This chapter has hopefully shed some light on the technology that drives wireless and the first steps for beginning to secure a wireless network. There are a variety of areas surrounding wireless that you should be concerned about; however, there are clear, layered steps that can be applied to secure a wireless network with minimal impact to users. Of utmost importance are the steps you take today to increase security that will not hamper or affect the security of your wireless network. The chapter concluded with a discussion of the freely available tools relating to attacking and securing wireless networks. Attackers commonly use these tools; more importantly, however, those who are looking to find flaws in their wireless network security should use them to patch them up and prevent easy attacks.