Rogue Wi-Fi Access Points
|Encrypt Network Traffic||
Application-layer encryption (e.g. use of the Transport Layer Security protocol) or a Virtual Private Network (VPN) tunnel (e.g. using the IPsec protocol) may help mitigate use of untrusted Wi-Fi networks.
Enterprise policies could be provisioned to devices to control the Wi-Fi access points that they are allowed to connect to.