Is Tik Tok as Dangerous as People Believe?

 

The following post is a summary of a blog article published by our cybersecurity partner BitLyft with additional comments by this author. 

We have all seen the popularity of TikTok explode in recent months, perhaps due to shelter-in-place orders and people tending to be more isolated due to COVID-19. It quickly became a preferred method of interaction for social media, and people are making money for video views, similar to how YouTube works. The app has algorithms to suggest and target content based on your likes and dislikes, allowing content to “go viral” quickly. Among social media influencers, this is huge.

Is TikTok spyware?

is Tik Tok dangerous

TikTok was especially popular in India, until the country recently banned it and 58 other Chinese-owned apps, while China and the United States still measured over two hundred million downloads. Given the widespread adoption, security concerns became more widespread. The data types and amounts collected are the basis of security concerns, but the app is in the same league as other US-based apps when it comes to collecting data. Generally, it collects device type and operating system, location data, and video history, although a Wall Street Journal investigation alleged it collected MAC addresses and other device identifiers. One important “feature” was the app’s ability to access the clipboard—the copy/paste function—in order to prevent users from spamming comments across multiple videos. This presented a significant security risk and was later disabled.

 

Is the TikTok threat real or political?

Much of the concern around TikTok is speculative and not necessarily based on factual evidence; however, we know the concerns are real. Most people who use TikTok probably are unconcerned with the information gathered after they install the app. Those casual users who are more concerned with the collection and dissemination of their info can simply not install/uninstall the app.

Given that the parent company of TikTok (ByteDance) is under Chinese control, we can speculate that the Chinese government could use the data for espionage or political gain. Since we have no evidence this has occurred, we cannot say for sure it is an issue.

A letter from Senators Tom Cotton (R-Arkansas) and Chuck Schumer (D-New York) revealed some significant concerns. First and foremost, they stated that “While the company has stated that TikTok does not operate in China and stores U.S. user data in the U.S., ByteDance is still required to adhere to the laws of China. Security experts have voiced concerns that China’s vague patchwork of intelligence, national security, and cybersecurity laws compel Chinese companies to support and cooperate with intelligence work controlled by the Chinese Communist Party.”

Additionally, “Questions have also been raised regarding the potential for censorship or manipulation of certain content…The platform is also a potential target of foreign influence campaigns like those carried out during the 2016 election on U.S.-based social media platforms.” 

 

Since U.S. businesses are responsible for the security of their devices, networks, and data, many have blocked or mandated the removal of TikTok from any company device or platform. This is not an unusual practice for social media applications or non-business-related uses, and businesses must remain vigilant.

Utilization of a cloud backup provider such as Global Data Vault is an excellent way to add additional layers of protection to your company and significantly lower your risk of data exposure. Our Backup-as-a-Service offering is supplemented with BitLyft security to stay one step ahead of security threats to your environment.

 

More Cybersecurity Posts

Hacking Threat and Data Protection

Hacking Threat and Data Protection

If you’re thinking, “No one would want my company information, we’re never going to be a target of a hacker,” you’ll need to get your head examined and prepare for the worst. Hackers are attacking everyone from the little mommy bloggers to the US Government’s top...

read more
Small Office Network Security Checklist

Small Office Network Security Checklist

With the recent news about hacked systems Lockheed Martin and RSA, and given these organizations' apparent sophistication, it is clear that it's time for all of us to review the security of our IT systems. Small businesses are not nearly as interesting to high-end...

read more
Business Pandemic Plan – Are You Prepared?

Business Pandemic Plan – Are You Prepared?

On June 11, 2009, the World Health Organization (WHO) raised the worldwide pandemic alert level to Phase 6 due to the spread of the H1N1 virus.  The virus, also known as Swine Flu, has rapidly established itself and will continue to persist in the coming months as the...

read more
NYSE in Chaos

NYSE in Chaos

A computer glitch stopped trading for 40 minutes in more than 200 stocks at the New York Stock Exchange today.  One of the key computer servers used to conduct trading lost connectivity to the trading network.  As a result, stocks such as General Electric and...

read more

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *