Webinar: Navigating the Great Resignation – Tools for HR Leaders

Apr 26, 2022 | Human Resources Services, Video Resources

As the world continues to grapple with the fallout of the COVID-19 onslaught, companies are struggling with unprecedented volatility in the workforce, which has been denominated as “The Great Resignation.”

Join our panel of subject matter experts in Employment, Immigration, and Rewards as we explore real solutions for recruiting and retaining employees in 2022.

An immigration-specific segment is presented by Senior Associate Nate Grow and is found below:

See the full recording of this meeting here:

Related Posts:

WR Immigration Podcast: Chatting with Charlie January 2023 Webinar

In this podcast, WR Immigration Director of Visa Consulting Charlie Oppenheim, Partner Charina Garcia and Senior Associate Laura Bloniarz unpack the February Visa Bulletin, provide updated predictions and analyze trends.

Data Security: Tips for How HR Managers Can Keep Company Data Safe

Businesses of all sizes are under constant threat from cybercriminals and malicious software.  None, not even the world’s largest and apparently impenetrable organizations is immune, as recent headlines are rife with the latest victims of cyberattacks. On top of that, an increasingly remote workforce has multiplied data security threats – what are some ways that companies have adapted? WR Immigration is in a unique position in that we must care for the sensitive immigration information that our clients entrust to us while also advising our clients on data security strategies. Here are a few of the best strategies that we have seen employed: Watch out for Remote Work Remote work tools are rife with danger. Due to their portable nature, mobile devices, including laptops, tablets and smartphones, are at a much higher risk of getting lost or stolen. First, all employees must work exclusively on company devices. Second, those devices must be secured. When securing any business mobile devices that employees use, HR managers need to think about identity and access, data encryption, and application security. Enforcing a strict password policy and having a contingency plan in place in the event that any such devices go missing are good initial […]