On an individual level, users may choose to create complex unpredictable passwords, which they don't tell anyone about. If this is the case, a password is stronger than other authentication methods, which may be fooled by an attacker or forcibly obtained from a person (e.g. biometric data).
Having one set of valid credentials may be all that is needed to gain access to restricted resources. In an organization, for example, many people will have access to the same resources which are restricted from the outside. A chain is only as strong as its weakest link. And for passwords, this is mostly the user: