Breaking

A look back at the UK Cyber Survey is a wakeup call to update passwords

A look back at the UK Cyber Survey conducted by the National Cyber Security Centre (NCSC) in 2019 to study the compromised passwords and the patterns associated with it. As per NCSC UK Cyber Survey 42% of Brits are expected to lose their money to online fraud. And, 23.2 million compromised accounts worldwide were using 123456 as their password.

Brits were then asked to be safe after looking into the results of the UK Cyber Survey that exposed multiple gaps in security.

NCSC UK Cyber Survey and its breakdown

The survey was carried out independently and the findings were released in 2019. However, considering the importance of cybersecurity and password threats, The Cybersecurity Times thought it is important to spread the knowledge of password vulnerabilities, and how your current password looks for a study that is 2 years old.

If you think this is an old study, please check your passwords across platforms to see the pattern that is common with your password to the ones that was compromised. If you want to check for your password breaches in particular, please visit ‘Have I Been Pwned’ and you will know the breaches that compromised your credentials.

As per the study,

  • Only 15% of the subjects know how to protect themselves from the internet threats.
  • The common concern is money theft with 42% felt it could happen the next year as well.
Source: NCSC
  • One among three depend on their friends/family for cybersecurity.
  • Youngsters are more privacy aware compared to other subjects.
  • 61% of subjects are daily active on social media
Source: NCSC
  • Only 70% use smartphone PINS and passwords for their devices.
  • Only 50% use strong passwords for their email accounts
Source: NCSC

Look at the UK Cyber Survey’s compromised passwords and their patterns

Most used in totalNamesPremier League football teamsMusiciansFictional characters
123456 (23.2m)ashley (432,276)
liverpool (280,723)blink182 (285,706)superman (333,139)
123456789 (7.7m)michael (425,291)chelsea (216,677)50cent (191,153naruto (242,749)
qwerty (3.8m)daniel (368,227)arsenal (179,095)eminem (167,983tigger (237,290_
password (3.6m)jessica (324,125)manutd (59,440)metallica (140,841)pokemon (226,947)
1111111 (3.1m)charlie (308,939)everton (46,619)slipknot (140,833)batman (203,116)
Source: NCSC

Common names that were breached,

1. ashley432,27611. andrew261,453
2. michael425,29112. joshua259,079
3. daniel368,22713. justin256,388
4. jessica324,12514. anthony256,277
5. charlie308,93915. jennifer245,653
6. jordan297,88216. robert233,773
7. michael1294,66217. matthew221,591
8. thomas284,14818. andrea220,764
9. michelle278,54519. hannah219,400
10. nicole278,17020. george215,350
Source: NCSC

Premier League Team names as passwords that were breached,

1. liverpool280,72311. mancity13,796
2. chelsea216,67712. palace13,796
3. arsenal179,09513. cardiff12,594
4. man utd59,44014. leicester7,921
5. everton46,61915. fulham5,984
6. wolves35,25616. watford5,563
7. newcastle32,14317. southampton3,691
8. tottenham19,59618. burnley3,494
9. westham18,80119. bournemouthNot in the top 100k
10. brighton15,52320. huddersfieldNot in the top 100k
Source: NCSC

You can also look at the top 100,000 passwords (data from ihavebeenpwned) that were compromised. If you find your password in this list, please update it immediately.

Strong password practices for robust cyber hygiene

Cybersecurity is the new wealth of the  21st century and it will be more crucial once the evolution of Metaverse, Tesla, and other major tech giants up their game based on big data and privacy. Virtual Reality will take a new avatar once the Metaverse is released. The power of augmented reality with virtual reality may sound all fun and exciting but the cons could be extremely devastating if proper cyber hygiene isn’t practiced.

The cyber hygiene, best practices an all other things begins with ‘passwords’ first. Cybersecurity Times believes the device and credentials are two important things that connect to the web, while the devices are physical lets place the second important stuff next to our passwords.

Passwords play a vital role in account compromises, further concerns when a same password is used for multiple platforms. Practice password hygiene by replacing your weak passwords with strong ones, i.e; alphanumeric with a special character. Also ensure, you enable two-factor or multi-factor authentication based on the login options provided by the platforms.

For further hardening, use a password that is derived from a phrase, this is even stronger than the earlier suggestion. For example, ‘I Like to Play Football and Cricket during my teen’, now choose the first/last letter of the each word to coin your password, ‘iltpfacdmt’ or ‘ieoyldtgyn’.  These phrases will be easy to remember and are quite strong to evade cyberthreats.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

2 days ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago