How to sabotage your wireless network
All too many businesses start a wireless network by installing Wi-Fi the same way you would at home. They will buy a low-end, consumer-grade access point from a Linksys, D-Link, or Buffalo Technology and put it in a common area, such as a conference room. Just like that, potentially for less than $100, you have a wireless network that is convenient for your employees and guests to use. You saved a bundle, but it's a big mistake.
Let's assume you have enough technical savvy to deploy the WAP (wireless access point) properly and transmit on a channel in which there is limited interference. If not, you could create a self-inflicted denial of service by choosing a frequency currently being used by your secretary's cordless phone. Because cordless phones often transmit on the same 2.4GHz or 5GHz frequencies need for Wi-Fi, your browser may time out or your email stop every time someone calls the secretary -- and now you know why.
But let's assume you were smart enough to avoid that. Let's assume you also know to enable best security practices such as using WPA2 (Wi-Fi Protected Access 2), because if you botch the security you may have an even bigger problem on your hands. Choosing weak encryption/authentication, or none whatsoever, is an open invitation to the bad guys and a security breach.