On Ethernet networks, use switches to isolate traffic.
Consider using low-level encryption mechanisms in enterprise networks, or to "tunnel" through external networks.
Do not depend on IP addresses or DNS information for authentication.
Do not depend on header information in news articles or email as they can be forged.