In the next chapter, we are going to look at how we can best secure data in our databases by building on the developer workgroup strategy discussed in Chapter 8 and incorporating security for different groups of users. We are also going to make sure that we minimize the possibility that password retrieval software will reveal data secured by workgroups with different levels of access. Once the fundamentals of securing data are explained, I will then expand on such topics as using the User -Level Security wizard to set up workgroup security rapidly and using owner permission queries to hide table and query designs, fields, and subgroup data for different user groups.