In this chapter, we have seen that Microsoft Access protection and security is vulnerable on a number of fronts, including importing, passwords, workgroup security, and incorrectly used encryption. The importing option is a built-in threat, while the password retrieval programs leave all the Access passwords vulnerable. Thankfully, there are measures that you can take to reduce or remove these weaknesses, including using Access workgroup security and hiding the location and password of the password-protected database and the workgroup files.