Once the access points are known, then software can be used to track the users on the network and restricts them to approved paths for accessing data and applications.
Having such technical controls in place to enforce security policies is key to good security, experts say.
"You can't just have some policies on paper," Foomany said. "You have to implement them through security mechanisms."
Sign up for CIO Asia eNewsletters.