What\u2019s the easiest way to hack into a company\u2019s unprotected wireless network? Pick up a few cheap pieces of equipment and sit in the parking lot. There are many stories of people listening in on corporate networks, but that hasn\u2019t made many wireless LAN users take notice. By the end of last year, Gartner predicted that 30 percent of companies would put themselves at risk of serious security exposures by using wireless networks. Here are a few ways to make a wireless LAN more secure. \n\n\nEnable the security features that come with the wireless network. Yes, the wired equivalent privacy (WEP) standard for the popular 802.11 LANs has been broken into, but a little security is better than no security at all. \n\nDon\u2019t use default or obvious passwords or keys.\n\nRegister the unique media access control (MAC) addresses of the network interface cards that access your network. It is possible to fake a MAC address, but again, something is better than nothing. \n\nSecure the access points by putting them on switched network ports, as Gartner suggests, or by putting them outside a firewall. \n\nMonitor the network.\n\nMonitor physical security. Is there anyone sitting in the parking lot trying to listen in on the network? \n\nIf your applications are Web-based, use secure socket layer encryption. This adds an extra layer of security. \n\nUse a wireless virtual private network (VPN) or other tunneling protocol.\nIt may be impossible to eliminate risk, but it can be mitigated, especially when it comes to wireless LANs.