This white paper enlists multiple attacks that can exploit enterprise resources via wireless network and how controlled wireless network access helps in eliminating them.