Watch this video on YouTube
What is the PRIMARY aspect to concentrate on when investigating the potential security compromise of a newly implemented wireless network?