by admin | Nov 9, 2021 | Human Resources
Theories abound about why workers are leaving their jobs in record numbers in 2021 and thus creating what pundits are calling the Great Resignation. The U.S. Bureau of Labor Statistics reported that 4.3 million Americans quit their jobs in August. These resignations continue to be higher in food service, retail, and education.
One popular opinion was that people quit unexpectedly and did not look for a new job because of the generous unemployment benefits instituted during the pandemic. The claim was that the job market would return back to normal once those benefits were phased out.
Even though the benefits ended over Labor Day weekend, there has been no significant recovery in employment. Twenty states actually stopped the benefits over the summer and have seen no improvement since then either.
So what’s really behind this trend? According to economists and labor market experts, American workers are soul-searching.The Great Resignation is a philosophical reset of work expectations.
What Workers Really Want
Heather Long, an economics correspondent from the Washington Post, spoke with CBS News recently to discuss her reporting on the Great Resignation.
She said some workers are still concerned about COVID-19, yet that fear may be waning with the increase of vaccinations coupled with decreased infections. Many others simply want to change what they’re doing with their lives.
Lower wage workers are protesting over substandard pay and harsh work conditions, but even mid-level workers who earned higher salaries and better benefits are leaving to open their own businesses or pursue their passions.
Long said that the two biggest priorities for Americans are finding something different or more fulfilling, and working for an employer that values both mental health and work-life balance.
What does this mean for companies?
Offering higher salaries to job candidates may seem like an obvious fix to the problem, but be prepared for the needle to barely move as a result. And it’s clear from the last few months that unemployment benefits weren’t holding workers back either.
“The early evidence certainly suggests that the unemployment benefits were not the main reason holding people back from going and seeking work again,” said Long.
Instead, the Great Resignation has proven to be more about personal values and less about economics.
The Great Reassessment of Work in America
In her interview, Long described what’s happening as a” great reassessment of work in America,” and one of the “biggest shakeups of the labor market since World War II.”
It takes a significant or traumatic event like a pandemic or world war to get people questioning their lives and how work fits into it. So much about the workforce changed in the mid-1900s. Americans were still reeling from The Great Depression only a few years before the war that caused unemployment rates to skyrocket to 25%.
The start of the war actually got things moving again. Factories were established to produce weapons and supplies. More Americans, including women who were previously expected to be stay-at-home wives and mothers, went to work to support the effort. A majority of the workforce became permanently industrialized in that decade.
The American workforce was never the same after World War II, and many experts are pointing to a similar shift today in 2021.
Advice for HR Professionals and Companies
Knowing the root causes of “The Great Resignation” will help HR departments and companies truly solve this labor crisis. Money is important. Everyone needs to pay their bills, and it would be nice to have a few extra dollars to take an extra vacation or buy a more expensive car. But don’t make the mistake of thinking it’s all salary that will bring back workers.
Even if some employees return for a higher salary, it will only keep them engaged in the short-term. When they eventually quit again because of burnout, companies will be back to square one.
Younger workers from the Millennial and Gen-Z generations are leading this trend. Besides the money, they want to feel safe and well-compensated. They want to be treated with decency by employers, who care about their mental health and personal downtime.
by Mckenzie Cassidy
Originally posted on HR Exchange Network
by admin | Nov 2, 2021 | Hot Topics
Many of us have heard of Alzheimer’s disease but may not know much more than it is a disease that causes memory loss. Experts suggest that more than 6 million Americans, most of them age 65 or older, may have dementia caused by Alzheimer’s. This disease is currently ranked as the sixth leading cause of death in the United States, but recent estimates indicate the disorder may rank third, just behind heart disease and cancer as a cause of death for older people.
Alzheimer’s disease is a progressive brain disorder that slowly destroys memory and thinking skills, and eventually, the ability to carry out the simplest tasks. Changes in the brain may begin a decade or more before symptoms appear. During this very early stage of Alzheimer’s, toxic changes are taking place in the brain. Previously healthy neurons stop functioning, lose connections with other neurons, and die.
Signs and symptoms of Alzheimer’s disease
Memory problems are typically one of the first signs of cognitive impairment related to Alzheimer’s. Alzheimer’s disease progresses in several stages: early, mild (sometimes called mild cognitive impairment), moderate, and severe.
In the Early stage, a person begins to experience memory loss and other cognitive difficulties, though the symptoms appear gradual to the person and their family.
During the Mild Cognitive Impairment(MCI), stage damage occurs in areas of the brain that control language, reasoning, sensory processing, and conscious thought. Conditions such as diabetes, depression, and stroke may increase a person’s risk for MCI.
