Beyond traditional benefit plan services and insurance, we deliver proprietary tools and specialized resources designed to support your unique needs. We have dedicated specialists in each of the areas below and our long-standing market relationships allow us to innovate on behalf of clients rather than settle for a one-size-fits-all approach.
The combined expertise of our preeminent employee benefits, business insurance, risk management, retirement planning and specialist resource teams form a coordinated consultative process that delivers superior results for you.
Without a legitimate business reason coupled with sufficient documentation to support a termination, employees’ claims that they were terminated for unlawful reasons can be difficult, time consuming and costly to dispute. While there is no way to eliminate legal exposure to employees’ claims, there are ways for employers to significantly reduce their exposure when terminating employees. This article covers five ways you can reduce your exposure to claims for unlawful termination.
More employees are working
past age 65 instead of retiring, and many employers are wondering: Does the employee’s Medicare
eligibility affect the employer’s benefit programs? This eBook addresses the most
common questions we receive regarding issues such as eligibility, entitlement, health plan design and enrollment, employee education, and more. Register for our Nov. 7 webinar "How to explain the Medicare puzzle to your employees aged 65+ and still working" to learn how Medicare affects your organization, your employees and your benefit plans.
Login to download the PDF. Don’t have an account? Create an account to access all of the content in our Resource Library.
As businesses become
more interconnected, the risk of a third-party data breach
at your organization becomes more imminent. It’s no
longer enough to simply secure your organization’s
network systems and data. Your risk management
program needs to look beyond the perimeter of your
organization to properly vet the third-party vendors who
have access to your networks and data. Fortunately, your
organization can take certain steps to minimize exposure,
reduce the likelihood of a third-party breach and mitigate
Send a Message
Find a Location