About as secure as employing micheal jakson as the body guard for your 13 year old son
Implement some auditing software across the whole network. The software at my university doesnt allow hardly anything to be executed. And if you want to execute something you have to ask for permission. However i did write a bat script that i dropt into the startup folder, using a simple elevation trick I managed to bypass this security. I executed nmap, then went and got a technician to come and see what i had done.
I then had to teach the so called technician how to add a line of code to the unallowed sect of the auditing conf. Point is know your software , exactly what, how and why it works. As for wirless like i said before its only secure untill someone finds a way to make it unsecure, You dont want your network being vulnarable to this new attack, So make sure when your network has been infiltrated, pulling out infor is still hard work. So with the right restrictions right security right data encryption and proper monitering of your network your making it as safe as can be FOR NOW.