, lenders do not like surprises. The more information you provide increases the likelihood of approval.

  • Apply for credit repair if not so hot (we offer these services)
    DO NOT apply to several banks at once, or reapply if turned down until after you have corrected why they turned you down.
  • Get your FICO/SBSS score (small business scoring service). You can get this at free
  • SBA requires a minimum score of 140, most lenders will NOT provide a loan if SBSS score is under 160. The range is 0-300
  • Personal FICO score-0-840 most lenders want 650 or


  • Get a D-U-N-N-S number (Dun and Bradstreet-100 as the highest a score of 80 is good-free


Let us do the work-we have thousands of lenders to choose from-we can submit to many lenders without re-pulling your credit & know where to go-even if you were turned down, we have the paperwork to resubmit without pulling credit again.

  • Let us do the work-we have thousands of lenders to choose from-we can submit to many lenders without re-pulling your credit & know where to go
  • Most lenders want to see profit, what they really look at is good cash flow
  • Debt service, can you cover your debt with current cash flow with adequate reserves
  • Annual sales volume, where does your revenue come from, the more customers the less risk to the lender-explain how are you different than your competition
  • Most lenders will lend around 20% of your annual sales volume, less for credit lines
  • One of the important things is a financial statement
  • Initial Borrower Documents Need for all individual who own 20% or more of Ownership
  • Current Personal Financial Statement (All Borrowers)
  • Personal Tax Returns (Last 3 Years)
  • Current Credit Report w/scores ( CreditKarma, etc.
  • Initial Business Documents Brief Overview of Ownership / Entities and Loan Requested
  • Business Tax Returns (Last 3 Years)
  • Current Balance Sheet YTD
  • Profit and Loss Statement
  • For commercial mortgages:
  • Old Appraisal (if available/applicable)
  • Current Rent Rolls (if applicable)

Get busy…


I met with a few business clients recently…

It was a 2-hour lunch that started my journey to find a better solution for my friends.

What was the beef? They all had small business loans and were very tired of paying daily and a few weekly ACH payments at high rates and short terms. Most of them were 3 months to 21 month paybacks. Ouch!

I couldn’t help them as I offered similar funding for their credit requirements. So, like most of the services we offer I started my journey to find the best terms, best rates, and monthly payments.

The other problem was two were startups, good luck with that. So, that started the second part of my journey-finding reasonable money and terms for startups, of which most have limited or no business credit to offer.

Generally, businesses need to be in business for at least 6 months to qualify for any type of finance, even our SBA packages eliminate most business funding under 2 years. Banks require 2 years at least with positive credit and profitable business. Let alone the paperwork, fees, waiting…waiting…waiting

And like most small business (any business) make the same mistake. They apply at one bank, get turned down, then apply to another, and another. Well, they see you shopping, and every time someone pulls your credit it gives you a “ding” of which I wrote in a previous blog about entering the “ding” zone. So, don’t be a “dinger”, do your homework, check your credit, fix your credit, explain anything not so nice, BEFORE you apply for any loan.

The other problem is what do have to offer? What can you really afford? And how long will it take me to pay it back?

First step: We created on our web, calculators and a financial statement. This lets everyone know what you have to offer (including yourself). Nobody likes surprises, especially lenders.

Second step: created applications with our lending partners that our easy and do not pull your credit (soft pull) to see what you can qualify for, I call it the “free DING zone”.  You could take months to find what we can do in minutes.

Final step: Find the lenders who can actually do these things.

So we did…Our goal is always to help business and individuals obtain the best financial services available.

Frank J. Eberhart, CEP® RFC® Author

Scary Stuff…

 Read and heed…


Report: 2016 saw 8.5 million mobile malware attacks, ransomware and IoT threats on the rise

In 2016, the number of malicious installation packages hit more than 8.5 million-three times more than the year before, according to a report on mobile malware evolution from Kaspersky Lab, released on Tuesday. The firm registered nearly 40 million attacks by malicious mobile software over the course of the year as well.

Most hackers claim they can break target systems in under 12 hours

The majority of hackers claim they can break through cybersecurity defenses and infiltrate their target’s systems within hours, according to new research.

While most reports only state stats and figures, the Nuix Black report attempts to separate itself by approaching security from the view of researchers as well as penetration testers. The report, released on February 23, says that more than three-quarters of hackers — 88 percent in total — who responded to the Nuix survey believe most network defenses can be breached within 12 hours.

In total, roughly a third said that their activities were never noticed by their victims — and 17 percent of hackers claimed it would take them no longer than two hours to breach a target.

Creepy IoT teddy bear leaks >2 million parents’ and kids’ voice messages

A maker of Internet-connected stuffed animal toys has exposed more than 2 million voice recordings of children and parents, as well as e-mail addresses and password data for more than 800,000 accounts.

