In the next chapter, we will explore some of the other built-in Access security techniques like encryption and database passwords. The real-world issues that password crackers have brought to these options will taint these discussions. In addition, if you already use or want to take your workgroup security further, you will need to read in more detail about the problems with the workgroup files so that you can appreciate why I have to advocate the developer workgroup strategy in this chapter and the PID authentication strategy in Chapter 10.