Instead of relying solely on a password, which can be discovered through repeated attempts, stolen, or leaked.