Some of the signs of MCI include:
- Losing things often
- Forgetting to go to events or appointments
- Having more trouble coming up with words than other people of the same age
MCI can be managed by seeing a doctor or specialist every 6 to 12 months. A doctor can help track any changes in memory and thinking skills over time. People with MCI might also consider participating in clinical trials or studies.
The Moderate stage of Alzheimer’s disease requires more intensive supervision and care becomes necessary.
Symptoms may include:
- Increased memory loss and confusion
- Inability to learn new things
- Difficulty with speech and problems reading, writing and working with numbers
- Difficulty organizing thoughts and logical thinking
- Shorted attention span
- Problems coping with new situations
- Difficulty carrying out multistep tasks, such as getting dressed
- Problems recognizing family and friends
- Hallucinations, delusions, and paranoia
- Impulsive behavior
- Inappropriate outbursts of anger
- Restlessness, agitation, anxiety, wandering in the late afternoon or evening
- Repetitive statements or movement
People with Severe Alzheimer’s cannot communicate and are completely dependent on others for care. The person may also be in the bed most or all the time as the body shuts down.
Symptoms often include:
- Inability to communicate
- Weight loss
- Seizures
- Skin infections
- Difficulty swallowing
- Groaning, moaning, or grunting
- Increased sleeping
- Loss of bowel and bladder control
How is Alzheimer’s disease treated?
Currently, there is no cure for Alzheimer’s, though there are medicines that can help treat the symptoms of the disease. Most medicines work best for people in the early or middle stages of Alzheimer’s. Researchers are exploring other drug therapies and other interventions to delay or prevent the disease as well as treat its symptoms. Some of those include physical activity, diet, cognitive training, and a combination of these.
Alzheimer’s is complex and it is therefore unlikely that any one drug or other intervention will successfully treat it in all people living with the disease. It is important to talk to your doctor if you experience any signs or symptoms of the disease so that appropriate medical tests can be conducted. This will not only give you peace of mind but will help you and your family prepare for the future.
The journey typically lasts for years and for most of that time, people living with Alzheimer’s can still enjoy the same things they always have. Instead of focusing on what is lost, focus on what remains. People still enjoy beauty and feel emotions long after losing the ability to store short-term memories. Recognize each moment as an opportunity to help your loved one experience the joys of life.
by admin | Oct 28, 2021 | ACA
The Affordable Care Act’s employer shared responsibility provision — often called the employer mandate or “play or pay” — requires large employers to offer health coverage to their full-time employees or face a potential penalty. (Employers with fewer than 50 full-time and full-time-equivalent employees are exempt.) Large employers can avoid the risk of any play or pay penalties by offering all full-time employees at least one group health plan option that meets two standards: It provides minimum value and it is affordable.
Minimum value means the plan’s share of total allowed costs is at least 60 percent and the plan provides substantial coverage of physician services and inpatient hospital services.
Affordable means the employee’s required contribution (payroll deduction) for self-only coverage, if elected, does not exceed a certain percentage of the employee’s household income. The affordability percentage changes slightly each year based on the law’s indexing rule. For 2021, the percentage is 9.83 percent. For 2022, however, the percentage decreases to 9.61 percent.
Although the change is minor, it means that employers need to consider whether their plan’s employee-only contribution rate will still meet the affordability standard next year.
Determining Affordability
The first step in determining whether a group health plan option is affordable is to define the employee’s “income.” Employers do not know their workers’ total household income, so the play or pay rules offer employers three optional safe harbor methods to define income using information known to the employer. Employers may use any of the safe harbor methods. They also may use different methods for different classes (such as one method for hourly employees and another method for salaried employees), provided that the chosen method is applied uniformly to all employees in the class.
The three IRS safe harbor methods are:
- Federal Poverty Line (FPL)
The FPL method is the easiest of the three methods. Multiply the mainland FPL amount for a single-member household by the affordability percentage, then divide by 12. As long as the self-only contribution rate does not exceed the resulting amount, the plan’s coverage is deemed affordable. For instance:
- 2021: ($12,760 x 9.83%)/12 = $104.52 per month
- 2022 ($12,880 x 9.61%)/12 = $103.15 per month
The FPL chart is updated every year in late January. For 2022 calendar-year health plans, the employer needs to refer to the current FPL amount ($12,880) since the new FPL amount will not be available until after the plan year starts. If the health plan year starts February 1, 2022 or later, however, the employer may refer to the new FPL amount which likely will be a little higher.
2. Rate of Pay
This is the most convenient method to define income when applied to hourly employees. Multiply the employee’s hourly rate of pay times 130 hours per month (regardless of how many hours he or she actually works), then multiply by the affordability percentage. As long as the self-only contribution rate does not exceed the resulting amount, the plan’s coverage is deemed affordable. For instance:
- 2021: ($11* x 130) x 9.83% = $140.57 per month
- 2022: ($11* x 130) x 9.61% = $137.42 per month
* Replace $11 with the hourly employee’s rate of pay.
