This document discusses the risks of unauthorized wireless connectivity and provides best practices for securing wireless networks and devices. It outlines various threats such as poorly configured Bluetooth devices, rogue wireless access points, and unauthorized use of IPv6. The document recommends implementing intrusion detection and prevention, refined network access controls, role-based access controls, user education, and mobile device security management to help mitigate these risks. The overall message is that wireless technologies introduce new security risks that cannot be ignored and existing security measures need to be reevaluated.