UK Cyber Centre Says Use Passkeys Instead of Passwords

A2

UK Cyber Centre Says Use Passkeys Instead of Passwords

Introduction

The UK's National Cyber Security Centre (NCSC) now tells people to use passkeys. Passkeys are a new way to log in. They are better than passwords.

Main Body

A passkey is a digital key on your phone or computer. You use your face or finger to log in. No one can steal it from far away. Each passkey works for only one website. Apple, Google, and X support passkeys. Many people in the UK use them. The UK government also uses passkeys. The NCSC says the technology is now ready. Experts say passkeys are faster and safer. But they are not perfect. If you lose your phone, you may have problems. Keep your PIN secret. A family member should not know it. If you cannot use a passkey, use a password manager. Do not use simple passwords like "123456" or "password". Always update your apps and phone. Do not click on strange links.

Conclusion

The NCSC says passkeys are the future. They are safer and easier. Use them when you can. For other times, follow good safety rules.

Vocabulary Learning

finger (n.)
digit / one of the five long parts of your hand手指
Example:You use your face or finger to log in.
password (n.)
secret code / a secret word or phrase that you need to know to get into a computer or website密碼
Example:Do not use simple passwords like '123456'.
phone (n.)
mobile / a device used to make calls and access the internet電話
Example:A passkey is a digital key on your phone or computer.
safe (adj.)
secure / not in danger; protected from harm安全
Example:Experts say passkeys are faster and safer.
use (v.)
employ / to do something with something for a purpose使用
Example:The UK Cyber Centre tells people to use passkeys.

Sentence Learning

The UK's National Cyber Security Centre (NCSC) now tells people to use passkeys.
Time Marker: 'now' shows the action is happening at the present time.時間標記:「現在」表示動作發生在當下。
A passkey is a digital key on your phone or computer.
Prepositional Phrase: 'on your phone or computer' tells where the key is located.介詞短語:「在你的手機或電腦上」說明鑰匙所在的位置。
Experts say passkeys are faster and safer.
Connector: 'and' joins two ideas (faster, safer) together.連接詞:「和」連接兩個想法(更快、更安全)。
But they are not perfect.
Connector: 'But' shows a contrast or opposite idea.連接詞:「但是」表示對比或相反的想法。
If you lose your phone, you may have problems.
Connector: 'If' introduces a condition that leads to a result.連接詞:「如果」引入一個條件,導致某個結果。
B2

UK National Cyber Security Centre Recommends Passkeys as Replacement for Passwords

Introduction

The UK's National Cyber Security Centre (NCSC) has updated its advice. It now recommends that users adopt passkeys as the main method of authentication for digital services. This effectively means the NCSC no longer supports the use of traditional passwords where passkeys are available. The change reflects the agency's assessment that passwords are not strong enough to resist modern cyber threats.

Main Body

The NCSC made the announcement on Thursday. It marks a clear change from decades of using passwords for security. The agency stated that passkeys – a way to log in without a password – should be the first choice for users on all digital platforms. Passkeys are digital credentials stored on a user's device. They are created using public key cryptography. Unlike passwords, they cannot be stolen through phishing attacks because no secret information is sent during login. Instead, the user's device checks their identity using biometric methods, such as facial recognition or fingerprint scanning, or a device PIN. Each passkey is unique to a specific website or app. Even if a service's database is hacked, the private key stored on the device stays safe from attackers. Major platforms are already adopting passkeys. Apple, Google, and X support the technology. Google reported that just over 50% of its UK users have registered a passkey. The Fido Alliance, an industry group that promotes passwordless authentication, said that passkeys are now supported on all major operating systems, browsers, and by third-party providers. The UK Government also added passkeys to its digital services last year. The NCSC admitted that it had previously avoided supporting passkeys because of implementation problems and uneven support, but now believes those issues are mostly solved. Experts have given careful comments on this change. Dave Chismon, a senior technical expert at the NCSC, pointed out that passwords have never been perfect. Extra security measures, like two-factor authentication, make things harder for users and are still at risk from phishing. He said passkeys are faster and easier for users. Jonathan Ellison, the NCSC's director for national resilience, described passkeys as a user-friendly alternative. They provide stronger overall security and reduce the mental effort of remembering passwords. However, some cybersecurity experts have warned that passkeys are not a perfect solution. Daniel Card from the BCS, the Chartered Institute for IT, noted that losing a device or losing access to it can make passkey setup difficult. Alan Woodward, a professor of cybersecurity at the University of Surrey, said that although facial recognition has improved with liveness detection, risks still exist. For example, a family member or partner might know a device's PIN. He stressed that keeping the PIN private is an obvious way to protect yourself. The NCSC also repeated its general cybersecurity advice. Where passkeys are not available, users should use a password manager to create and store strong, unique passwords, and turn on multi-factor authentication. Other advice includes updating apps and operating systems regularly, avoiding suspicious emails and links, and never using the same password on different sites. The fact that weak passwords like '123456' and 'password' are still common was highlighted as a continuing weakness. This shows why moving to passkeys is important.

