It depends on your authentication of the user, the crypto algorithms and your policy.
If your algorithms are considered secure enough and the authentication (brute forceable passwords etc) are secure for your policy, I believe they are secure enough.
You are keeping a door open for users to come in. It is all a matter how well locked the door is and how secure you consider it to be.
I hope it helps.
PK