has been made in the availability of clients and servers supporting strong
authentication (e.g. SMTP, LDAP).†
Revisit the Critical Host policy and update with new requirements for
strong authentication, and possibly encryption for those applications for which it
Proposal Subject to Approval
increasingly likely that critical, unencrypted passwords and† sensitive email messages may be captured, particularly on
wireless networks where anyone with a wireless card can view anyone elseís
network traffic unless it is encrypted.