NCSC warns 15% of Brits use their pet's name as a password

Independent survey reveals UK public still relies on memorable phrases to protect accounts

A man and his dog using a laptop

The UK's National Cyber Security Centre (NCSC) has warned that 15% of the British public are using the names of their pets as their passwords amid a rise in the demand for online services.

The findings revealed that many people in the UK are still reliant on memorable phrases to create passwords, with 13% of those questioned favouring significant dates, and 6% relying on their favourite sports teams.

Around (14%) used the name of a member of their family while 6% admitted to using 'password' as either all or part of their password, the report found.

The NCSC warned that many of these techniques were fundamentally flawed, and created passwords that could be either easily guessed or quickly broken during a brute force attack. For example, a hacker can crack your 'pet-themed' password simply by trying out the most popular animal names.

"We may be a nation of animal lovers, but using your pet's name as a password could make you an easy target for callous cyber criminals," said the NCSC's director for policy and communications, Nicola Hudson.

Related Resource

Taking a proactive approach to cyber security

A complete guide to penetration testing

A complete guide to penetration testing - whitepaper from CyberCxDownload now

"I would urge everybody to visit cyberaware.gov.uk and follow our guidance on setting secure passwords which recommend using passwords made up of three random words."

According to the NCSC survey, 27% of Brits added more than four new password-protected accounts last year, likely the result of a greater reliance on remote technologies and online services during the pandemic.

Last year, Eset security consultant Jake Moore demonstrated how criminals can use social media to hack accounts. In that case, Moore was able to bypass a colleague's security after guessing a password based on a favourite football team and a date of birth, both of which were displayed publicly on his target's social media profile.

Featured Resources

Virtual desktops and apps for dummies

An easy guide to virtual desktop infrastructure, end-user computing, and more

Download now

The total economic impact of optimising and managing your hybrid multi-cloud

Cost savings and business benefits of accelerating the cloud journey

Download now

A buyer’s guide for cloud-based phone solutions

Finding the right phone system for your modern business

Download now

What’s next for the education sector?

A new learning experience

Download now

Recommended

Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021
Biden calls for $22 billion in cyber security funding
Security

Biden calls for $22 billion in cyber security funding

18 May 2021
Avast’s Business Hub helps eliminate gaps in cyber defense
Security

Avast’s Business Hub helps eliminate gaps in cyber defense

18 May 2021
NETSCOUT threat intelligence report
Whitepaper

NETSCOUT threat intelligence report

18 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

30 Apr 2021