People pick weak passwords or reuse them over devices, tokens are lost, compromised or bypassed, and biometrics can be forced ...