This resource is no longer available
Today, the security concerns of legacy protocols have been largely eliminated and best practices for secure deployments have been developed allowing many wireless deployments to be arguably more secure than their wired counterparts.