This is the second blog in a three-part series on Wi-Fi Protected Access (WPA) security. Following on from the initial post, which outlined how to deploy a secure WPA Enterprise wireless environment, this second blog gives a concise overview of possible attack vectors against WPA Enterprise networks and how to mitigate them.