Protecting the network itself starts with segmentation, followed by securing login information for Wi-Fi access. This could ...