To resolve this problem, you'll want to implement Wired Equivalent Privacy (WEP) or, even better, Wi-Fi Protected Access (WPA). Consult your wireless access point documentation for specifics on using these protocols.
Dig Deeper on Wireless network security
Related Q&A from Mike Chapple
Examine the important differences between stateful and stateless firewalls, and learn when each type of firewall should be used in an enterprise ... Continue Reading
Explore the differences between wired and wireless network security, and read up on best practices to ensure security with or without wires. Continue Reading
Choosing to encrypt confidential data with AES or DES encryption is an important cybersecurity matter. Learn about the important differences between ... Continue Reading