Publications
Author and award winning instructor Jeff Lenning CPA has written several books and 40+ articles featured in various publications. We've compiled them all in a single place for easy reference.
We have gathered recent technology related questions, and compiled their answers in one article. Question: I am a small firm, and would like to scan copies of documents to pdf, but worry about finding them later. Please advise. Answer: While large firms can invest heavily in the technology infrastructure necessary for scanning, digitizing, organizing,…
Read MoreOverview There is a strong possibility that you already have access to your corporate network while out of the office, or that you would like to. If you already have remote access, is it secure? Especially given the confidential information stored on your corporate network. This article discusses one security-enhanced approach to mobile computing. Mobile…
Read MoreLatent electronic documents on computer networks can present problems for attorneys and their clients. These documents can be a problem for attorneys since they represent information their clients may not have realized existed. Old versions of documents, drafts, outdated revisions, and embedded comments typically do not accurately reflect the conclusions, and sometimes do not properly…
Read MoreAn often overlooked computer security issue is protecting your firm’s (and your clients’) domain name. Your firm’s domain name is your address on the internet, and has likely become extremely important to your firm’s day to day operations. For example, it helps direct email intended for you to your email server, and web traffic to…
Read MoreOverview Protecting employees from “bad” email is becoming more and more difficult. Yet, it remains the responsibility of the employer. Although laws have been introduced recently to control spam (unsolicited commercial email), it seems as if the spammers are unaware of them and thus continue operating at full force. There are many problems with spam,…
Read MoreSummary Wireless networks are popular due to their relative convenience and low cost of implementation. However, in an effort by manufacturers to make their wireless devices easy to setup, most wireless routers are shipped with security disabled. Since many assume that if the wireless is working, then it is working properly (securely), few ever go…
Read MoreSummary Corresponding through Email has become an integral part of daily business life. For many email messages, the content is not confidential, and security is not an issue. However, there are certain email messages that do contain confidential information and securing those communications is essential, especially given client/attorney privilege. Fortunately, there are a variety of…
Read MoreSUMMARY Bulletproof backups are possible. Backing up your computer data is important, and you know that. This article strives to inspire you to action by showing you how easy and reliable backups really can be. INSPIRATIONAL STORY There are only 3 rules of computing: (1) backup (2) backup and (3) backup. However, based on…
Read MoreOverview Like most professionals, your personal life and your professional life are blurred. When you are at home, you probably think about work and often try to get a few things done. However, working from home is inconvenient because of the crude methods used to transfer computer files from the office computer to your home…
Read MoreOverview A secure computer network is of paramount importance in today’s technology climate. Securing your network does not need to be expensive or confusing. Protecting the confidential data that exists on your network is critical for business success. The compromise of confidential client information could result in litigation. In addition, significant business interruptions can occur…
Read More