You can never win when it comes to security.
But between the two, what would you rather not say to someone for whom you built a DB?
1. "I didn't implement security on the data (BE) and now it is lost/corrupted/compromised."
2. "I didn't implement security on my code (FE) and now it is lost/corrupted/compromised."
While a fastidous network administrator can hide your DB file, I would guess that, in the end, your tables are not terribly secure. Anyone with elementary DOS skills would be able to see a hidden file. And many network admins are overstretched and prone to boo-boos while some network admins are sloppy and others just don't know security or don't care.
Yet even with a cleverly locked down network, because Access requires write and edit rights to the Access file and read-write-delete permissions to the DB folder you are always vulnerable. That doesn't mean anything will happen that you will later regret, nor does it mean the chances of anything happening are high, but it does mean a person who is determined to get access to your DB probably will -- certainly your net admins can do as they please if there's no Jet security implemented on the tables.
But here's the final catch: Jet security is not impregnable. There are "password recovery tools" available on the Internet that can retrieve VBA and workgroup passwords.
Regards,
Tim