For salaried employees, the rate of pay method is somewhat complicated so employers generally avoid using this method for non-hourly employees.
3. W-2
The W-2 method requires using current W-2 wages instead of looking back at the prior year. W-2 wages means the amount that will be reported in Box 1 of Form W-2. Pretax contributions, such as § 125 plan contributions and 401(k) or 403(b) plan deferrals, are not included in Box 1, so using the W-2 safe harbor method may understate the employee’s actual income. Coverage will be deemed affordable if, for each month of the plan year, the self-only contribution does not exceed the Box 1 amount multiplied by the affordability percentage.
Summary
Large employers can avoid the risk of potential penalties under the ACA’s play or pay rules by ensuring that they offer full-time employees at least one minimum value plan option that also is affordable. Affordable means the employee’s contribution to elect self-only coverage would not exceed a certain percentage of the employee’s income.
The percentage used to determine affordability changes from year to year is based on the law’s indexing formula. For 2021 plan years, the affordability percentage is 9.83 percent, but it decreases to 9.61 percent for 2022 plan years. Employers and their advisors will want to keep this information in mind as they finalize their group health plan offerings and employee contribution rates for 2022.
By Kathleen A. Berger, CEBS
Originally posted on Mineral
by admin | Oct 19, 2021 | Cybersecurity
If you are concerned about your cyber security – and you should be – it’s essential to know the biggest threats to you right now. So, what is cyber security anyway? And how can you protect yourself?
Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. Global cyber threat continues to increase at a rapid pace. Most, but not all, cybercrime is committed by hackers who want to make money. As the result of the COVID-19 pandemic, Cybercrime, which includes everything from embezzlement to data hacking and destruction, is up 600%.
Types of Cyber Threats:
Malware, short for “malicious software”, refers to any intrusive software developed by cybercriminals or hackers to steal data and damage computers and computer systems. Malware is often activated when a user clicks on a malicious link or attachment, which leads to installing dangerous software. There are several types of malware:
- Virus: A self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
- Trojans: A type of malware that conceals its true content to fool a user into thinking it’s a harmless file. Cybercriminals trick users into uploading Trojans onto their computer where they can collect data or cause damage.
- Worms: Malicious software that spreads copies of itself from computer to computer within a network. Worms exploit vulnerabilities in your security software to steal sensitive information and corrupt files. A worm is different from a virus, however, because a worm can operate on its own while a virus needs a host computer.
- Spyware: A program that secretly records what a user does, so that cybercriminals can make use of this information. Spyware is often used to steal personal or financial information.
- Ransomware: Malicious software which locks down a user’s files and data with the threat of erasing it unless a ransom is paid.
- Adware: Unwanted software that displays advertisements on your screen. Adware collects personal information from you to serve you with personalized ads. While adware is not always dangerous, it can redirect your browser to unsafe sites and can even contain Trojans and spyware.
- Rootkits: Malicious software that is extremely difficult to spot and also very hard to remove. A rootkit allows someone to maintain control over a computer without the computer owner knowing about it. Once a rootkit has been installed, nothing on your computer is secure.
Where does malware come from?
The most common sources of malware are malicious websites, email attachments, and shared networks.
- Phishing: E-mails that appear to be from a legitimate company asking for sensitive information. Phishing attacks are often used to trick people into handing over personal information or credit card data.
- Shared Networks: A malware infected computer on your shared network can spread malware onto all devices on the network.
- Malicious Websites: Some websites may install malware onto your computer – usually through advertisements on popular sites (malvertising) or malicious links.
How to Prevent Malware – 7 Things You Should Start Doing Now:
- Install Anti-virus Software: Anti-virus software will scan your computer to detect and clean the malware and provide enhanced protection against newly created viruses.
- Regularly Update Software: Keep your software updated to stop attackers gaining access to your computer through vulnerabilities in outdated systems.
- Install a Firewall: A firewall blocks all unauthorized access to or from a private computer network.
- Use Secure Authentication Methods: Use strong passwords with at least 8 characters, including an uppercase letter, a lowercase letter, and a number or symbol. You should also enable multi-factor authentication, such as a security question in addition to a password.
- Don’t Open Emails From Unknown Sources: Hackers often send emails with links that are sure to send malware your way and hack into your important information. It is better to delete the email than to suffer the consequences of opening it.
- Avoid Using Unsecure WiFi Networks in Public Places: On an unsecure network, a cybercriminal can intercept communication between two individuals to steal data.
- Maintain Regular Backups of Your Data: Backups do not secure your network from attacks but they help when you face a malware attack.
