In todays interconnected world, we interact with applications and systems on myriad devices, from smartphones and tablets to desktop computers, baby monitors, wearable technology and even our cars. To authenticate, we need to share something to identify ourselves and some sort of shared secret, which in most cases is a password. In most cases, passwords are rather weak, and when they are, they can be easily guessed or cracked. To combat compromise due to weak or stolen passwords, many organizations have implemented two-factor authentication.”]
Source: https://securityintelligence.com/posts/long-live-the-password-even-if-you-dont-want-it-to/

