Authentication Methods Need to Evolve