Conclusion

The NCSC's recommendation is a major change in how we think about logging in. It puts passkeys first as a more secure and user-friendly option than passwords. Although there are limitations – for example, you need access to your device and broad support from platforms – the growing use by big tech companies and government services suggests that passkeys will become common. Users are advised to use passkeys where possible and to keep good cybersecurity habits in all other situations.

Vocabulary Learning

authentication (n.)
Verification / The process of proving that something is genuine or that someone is who they claim to be.認證
Example:The UK's National Cyber Security Centre now recommends that users adopt passkeys as the main method of authentication for digital services.
biometric (adj.)
Biological / Relating to the measurement and analysis of unique physical or behavioral characteristics, such as fingerprints or facial patterns, used for identification.生物特徵
Example:The user's device checks their identity using biometric methods, such as facial recognition or fingerprint scanning.
credentials (n.)
Login details / Information used to verify identity, such as usernames and passwords.憑證
Example:Passkeys are digital credentials stored on a user's device.
phishing (n.)
Cyber fraud / A type of cyber attack where criminals trick people into giving away sensitive information by pretending to be a trustworthy entity.網絡釣魚
Example:Unlike passwords, passkeys cannot be stolen through phishing attacks because no secret information is sent during login.
resilience (n.)
Robustness / The ability to recover quickly from difficulties; in cybersecurity, the capacity to withstand and recover from attacks.韌性
Example:Jonathan Ellison, the NCSC's director for national resilience, described passkeys as a user-friendly alternative.

Sentence Learning

Unlike passwords, they cannot be stolen through phishing attacks because no secret information is sent during login.
Passive Voice The phrase 'is sent' is passive, focusing on the action rather than who sends it. Linking word: because shows cause and effect.被動語態 'is sent' 是被動式,強調動作而非誰執行。 連接詞: because 表示因果關係。
Even if a service's database is hacked, the private key stored on the device stays safe from attackers.
Passive Voice 'is hacked' is passive, indicating the database is attacked. Reduced Relative Clause 'stored on the device' is a reduced relative clause (which is stored). Linking: Even if introduces a concession.被動語態 'is hacked' 是被動式,表示數據庫被攻擊。 簡化關係從句 'stored on the device' 是簡化關係從句(which is stored)。 連接詞: Even if 表示讓步。
Alan Woodward, a professor of cybersecurity at the University of Surrey, said that although facial recognition has improved with liveness detection, risks still exist.
Contrast: although introduces a contrast between improvement and remaining risks. Reported Speech with that clause 'said that' introduces the reported statement.對比: although 引出改進與仍然存在風險之間的對比。 間接引語 with that 從句 'said that' 引出報告的陳述。
The fact that weak passwords like '123456' and 'password' are still common was highlighted as a continuing weakness.
Passive Voice 'was highlighted' shifts focus to the fact being emphasized. Appositive that clause 'that weak passwords... are still common' explains 'the fact'.被動語態 'was highlighted' 將焦點轉移到被強調的事實。 同位語 that 從句 'that weak passwords... are still common' 解釋 'the fact'。
This effectively means the NCSC no longer supports the use of traditional passwords where passkeys are available.
Relative clause with where 'where passkeys are available' modifies 'traditional passwords', specifying the condition. Linking: no longer indicates a change in policy.關係從句 with where 'where passkeys are available' 修飾 'traditional passwords',說明條件。 連接詞: no longer 表示政策上的改變。
C2

UK National Cyber Security Centre Recommends Passkeys as Replacement for Passwords

Introduction

The UK's National Cyber Security Centre (NCSC) has issued a revised recommendation advising users to adopt passkeys as the primary method of authentication for digital services, effectively deprecating the use of traditional passwords where passkeys are available. This change reflects an assessment that passwords are insufficiently resilient against contemporary cyber threats.

Main Body

The NCSC's announcement, made on Thursday, marks a deliberate departure from decades of reliance on password-based security. The agency stated that passkeys—a form of passwordless authentication—should be the first choice for consumers across all digital platforms. Passkeys function as a digital credential stored on a user's device, generated through public key cryptography. Unlike passwords, they cannot be stolen via phishing attacks because no secret information is transmitted during login. Instead, authentication is performed at the device level using biometric methods (e.g., facial recognition or fingerprint scanning) or a device PIN. Each passkey is unique to the specific website or application, and even if a service's database is breached, the private key held on the device remains inaccessible to attackers. Adoption of passkeys has been growing across major platforms. Apple, Google, and X already support the technology, and Google reported that just over 50% of its UK users have registered a passkey. The Fido Alliance, an industry association promoting passwordless authentication, stated that passkeys are now supported across all major operating systems, browsers, and by third-party providers. The UK Government also integrated passkeys into its digital services last year. The NCSC acknowledged that it had previously refrained from endorsing passkeys due to implementation challenges and uneven support, but now considers those obstacles largely resolved. Expert commentary on the shift has been measured. Dave Chismon, a senior technical expert at the NCSC, noted that passwords have never been a perfect solution because additional security measures—such as two-factor authentication—increase user burden while remaining vulnerable to phishing. He described passkeys as quicker and simpler for users. Jonathan Ellison, the NCSC's director for national resilience, characterized passkeys as a user-friendly alternative that provides stronger overall resilience and alleviates the cognitive load of remembering passwords. However, some cybersecurity professionals have cautioned that passkeys are not a panacea. Daniel Card of the BCS, the Chartered Institute for IT, observed that losing a device or losing access to it can complicate passkey configuration. Alan Woodward, a professor of cybersecurity at the University of Surrey, noted that while facial recognition has improved with liveness detection, risks remain—for example, a family member or partner knowing a device's PIN. He emphasized that keeping the PIN private is an obvious defense. The NCSC also reiterated broader cybersecurity hygiene recommendations. Where passkeys are not supported, users should employ a password manager to generate and store strong, unique passwords, and enable multi-factor authentication. Other advice includes regularly updating apps and operating systems, avoiding suspicious emails and links, and never reusing passwords across sites. The persistence of weak passwords—such as "123456" and "password"—was highlighted as a continuing vulnerability, underscoring the rationale for transitioning to passkeys.

Conclusion

The NCSC's recommendation represents a significant evolution in authentication strategy, prioritizing passkeys as a more secure and user-friendly alternative to passwords. While not without limitations—such as dependency on device access and the need for broad platform support—the growing adoption by major technology firms and government services suggests a trajectory toward widespread implementation. Users are advised to adopt passkeys where available and to maintain robust cyber hygiene practices in all other contexts.

Vocabulary Learning

alleviates (v.)
Relieve / To make something less severe or burdensome減輕 / 使(負擔、問題)變得不那麼嚴重
Example:Passkeys alleviate the cognitive load of remembering complex passwords.
deprecating (v.)
Disapprove / To recommend against the use of something, often marking it as outdated貶抑 / 正式建議停止使用(尤指技術上淘汰)
Example:The NCSC is effectively deprecating traditional passwords in favor of passkeys.
panacea (n.)
Cure-all / A solution or remedy believed to solve all problems萬靈丹 / 被認為能解決所有問題的解決方案
Example:Cybersecurity professionals have cautioned that passkeys are not a panacea for all security issues.
resilient (adj.)
Robust / Able to resist or recover quickly from adverse conditions具韌性 / 能夠抵禦或迅速恢復
Example:The assessment concluded that passwords are insufficiently resilient against contemporary cyber threats.
trajectory (n.)
Path / The course or direction of development軌跡 / 發展的方向或路徑
Example:The growing adoption by major firms suggests a trajectory toward widespread implementation.

