Radio waves know no boundaries. Therein lies the Wi-Fi rub. Even as enterprises equip their employees with Smartphones, PDAs, and wireless laptops, the data traversing the wireless LAN can be intercepted all too easily. . .
Radio waves know no boundaries. Therein lies the Wi-Fi rub. Even as enterprises equip their employees with Smartphones, PDAs, and wireless laptops, the data traversing the wireless LAN can be intercepted all too easily.

The headaches don't end there. IT departments have to deploy authentication to make sure only legitimate users have wireless access to corporate data, applications, and services. They also have to guard against someone on the street grabbing hotspot bandwidth and hitching a ride to the Internet--courtesy of the corporate budget.

No wonder Gartner puts WLAN security at No. 2 on its top 10 list of security risks. It also offers some basic advice: Consider the security implications before deploying wireless, and make sure to have the appropriate procedures and policies in place.

The link for this article located at TechWeb is no longer available.