Having said that, as being the backoffice offers usage of the entire site, its configuration and all sensitive information stored while in the database, it have to be flawlessly safe. This article depends excessively on references to primary sources. Make sure you increase this text by introducing secondary or tertiary sources. Obtain sources: