In today's world of technology, we are no longer tethered to the Cat5 cable at the end our Internet accessible device. With each new and improved device manufactured, wireless access is now the norm.
So how do you protect yourself, your data and your identity when using a standard that is inherently flawed in its security?
While my list of best practices is not all-inclusive, it's a start down the road to your wireless security: