This document discusses myths and realities about wireless network security. It begins by addressing common misconceptions, such as that wireless networks cannot be secured, wired networks are more secure, and that simple techniques like disabling the SSID broadcast provide adequate security. It then explains why these views are myths and why proper security requires centralization, authentication, encryption, authorization, and other best practices. The document advocates an approach following principles of defense in depth and least privilege to provide robust security for wireless networks.