Lynne runs a small hotel, and as a value added for his customers he has implemented a Wi-Fi hotspot. Lynne has read news articles about how hackers wait at hotspots trying to take advantage of unsuspecting users. He wants to avoid this problem at his hotel.
What is an efficient and practical step that Lynne can take to decrease the likelihood of active attacks on his customers wireless computers?