Theres not really any reason for it to be harder, once you have physical access to a box (required to reboot/recover etc), it might as well be rooted. The way to counteract this is encryption. Sure you can make it harder, using things like bios passwords and disabling certain boot modes, it only slows people down.
I suppose you are right. thankfully it was easy as Ive just started using Linux Mint and forgot my password. Off to set a BIOS password...
Can a BIOS password not be reset just by taking out the CMOS battery though?
The only way I can think of really having security is encryption on your actual files. Maybe a secure external drive.
But otherwise BIOS passwords, GRUB etc are just very time consuming ways for the user, but quick ways for the attacker.
Furthermore you can disable the grub menu, making it much more difficult to pass the single flag to the kernel before it boots.
Not all distros have the failsafe option at boot. Ubuntu does but most do not.