The proliferation of Wi-Fi across the globe has created an attractive opportunity for cyber attackers to snoop, steal, and infect unsuspecting users' data and systems. As of the publication of this document, there are over 300,000 videos on YouTube explaining how to hack Wi-Fi users with simple-to-use but highly powerful tools easily found online, making it no surprise that wireless intrusion prevention is a top consideration for business owners deciding when and how to implement a Wi-Fi solution. Wi-Fi vendors around the globe have responded with the introduction of Wireless Intrusion Detection Systems (WIDS) and Wireless Intrusion Prevention Systems (WIPS). In fact, there are so many solutions out there that it has become difficult for even the most security-savvy buyers to know which solutions are the most effective. This paper will simply outline the key components of an effective WIPS solution, arming business owners with the information they need to make informed purchasing decisions.
Data protection may seem like a solved problem, but recurring issues often crop up around backup and recovery, even if y