Jeh Johnson, former U.S. Secretary of Homeland Security, stated “Cyberattacks of all manner and from multiple sources are going to get worse before they get better. In this realm and at this moment, those on offense have the upper hand. Whether it’s cyber-criminals, hacktivists, or nation-state actors, those on offense are ingenious, tenacious, agile, and getting better all the time. Those on defense struggle to keep up.”
It is imperative that you protect yourself and your family from cybercriminals. With technology increasing, criminals don’t have to rob stores or banks, nor do they have to be outside to commit a crime – they have everything they need on their lap. Their weapons are no longer guns, they attack with a computer mouse and passwords.
by admin | Oct 12, 2021 | Cybersecurity
Malicious Email
A malicious email can look just like it comes from a financial institution, an e-commerce site, a government agency or any other service or business.
It often urges you to act quickly, because your account has been compromised, your order cannot be fulfilled or there is another urgent matter to address.
If you are unsure whether an email request is legitimate, try to verify it with these steps:
- Contact the company directly – using information provided on an account statement, on the company’s official website or on the back of a credit card.
- Search for the company online – but not with information provided in the email.
Spam
Spam is the electronic equivalent of junk mail. The term refers to unsolicited, bulk – and often unwanted – email. Here are ways to reduce spam:
- Enable filters on your email programs: Most internet service providers (ISPs) and email providers offer spam filters; however, depending on the level you set, you may end up blocking emails you want. It’s a good idea to occasionally check your junk folder to ensure the filters are working properly.
- Report spam: Most email clients offer ways to mark an email as spam or report instances of spam. Reporting spam will also help to prevent the messages from being directly delivered to your inbox.
- Own your online presence: Consider hiding your email address from online profiles and social networking sites or only allowing certain people to view your personal information.
Phishing
Phishing attacks use email or malicious websites (clicking on a link) to collect personal and financial information or infect your machine with malware and viruses.
Spear Phishing
Spear phishing involves highly specialized attacks against specific targets or small groups of targets to collect information or gain access to systems. For example, a cybercriminal may launch a spear phishing attack against a business to gain credentials to access a list of customers. From that attack, they may launch a phishing attack against the customers of the business. Since they have gained access to the network, the email they send may look even more authentic and because the recipient is already customer of the business, the email may more easily make it through filters and the recipient maybe more likely to open the email.
The cybercriminal can use even more devious social engineering efforts such as indicating there is an important technical update or new lower pricing to lure people.
Spam & Phishing on Social Networks
Spam, phishing and other scams aren’t limited to just email. They’re also prevalent on social networking sites. The same rules apply on social networks: When in doubt, throw it out. This rule applies to links in online ads, status updates, tweets and other posts. Here are ways to report spam and phishing on major social networks:
Tips for Avoiding Being a Victim
- Don’t reveal personal or financial information in an email, and do not respond to email solicitations for this information. This includes following links sent in email.
- Before sending or entering sensitive information online, check the security of the website.
- Pay attention to the website’s URL. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com versus .net).
- If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. Contact the company using information provided on an account statement, not information provided in an email. Check out the Anti-Phishing Working Group (APWG) to learn about known phishing attacks and/or report phishing.
- Keep a clean machine. Keep all software on internet-connected devices – including PCs, smartphones and tablets – up to date to reduce risk of infection from malware.
What to Do if You Are a Victim
- Report it to the appropriate people within the organization, including network administrators. They can be alert for any suspicious or unusual activity.
- If you believe your financial accounts may be compromised, contact your financial institution immediately and close the account(s).
- Watch for any unauthorized charges to your account.
- Consider reporting the attack to your local police department, and file a report with the Federal Trade Commission or the Internet Crime Complaint Center.
Protect Yourself With These STOP. THINK. CONNECT.™ Tips
- When in doubt, throw it out: Links in email, tweets, posts and online advertising are often how cybercriminals try to compromise your information. If it looks suspicious, even if you know the source, it’s best to delete or – if appropriate – mark it as junk.
- Think before you act: Be wary of communications that implores you to act immediately, offers something that sounds too good to be true or asks for personal information.
- Make your passphrase a sentence: A strong passphrase is a sentence that is at least 12 characters long. Focus on positive sentences or phrases that you like to think about and are easy to remember (for example, “I love country music.”). On many sites, you can even use spaces!
- Unique account, unique passphrase: Having separate passphrases for every account helps to thwart cybercriminals. At a minimum, separate your work and personal accounts and make sure that your critical accounts have the strongest passphrases.
- Lock down your login: Fortify your online accounts by enabling the strongest authentication tools available, such as biometrics, security keys or a unique one-time code through an app on your mobile device. Your usernames and passphrases are not enough to protect key accounts like email, banking and social media.
Additional Resources
Originally posted on Stay Safe Online