The document discusses the threat of "soft rogue APs" which are wireless access points created unintentionally or maliciously using laptops or other wireless devices connected to an enterprise network. Soft APs are easy to enable and can provide unauthorized wireless access to the enterprise network. The document reviews common methods for creating soft APs and recommends using a wireless intrusion prevention system to continuously monitor for and block soft AP activity to protect the network.