Sentence Learning

The NCSC's announcement, made on Thursday, marks a deliberate departure from decades of reliance on password-based security.
Reduced Relative Clause & Nominalization: The sentence uses a reduced relative clause ("made on Thursday") which omits the relative pronoun and auxiliary verb ("which was made"), creating a compact participial phrase. Additionally, the nouns "departure" and "reliance" are nominalizations, converting actions into abstract nouns, which increases lexical density and formality.本句使用了簡化關係子句("made on Thursday"),省略了關係代名詞和助動詞("which was made"),形成緊湊的分詞片語。此外,"departure" 和 "reliance" 是名詞化用法,將動作轉化為抽象名詞,增加了詞彙密度和正式感。
The NCSC acknowledged that it had previously refrained from endorsing passkeys due to implementation challenges and uneven support, but now considers those obstacles largely resolved.
Complex Subordination & Object Complement: The sentence features a complex subordinate clause introduced by "that", containing past perfect tense ("had refrained") to indicate prior action. The main clause uses an object complement structure: "considers those obstacles largely resolved" where "largely resolved" complements the object "those obstacles", describing its state. This construction is typical of formal writing.本句包含由 "that" 引導的複雜從屬子句,使用過去完成式("had refrained")表示先前的動作。主句使用了受詞補語結構:"considers those obstacles largely resolved",其中 "largely resolved" 補充說明受詞 "those obstacles" 的狀態。此結構常見於正式寫作。
Jonathan Ellison, the NCSC's director for national resilience, characterized passkeys as a user-friendly alternative that provides stronger overall resilience and alleviates the cognitive load of remembering passwords.
Appositive Phrase & Relative Clause: The sentence begins with an appositive phrase ("the NCSC's director for national resilience") that renames the subject, providing additional information without a separate clause. It then uses a relative clause ("that provides... and alleviates...") to modify "alternative", embedding two parallel verb phrases. This adds complexity and detail.本句以同位語片語("the NCSC's director for national resilience")開頭,重新說明主詞,無需獨立子句即可提供額外資訊。接著使用關係子句("that provides... and alleviates...")修飾 "alternative",嵌入兩個平行動詞片語,增加了複雜性和細節。
Daniel Card of the BCS, the Chartered Institute for IT, observed that losing a device or losing access to it can complicate passkey configuration.
Appositive Phrase & Gerund as Subject: The sentence includes an appositive ("the Chartered Institute for IT") specifying the organization. The subordinate clause uses gerund phrases ("losing a device or losing access to it") as the subject of the verb "can complicate". Gerund subjects are a hallmark of advanced English, allowing actions to be treated as nouns.本句包含同位語("the Chartered Institute for IT")具體說明組織名稱。從屬子句使用動名詞片語("losing a device or losing access to it")作為動詞 "can complicate" 的主詞。動名詞主詞是高階英語的特徵,允許將動作視為名詞。
While not without limitations—such as dependency on device access and the need for broad platform support—the growing adoption by major technology firms and government services suggests a trajectory toward widespread implementation.
Concessive Phrase & Complex Subject with Nominalization: The sentence opens with a concessive phrase ("While not without limitations") that acknowledges a counterpoint, followed by a dash-enclosed example. The main subject is a complex noun phrase ("the growing adoption by major technology firms and government services") containing nominalization ("adoption") and prepositional phrases. This structure allows dense information packing typical of C2 level.本句以讓步片語("While not without limitations")開頭,承認一個反論點,隨後以破折號插入舉例。主詞是一個複雜的名詞片語("the growing adoption by major technology firms and government services"),包含名詞化("adoption")和介詞片語。此結構允許密集的資訊包裝,是C2等級的典型特徵。