Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways.
Source: 7 Wi-Fi vulnerabilities beyond weak passwords | Computerworld
CISS 100 – Computing & Information Sciences
Prof James G. Looby – Site/Servers 100% Wind Powered
Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways.
Source: 7 Wi-Fi vulnerabilities beyond weak passwords | Computerworld