This resource is no longer available

Today, the security concerns of legacy protocols have been largely eliminated and best practices for secure deployments have been developed allowing many wireless deployments to be arguably more secure than their wired counterparts.