Which of the following is a best practice for wireless network security?