1. Put the access point in the right place
Start with the basics: within your network configuration, ensure wireless access points are outside your perimeter firewall.
2. Use MAC to stop a hack
Using Media Access Control (MAC) address-based access control lists will allow only registered devices to access the network. Although it can be spoofed, MAC address filtering is like adding another lock to your front door - the more obstacles you present, the more likely hackers will be encouraged to move on to less secure organisations.
The link for this article located at vnunet.com is no longer available.