Time for action – enumerating wireless security profiles