The 2004 Remote Office Networking Technology Tour is now history. Toni Kistner and I had a great time visiting readers in New York, Washington D.C., Houston and Chicago, and hope those of you who came enjoyed yourselves. You can hear highlights of my presentation\u00a0here.security\u00a0concerns dominated the discussions, with the same questions popping up in every city: How do we convince the boss the importance of strong security? How much should we spend on security? What\u2019s sweet spot between overspending and wasting profits and underspending and leaving the company vulnerable?wireless networks. One attendee reported being startled by his home printer one day when it spat out a resume. Not his resume, but that of a neighbor who linked to the wrong printer over an unsecure wireless network.\u00a0\u00a0\u00a0\u00a0As always,\u00a0Start by measuring the cost of making security mistakes. Track the time and money spent cleaning up after the last virus attack, for instance. The cost is much greater than that of keeping your anti-virus protections up to date, I guarantee you. Keep clippings of attacks on other companies, especially those in your industry, and show them to the boss.One vendor told how a new customer learned, painfully, that buying his company\u2019s endpoint security software cost less money than buying pizza for all the workers who spent four nights cleaning up after a virus outbreak. Not less than the overtime, but less than the cost of the pizza itself.\u00a0\u00a0\u00a0Many asked about securing\u00a0Corporate IT departments struggle daily against users installing unauthorized inexpensive wireless access points and creating gaping security holes. Attendees admitted to being much more diligent searching out rogue access points in headquarters than in branch offices. Have you checked your small office for rogue access points? Think your company\u2019s too small to worry about them?\u00a0\u00a0If managers won\u2019t listen to you, take them out into the parking lot and demonstrate how easy it is to connect to your company network while sitting in your car.\u00a0Small business owners are motivated by money. Not in a greedy way like corporate CEOs, but in\u00a0 the \u201cneed money to make payroll on Friday\u201d way. Save by doing the small things right: Password-protect all network resources, make users create decent passwords, back up your data, and keep your applications up to date.\u00a0When all else fails, let the owner's secretary computer get clobbered. The owner might not turn on his or her computer that often, but the secretary or office manager who keeps the business running rides a computer hard. When that computer stops, the business stops, including invoicing.Sabotage? No. Selective protection to make a point? Works every time.