Topic 1: WirelessResearch the Internet and published research to find a recent wireless exploit that is not discussed in the textbook. Provide a brief summary of the exploit and the threat that it poses to an organization. Also identify a recommendation for how an organization can protect itself from the exploit. Respond to at least two of your peers’ postings by suggesting additional recommendations on how to protect the organization from the exploit and any additional risks that you associate with the exploit.