How To Secure WLANs: A Visual Overview
, March 26, 2013 Secure wireless networks don't just happen--users and IT pros have to make it happen. But what goes into making a wireless network secure? Here's a look some essential steps for locking down wireless communications, including advice for road warriors, small business owners and WLAN administrators running large networks.
Find the Rogues
Client authentication and encryption are only part of the enterprise wireless security story. The ability to identify and neutralize self-installed "rogue" wireless access points is also important, as they can be nuisance devices or sources of critical data leakage. Each WLAN vendor detects rogue APs differently, so this is one area to pay attention to when shopping for a system.
