Wireless networks are vulnerable to attacks if not properly secured. The document provides guidance on securing wireless networks through steps like enabling WPA2 encryption, changing default passwords, disabling unneeded services, updating firmware, using firewalls and intrusion detection. It emphasizes implementing a layered security approach using policies, procedures, logging, monitoring and educating users to protect wireless networks and the overall infrastructure.