Nonetheless, as the backoffice gives access to your complete site, its configuration and all delicate information stored in the database, it needs to be completely safe. This informative article depends excessively on references to Major sources. Be sure to increase this short article by introducing secondary or tertiary sources. Locate sources: