decent description of the wireless security hype
http://www.eweek.com/article2/0,3959...09KTX1K0100440
its a "management" level article that more or less talks about "security" via wireless and via wired connections. Each has its limitations, and being aware of the problems and acting accordingly should be enough to keep things under control.
Again, limit your services (in other words, don't run netbeui or netbios protocols with share level security). Shut down unnecessary ports (run some firewalling software), and be aware that some people may want to get your information. Much more likely, however, for the home user, is that people may want to steal your bandwidth for downloading, etc.
If you are more or a "corporate" level wireless person, then using an IPSEC VPN tunnel to a singluar WAP access machine may be preferable. That way, all wireless traffic is encrypted using a very tried and true method, and it is cross-platform, including Mac and *ux support.
Also, if all the traffic is encrypted with REAL encryption, then people can't steal bandwidth, information, or anything else. Use a revolving key/random generation setup, and the likelyhood of being cracked lessens.
There are many examples of secure wireless implementations, not the least of which would be limiting the area that can "hear" the WAP. They offer handheld WAP detectors inexpensively, and doing a quick sweep of your premises can determine that the WAP may need to be moved, or a different type of antenna may be more optimal.
Unless you are running large network software, or large inter-network file transfers, remember that your internet connection does NOT utilize the bandwidth limitations of even 11mbps.
Be smart, read up, and be aware. Heck... if you're so inclined, remember that to hack a Wierless Network, the cracker is ALSO broadcasting packets, and there are a few key packet types that may indicate a crack attempt. Having a SNORT installation to sniff out others sniffing around may give you an indication if you NEED the additional security of an IPSEC VPN or other solution.
If you are looking for a hand in designing that system using inexpensive equipment, grab an old p2 machine, install the latest Linux Kernel (use the "beta" 2.6 for included support) and run a simple VPN with the linux box acting as a IPSEC router. I'm using this at the office, and I'm feeling much more secure.
I'd be happy to provide some pointers/instructions in setting up this environment.