Author and award winning instructor Jeff Lenning CPA has written several books and 40+ articles featured in various publications. We've compiled them all in a single place for easy reference.

Technology Q & A

By Jeff Lenning | January 28, 2014 | Comments Off on Technology Q & A

We have gathered recent technology related questions, and compiled their answers in one article.   Question: I am a small firm, and would like to scan copies of documents to pdf, but worry about finding them later. Please advise. Answer: While large firms can invest heavily in the technology infrastructure necessary for scanning, digitizing, organizing,…

Read More

Mobile Computing- More Securely

By Jeff Lenning | January 28, 2014 | Comments Off on Mobile Computing- More Securely

Overview There is a strong possibility that you already have access to your corporate network while out of the office, or that you would like to. If you already have remote access, is it secure? Especially given the confidential information stored on your corporate network. This article discusses one security-enhanced approach to mobile computing. Mobile…

Read More

Latent Electronic Documents and Discovery

By Jeff Lenning | January 28, 2014 | Comments Off on Latent Electronic Documents and Discovery

Latent electronic documents on computer networks can present problems for attorneys and their clients. These documents can be a problem for attorneys since they represent information their clients may not have realized existed. Old versions of documents, drafts, outdated revisions, and embedded comments typically do not accurately reflect the conclusions, and sometimes do not properly…

Read More

Protect Your Domain Name

By Jeff Lenning | January 28, 2014 | Comments Off on Protect Your Domain Name

An often overlooked computer security issue is protecting your firm’s (and your clients’) domain name. Your firm’s domain name is your address on the internet, and has likely become extremely important to your firm’s day to day operations. For example, it helps direct email intended for you to your email server, and web traffic to…

Read More

Email Defense: Stop Spam and Viruses

By Jeff Lenning | January 28, 2014 | Comments Off on Email Defense: Stop Spam and Viruses

Overview Protecting employees from “bad” email is becoming more and more difficult. Yet, it remains the responsibility of the employer. Although laws have been introduced recently to control spam (unsolicited commercial email), it seems as if the spammers are unaware of them and thus continue operating at full force. There are many problems with spam,…

Read More

Wireless Networks

By Jeff Lenning | January 28, 2014 | Comments Off on Wireless Networks

Summary Wireless networks are popular due to their relative convenience and low cost of implementation. However, in an effort by manufacturers to make their wireless devices easy to setup, most wireless routers are shipped with security disabled. Since many assume that if the wireless is working, then it is working properly (securely), few ever go…

Read More

Secure Email

By Jeff Lenning | January 28, 2014 | Comments Off on Secure Email

Summary Corresponding through Email has become an integral part of daily business life. For many email messages, the content is not confidential, and security is not an issue. However, there are certain email messages that do contain confidential information and securing those communications is essential, especially given client/attorney privilege. Fortunately, there are a variety of…

Read More

Bulletproof Backups

By Jeff Lenning | January 28, 2014 | Comments Off on Bulletproof Backups

SUMMARY Bulletproof backups are possible. Backing up your computer data is important, and you know that. This article strives to inspire you to action by showing you how easy and reliable backups really can be.   INSPIRATIONAL STORY There are only 3 rules of computing: (1) backup (2) backup and (3) backup. However, based on…

Read More

Remote Access

By Jeff Lenning | January 28, 2014 | Comments Off on Remote Access

Overview Like most professionals, your personal life and your professional life are blurred. When you are at home, you probably think about work and often try to get a few things done. However, working from home is inconvenient because of the crude methods used to transfer computer files from the office computer to your home…

Read More

Network Security

By Jeff Lenning | January 28, 2014 | Comments Off on Network Security

Overview A secure computer network is of paramount importance in today’s technology climate. Securing your network does not need to be expensive or confusing. Protecting the confidential data that exists on your network is critical for business success. The compromise of confidential client information could result in litigation. In addition, significant business interruptions can occur…

Read More