Your organization has decided to implement hardware security keys as part of the multi-factor authentication process. This decision aligns with the corporate policy to enhance security but has received objections from remote workers who find it cumbersome. How would you address the objections from remote workers while maintaining alignment with corporate security policies?