The account data was left in a publicly available database that wasn’t protected by a password or placed behind a firewall


Hack city- 43% targeted small business

Watch this video:

We are a corporate and individual agency for LifeLock Agency # C1A464

For more information and applications visit our website:

In 2015, there were over 1 million web attacks against people a day. Out of that staggering number, 43% targeted small businesses. With larger companies beefing up their cybersecurity measures, small businesses have become attractive targets for hackers. Owners should be concerned the average cost of a data breach for a small business merchant is between $36,000 and $100,000.

Common-sense solutions and general awareness of cybercrime techniques can greatly reduce your business’s vulnerability to cyberattacks.

  • Install Antivirus Software
    The best ways to steer clear of viruses and malware are to use an industry-leading anti-virus software solution. There are many options out there, do not install multiple anti-virus software as they can counter react and defeat the purpose. If you already have good antivirus software, make sure the auto-update and firewall options are turned on.
  • Back Up Your Files
    Symantec reports that ransomware—a method of using encryption to hold critical data hostage for money—increased 35% in 2015. Updating your web applications can help prevent an attack, but it’s important to regularly back-up important files just in case.
    To minimize the impact of a ransomware attack is to immediately disconnect the infected machine(s) from the network, reinstall the operating system and restore from your last good backup copy.
  • Email & Downloads
    Email scams are becoming ever more sophisticated. Spear phishing, for example, is an email that appears to be from an individual or business you know, designed to trick you into revealing personal info.
    It’s important for you and your employees to be wary of anything coming into your inbox. “Never click a link or open an attachment that you did not expect to receive. If you’re not expecting something or must think twice about the contents, don’t open it. Second step is to call and confirm from the sender
  • Install Software & Operating System Updates
    Pop-up reminders to update your web browser or operating system (like Windows or OS) may seem annoying, but don’t ignore them. “Ensure operating systems and applications are always fully patched with the latest security fixes. Updates will help protect you from cyberattacks.
  • Use Strong Passwords                                                                                                                            Weak passwords are an invitation for hackers. Don’t make the mistake of using         simple passwords, using the same password for multiple accounts. And you should change your passwords every 60 to 90 days.Businesses should invest in complex password policies for all their employees. These do not have to be too complex, but they should include a minimum of 10 characters, upper case letter, lower case letter, number and symbol. In addition, all businesses should incorporate some sort of identity theft software for their employees as well, this protects everybody.
  • Use Secure Encrypted Systems to Accept Card Payments
    Never photocopy, hand write, electronically key-in to a terminal, or manually copy credit card information. This is a common practice for orders over the phone, consider a secure online payment system like PayPal to accept transactions. If your systems are compromised, keystroke loggers and other hacking tools can scrape the manually entered information for later attacks.
    In addition, make sure you’ve upgraded to the latest point-of-sale equipment for in-person purchases, many of the POS systems today are using older technology and operating systems like Windows XP that are no longer supported, this leaves you completely vulnerable to attacks.
  • Don’t Bank Over Unsecured Wi-Fi
    Wi-Fi connections at coffee shops, airports and other public places are convenient, but they aren’t secure. Never log into your online banking profile on an unsecured network—it’s all too easy for someone to steal your information that way. Look for little devices with generally 2 antennas sitting next to someone’s laptop or computer, this is called a pineapple, be aware.
    If you are a road warrior and are using public Wi-Fi, invest in a VPN service to secure your transmissions
  • Secure Physical Devices Storing Sensitive Data
    Don’t forget that sensitive data can be physically stolen as well. Computers and drives with private business or customer information should be protected. Assume somebody will steal them and plan accordingly. So, no leaving your computer in the front seat of your car, desk, or anywhere that is accessible to the public, employees who do not have proper clearance, and ALWAYS password protect all your devices, cell phones, laptops, computers, Ipad’s.
  • Train Employees & Yourself
    When it comes to cybersecurity, your actions are more important than any technology. If you have employees, hold regular training to make sure they’re aware of company IT policies, and how to avoid email scams and other types of cyberattacks. Practice what you preach, if you don’t it could put you out of business!


Cyber Security Update…be aware



A rash of invisible, fileless malware is infecting banks around the globe
According to research Kaspersky Lab plans to publish Wednesday, networks belonging to at least 140 banks and other enterprises have been infected by malware that relies on the same in-memory design to remain nearly invisible. Because infections are so hard to spot, the actual number is likely much higher.

“What’s interesting here is that these attacks are ongoing globally against banks themselves,” Kaspersky Lab expert Kurt Baumgartner told Ars. “The banks have not been adequately prepared in many cases to deal with this.” He went on to say that people behind the attacks are “pushing money out of the banks from within the banks,” by targeting computers that run automatic teller machines.

Experts predict a flood of denial-of-service attacks

As Internet of Things (IoT) goes mainstream Mirai-style denial-of-service botnet attacks are escalating, and hackers are targeting health care companies, financial services, and the government.

The hottest trend in cyberattacks is an archaic and simplistic hacker tool. Propelled by the rise of IoT, the popularity of denial-of-service attacks rebounded in late 2016 and early 2017. Accompanying the rapid acceleration of the IoT and connected device market, warn cybersecurity experts, will be a zombie botnet swarm of network-crippling attacks.

