Publications
Author and award winning instructor Jeff Lenning CPA has written several books and 40+ articles featured in various publications. We've compiled them all in a single place for easy reference.
Latent electronic documents on computer networks can present problems for attorneys and their clients. These documents can be a problem for attorneys since they represent information their clients may not have realized existed. Old versions of documents, drafts, outdated revisions, and embedded comments typically do not accurately reflect the conclusions, and sometimes do not properly…
Read MoreAn often overlooked computer security issue is protecting your firm’s (and your clients’) domain name. Your firm’s domain name is your address on the internet, and has likely become extremely important to your firm’s day to day operations. For example, it helps direct email intended for you to your email server, and web traffic to…
Read MoreSEARCH OUT FILES ACROSS A NETWORK WITH GOOGLE Q: In theory, going paperless is a great idea. In practice, however, the biggest obstacle, at least in my office, is not the work to convert documents into electronic files; it’s finding them afterward and retrieving them. We try to get everyone in the office to agree…
Read MoreGet the Word Out How do you distribute financial reports to clients, shareholders and key people in your organization? If you’re low-tech, you probably mail them. If you’ve been following my suggestions of several years ago, you create hyperlinks in Excel files and e-mail the files so clients can drill down into them for details…
Read MoreOverview Protecting employees from “bad” email is becoming more and more difficult. Yet, it remains the responsibility of the employer. Although laws have been introduced recently to control spam (unsolicited commercial email), it seems as if the spammers are unaware of them and thus continue operating at full force. There are many problems with spam,…
Read MoreSummary Wireless networks are popular due to their relative convenience and low cost of implementation. However, in an effort by manufacturers to make their wireless devices easy to setup, most wireless routers are shipped with security disabled. Since many assume that if the wireless is working, then it is working properly (securely), few ever go…
Read MoreSummary Corresponding through Email has become an integral part of daily business life. For many email messages, the content is not confidential, and security is not an issue. However, there are certain email messages that do contain confidential information and securing those communications is essential, especially given client/attorney privilege. Fortunately, there are a variety of…
Read MoreEasy-to-create macros can take over many manual processes. Key to Instructions To help readers follow the instructions in this article, we use two different typefaces: Boldface type is used to identify the names of icons, agendas and URLs. Sans serif type indicates commands and instructions that users should type into the computer and the…
Read MoreSUMMARY Bulletproof backups are possible. Backing up your computer data is important, and you know that. This article strives to inspire you to action by showing you how easy and reliable backups really can be. INSPIRATIONAL STORY There are only 3 rules of computing: (1) backup (2) backup and (3) backup. However, based on…
Read MoreOverview Like most professionals, your personal life and your professional life are blurred. When you are at home, you probably think about work and often try to get a few things done. However, working from home is inconvenient because of the crude methods used to transfer computer files from the office computer to your home…
Read More