There are many different intrusion detection and prevention systems out there that use a variety of techniques. Open source or free options include Kismet and Snort. Commercial products are also available from vendors such as AirMagnet, AirDefense, and AirTight.
#4 Create wireless usage policies
Along with other general computer usage guidelines, you should have a specific set of polices for Wi-Fi access which should at least include the following items:
#5 Use SSL or IPsec on top of Wi-Fi encryption
Though you might be using the latest and greatest Wi-Fi encryption (on Layer 2 of the OSI model), consider implementing another encryption mechanism, such as IPSec (on Layer 3 of the OSI model). In addition to providing double encryption on the wireless side, it can secure the wired communication too. This would prevent eavesdropping from employees or outsiders tapping into an ethernet port.
Eric Geier is the the author of many networking and computing books for brands like For Dummies and Cisco Press.
One of the ways around the issues of security and control that make some businesses wary of cloud computing is to build a private cloud -- one that remains within the corporate firewall and is wholly controlled internally. Private clouds also increase the agility of IT an organization's IT infrastructure and make it easier to roll out new technology projects. Download this eBook to get the facts behind the private cloud and learn how your organization can get started.