Denial-of-service attacks are simple but effective weapons that bring down websites and services by flooding networks with junk traffic from commandeered botnets. Digital fallout will often cripple the target and ripple across the web to knock out unaffiliated but connected services and sites. “After an attack [clients] often feel angry and violated,” said Matthew Prince, CEO of denial-of-service mitigation service CloudFlare in an interview with TechRepublic. “A distributed denial-of-service (DDoS) attack is not a sophisticated attack. It’s the functional equivalent of a caveman with a club. But a caveman with a club can do a lot of damage.”

Security flaws in Pentagon systems ‘easily’ exploited by hackers

Hackers are likely exploiting the easy-to-find vulnerabilities, according to the security researcher who warned the Pentagon of the flaws months ago. Several misconfigured servers run by the US Department of Defense (DOD) could allow hackers easy access to internal government systems, a security researcher has warned.

The vulnerable systems could allow hackers or foreign actors to launch cyberattacks through the department’s systems to make it look as though it originated from US networks. Dan Tentler, founder of cybersecurity firm Phobos Group, who discovered the vulnerable hosts, warned the flaws are so easy to find that he believes he was probably not the first person to find them.

“It’s very likely that these servers are being exploited in the wild,” he told me on the phone.

While the Pentagon is said to be aware of the vulnerable servers, it has yet to implement any fixes — more than eight months after the department was alerted.

InterContinental Hotels Group admits data breach

IHG says that payment card systems at 12 hotels are involved in the security incident.

InterContinental Hotels Group (IHG) has admitted to falling prey to cyberattackers who were able to compromise payment systems at hotels in the US and the Caribbean.

IHG is the parent company of hotel chains including Crowne Plaza, Holiday Inn, Candlewood Suites and Kimpton Hotels and Resorts, with thousands of locations worldwide. According to the conglomerate, the data breach was discovered on 28 December after an undisclosed number of clients reported unauthorized, fraudulent charges on cards previously used at a number of US hotels owned by the hotel giant.

Take heed, get protection, pay attention, check your statements, get links and alerts for your credit cards and lower the amount of alerts to $1 on credit cards. Get Identity theft protection!

We now offer both corporate and individual Lifelock which is now part of Norton Security Systems, we will have special discounts for the as well.


Annual Penalty Adjustments for 2017

In 2015, Congress passed the Federal Civil Penalties Inflation Adjustment Act of 2015 (the “Inflation Adjustment Act”) to direct federal agencies to adjust the civil monetary penalties for inflation every year. Civil penalties ensure compliance with federal regulation by incentivizing employers not to violate federal regulation and providing federal agencies the power to ensure compliance. However, when penalties are too low, or have failed to be increased for inflation, compliance with federal regulation remains stagnant. The Department of Labor (DOL) recently published the final rule to adjust for inflation the civil monetary penalties assessed or enforced in its regulations, and the annual adjustments for 2017 that increases certain penalties applicable to employee benefit plans. The updated penalties went into effect on January 13, 2017 and apply to penalties assessed after the effective date. Annual Penalty Adjustments for 2017 The following updated penalties are applicable to health and welfare plans subject to ERISA.

Description Current Penalty Updated Penalty

  • Failure to file Form 5500 Up to $2,063 per day Up to $2,097 per day Failure of a MEWA to file reports Up to $1,502 per day Up to $1,527 per day
  • Failure to provide CHIP Notice Up to $110 per day per employee
  • Up to $112 per day per employee

This document is designed to highlight various employee benefit matters of general interest to our readers. It is not intended to interpret laws or regulations, or to address specific client situations. You should not act or rely on any information contained herein without seeking the advice of an attorney or tax professional. ©2017 Emerson Reid, LLC. All Rights Reserved. CA Insurance License #0C94240.

  • Failure to disclose CHIP/Medicare Coordination to the State $110 per day per violation (per participant/beneficiary) $112 per day per violation (per participant/beneficiary)
  • Failure to provide SBCs Up to $1,087 per
  • Failure Up to $1,105 per failure
  • Failure to furnish plan documents (including SPDs/SMMs) $147 per day $1,472 cap per request $149 per day $1,496 cap per request Genetic information failures $100 per day $112 per day
  • De minimis failures to meet genetic information requirements (Minimum) $2,500 minimum $2,790 minimum
  • Failure to meet genetic information requirements – not de minimis failures (Minimum) $15,000 minimum $16,742 minimum
  • Cap on unintentional failures to meet genetic information requirements (Maximum) $500,000 maximum $558,078 maximum
  • Employer Action Private employers, including non-profits, should ensure employees receive required notices timely (SBC, CHIP, SPD, etc.) to prevent civil penalty assessments. In addition, employers should ensure Form 5500s are properly and timely filed. Finally, employers facing document requests from EBSA should ensure documents are provided timely, as requested.                                                                                                                                                                                                                                                       Who knows what will happen next? Repeal and replace? But for now this is the law…