Menu
Business.com aims to help business owners make informed decisions to support and grow their companies. We research and recommend products and services suitable for various business types, investing thousands of hours each year in this process.
As a business, we need to generate revenue to sustain our content. We have financial relationships with some companies we cover, earning commissions when readers purchase from our partners or share information about their needs. These relationships do not dictate our advice and recommendations. Our editorial team independently evaluates and recommends products and services based on their research and expertise. Learn more about our process and partners here.
The IEEE 802.11ax draft standard promises improved range, throughput, and resiliency.
At the start of the millennium, the Wired Equivalent Privacy (WEP) security protocol allowed encrypted data to be sent securely between two endpoints. In 2003, the protocol was replaced by Wi-Fi Protected Access (WPA) after serious vulnerabilities in WEP were found. An improved version, WPA2, followed in 2004, eventually replaced by WPA3 in 2018.
We’ll outline the development of WPA and how you can deploy WPA3-Enterprise across your company to ensure compliance with the Health Insurance Portability and Accountability Act (HIPAA) and adherence to General Data Protection Regulation (GDPR) personal data protection requirements.
Wi-Fi Protected Access (WPA) is a security protocol designed to protect wireless networks by encrypting data transmissions and restricting unauthorized access. Based on the draft IEEE 802.11i standard, WPA was introduced in 2003 as a replacement for the flawed Wired Equivalent Privacy (WEP) protocol, addressing its known vulnerabilities.
Primarily intended for wireless enterprise networks, WPA introduced several significant security enhancements.
Within a year, however, security researchers discovered a WPA flaw that exploited previous WEP weaknesses and MIC feature limitations, prompting the need for additional wireless security standard improvements.
WPA2, introduced in 2004, significantly enhanced Wi-Fi security by implementing AES (advanced encryption standard) encryption and CCMP (counter mode cipher block chaining message authentication code protocol) to strengthen home and business network protection.
WPA2 had two operating modes:
WPA2-Enterprise deployment required the following:
WPA3, introduced in 2018, addressed critical vulnerabilities that persisted in WPA2 and strengthened overall network security. It also introduced additional privacy protections, stronger encryption, and enhanced device authentication mechanisms.
“WPA3-Enterprise builds on the security of WPA2-Enterprise,” said Matt MacPherson, wireless chief technical officer at Cisco. “[It brings] additional security capabilities, such as stronger encryption suites and protected management frames while allowing the use of multiple authentication mechanisms (EAP methods).”
WPA3’s key enhancements include:
Like WPA2, WPA3 has both home and enterprise modes.
“Foundationally, WPA3-Enterprise provides additional protection over WPA2 from malicious deauthentication and disassociation through the use of protected management frames,” MacPherson said. “WPA3 also has additional modes of operation that enable stronger cryptographic security and prohibit the use of legacy encryption like WEP and TKIP.”
WPA3-Enterprise deployment relies on the IEEE 802.1X authentication framework, which enables secure user authentication over a network.
In this framework:
Users are assigned login credentials (such as a username and password or a digital certificate) to enter when connecting to the network. Unlike WPA2-Personal, users do not see or manage encryption keys, which are never stored on the device.
This setup boosts security by preventing unauthorized access from lost or stolen devices or former employees. When a user attempts to connect to the network, login credentials are sent through a virtual port. If successful, the encryption keys are distributed, granting the user full access.
Once you decide which RADIUS server option best suits your organization’s needs, you will configure it within the corresponding EAP, access point (AP), and user authentication settings.
Your EAP choice depends on the security level you need and your server and client specs. Although there are more than 10 EAP types, the three most widely used are:
The steps for configuring the APs require you to enable WPA3-Enterprise-only mode or transition mode by setting the AKM suite to 00-0F-AC:5 (802.1X with SHA-256). Your APs will use AES-CCMP encryption, so make sure to turn off older encryption methods, such as TKIP and WEP. You also need to enable protected management frames (PMF) to help secure your network.
On the client side, set up your usernames and passwords or client certificates if you choose to use them. You’ll need to do it for every laptop, tablet, smartphone, or other device that connects to your server. Enabling fast roaming and server certificate validation, if available, will further boost connection speed and security.
Implementation may vary depending on the hardware and software you choose.
Protecting your business from data breaches and ensuring compliance with industry regulations in the wireless enterprise is a continuous task. Key challenges in wireless security are constantly evolving because every enterprise is different. Some IT teams struggle with the impact of bring-your-own-device (BYOD) policies, while others seek ways to allow secure guest access without compromising mission-critical systems.
The IEEE 802.11 working group and Wi-Fi Alliance continue to address emerging wireless security needs, now offering innovations such as IEEE 802.11be, better known as Wi-Fi 7. This update brings major performance improvements:
Additionally, major platform vendors now offer AI-driven security solutions to help manage access controls, detect vulnerabilities, and automate network security policies, reducing the burden on IT teams.
Wi-Fi continues to evolve and adapt to business needs. Although 2.4 GHz was once the norm in wireless networking, Wi-Fi 7 has expanded operation into multiple frequency bands and brought significant advancements, such as increased capacity and better performance in dense environments.
When it comes to security, WPA3, certified through the Wi-Fi Alliance’s Wi-Fi Certified program, has emerged as the latest and most secure protocol. It significantly strengthens encryption, protects against brute-force attacks through SAE and provides transition modes for mixed WPA2/WPA3 environments. Importantly, although WPA2 networks remain secure when properly maintained, WPA3 offers additional security enhancements for those who need them.
“WPA3 has been recommended since the start of certifications in 2018. With prior generations of Wi-Fi … WPA3 has been optional,” MacPherson said. “With new generations such as Wi-Fi 6E and Wi-Fi 7, WPA3 is required. This leads to stronger security with broader adoption. As Wi-Fi 6E and Wi-Fi 7 are deployed in the enterprise, WPA3-Enterprise will become the standard.”
The Wi-Fi Alliance and other entities are constantly developing new security methods and certifications to ensure optimal protection. As such, updating firmware and drivers regularly, adopting the latest standards, and keeping informed about advancements in security protocols are paramount to maintaining a secure network.
Ensure your organization has adopted the latest technologies, such as Wi-Fi 7 and WPA3. Enjoy the convenience and productivity of Wi-Fi, but do it safely.
Jeremy Bender contributed to this article.