Publications

Author and award winning instructor Jeff Lenning CPA has written several books and 40+ articles featured in various publications. We've compiled them all in a single place for easy reference.

Latent Electronic Documents and Discovery

By Jeff Lenning | January 28, 2014 | Comments Off on Latent Electronic Documents and Discovery

Latent electronic documents on computer networks can present problems for attorneys and their clients. These documents can be a problem for attorneys since they represent information their clients may not have realized existed. Old versions of documents, drafts, outdated revisions, and embedded comments typically do not accurately reflect the conclusions, and sometimes do not properly…

Read More

Protect Your Domain Name

By Jeff Lenning | January 28, 2014 | Comments Off on Protect Your Domain Name

An often overlooked computer security issue is protecting your firm’s (and your clients’) domain name. Your firm’s domain name is your address on the internet, and has likely become extremely important to your firm’s day to day operations. For example, it helps direct email intended for you to your email server, and web traffic to…

Read More

Technology Q & A

By Jeff Lenning | January 28, 2014 | Comments Off on Technology Q & A

SEARCH OUT FILES ACROSS A NETWORK WITH GOOGLE Q: In theory, going paperless is a great idea. In practice, however, the biggest obstacle, at least in my office, is not the work to convert documents into electronic files; it’s finding them afterward and retrieving them. We try to get everyone in the office to agree…

Read More

Get the Word Out

By Jeff Lenning | January 28, 2014 | Comments Off on Get the Word Out

Get the Word Out How do you distribute financial reports to clients, shareholders and key people in your organization? If you’re low-tech, you probably mail them. If you’ve been following my suggestions of several years ago, you create hyperlinks in Excel files and e-mail the files so clients can drill down into them for details…

Read More

Email Defense: Stop Spam and Viruses

By Jeff Lenning | January 28, 2014 | Comments Off on Email Defense: Stop Spam and Viruses

Overview Protecting employees from “bad” email is becoming more and more difficult. Yet, it remains the responsibility of the employer. Although laws have been introduced recently to control spam (unsolicited commercial email), it seems as if the spammers are unaware of them and thus continue operating at full force. There are many problems with spam,…

Read More

Wireless Networks

By Jeff Lenning | January 28, 2014 | Comments Off on Wireless Networks

Summary Wireless networks are popular due to their relative convenience and low cost of implementation. However, in an effort by manufacturers to make their wireless devices easy to setup, most wireless routers are shipped with security disabled. Since many assume that if the wireless is working, then it is working properly (securely), few ever go…

Read More

Secure Email

By Jeff Lenning | January 28, 2014 | Comments Off on Secure Email

Summary Corresponding through Email has become an integral part of daily business life. For many email messages, the content is not confidential, and security is not an issue. However, there are certain email messages that do contain confidential information and securing those communications is essential, especially given client/attorney privilege. Fortunately, there are a variety of…

Read More

Automate Excel Functions

By Jeff Lenning | January 28, 2014 | Comments Off on Automate Excel Functions

Easy-to-create macros can take over many manual processes.   Key to Instructions To help readers follow the instructions in this article, we use two different typefaces: Boldface type is used to identify the names of icons, agendas and URLs. Sans serif type indicates commands and instructions that users should type into the computer and the…

Read More

Bulletproof Backups

By Jeff Lenning | January 28, 2014 | Comments Off on Bulletproof Backups

SUMMARY Bulletproof backups are possible. Backing up your computer data is important, and you know that. This article strives to inspire you to action by showing you how easy and reliable backups really can be.   INSPIRATIONAL STORY There are only 3 rules of computing: (1) backup (2) backup and (3) backup. However, based on…

Read More

Remote Access

By Jeff Lenning | January 28, 2014 | Comments Off on Remote Access

Overview Like most professionals, your personal life and your professional life are blurred. When you are at home, you probably think about work and often try to get a few things done. However, working from home is inconvenient because of the crude methods used to transfer computer files from the office computer to your home…

Read More