In addition to encrypted passwords and encrypted connections, you can secure your system by using the file permissions of the operating system, by limiting access to the security configuration files, and by limiting access to the servers.