This resource is no longer available
WPA2 Security: Choosing the Right WLAN Authentication Method for Homes and Enterprises
While the TJX story was an extreme case of faulty wireless encryption, questionable data protection practices, and the Russian mafia combining to create a once-in-a-blue-moon theft, the fact is that many WLANs are vulnerable to intrusion. Even if you don't have a couple hundred million credit card numbers to protect, it's still important to choose the correct WLAN authentication method and configure it properly. This paper will explore the authentication methods available with WPA2 (Wi-Fi Protected Access 2) and identify several important best practices to consider when deploying a wireless network at home or in the enterprise.