The deployment of wireless networking systems is proceeding rapidly. Advancements in the technology and reduction in the cost of ownership have converged such that wireless systems are becoming a measurable part of the national information infrastructure. The growth in sales booked and sales projected indicate that it qualifies as a technology mega-trend. Along with their convenience and popularity, however, wireless systems provide new and attractive opportunities for those seeking to exploit them. “Raising the security bar” by reducing wireless network vulnerabilities, therefore, becomes an important consideration for any organization that adopts wireless systems.