Wisdom of Cordless Telephones

BY STANLEY ZAROWIN

Q. No matter how long a telephone extension cord I buy, it manages to be one inch shorter than I need to reach a document or that cup of coffee I left on the shelf. I’ve been thinking of dumping my regular corded phone and using a cordless instead—not a cell phone but simply a plain cordless. Are you aware of any downsides—such as security—to such a plan? I have heard stories about conversations on cordless phones that were picked up by other phones. And I have to be concerned about privacy.

A. Not only do I know of no downsides, but I would encourage you to pursue the idea. It makes no sense to be tethered to a phone. Today’s cordless phones—operating at 900 Megahertz—have an extended range of hundreds of feet. Some even claim a range of several hundred yards through walls and floors. Privacy is assured with these phones because they contain microchips that not only scramble the transmission but also vary the transmission frequency, making eavesdropping nearly impossible. Some wireless phones even can handle multiple incoming numbers, too.

Hello Direct, a mail order company, puts out a catalog with a wide assortment of such phone equipment. You can access the company at www.hellodirect.com or telephone them on your corded phone one last time at 800-444-3556.

SPONSORED REPORT

Year-end tax planning and what’s new for 2016

Practitioners need to consider several tax planning opportunities to review with their clients before the end of the year. This report offers strategies for individuals and businesses, as well as recent federal tax law changes affecting this year’s tax returns.

QUIZ

News quiz: IRS warning on cyberattacks and a change in pension rules

Once again, the IRS sounds the alarm about a threat from cyberthieves. See how much you know about this and other recent news with this short quiz.

CHECKLIST

Bolster your data defenses

As you weather the dog days of summer, it’s a good time to make sure your cybersecurity structure can stand up to the heat of external and internal threats. Here are six steps to help shore up your systems.