Skip to content

TikTok Security Concerns in the Workplace

TikTok, the viral social media app centered around short videos and owned by the Chinese company ByteDance, is coming under intense scrutiny. By now, many of us have seen a TikTok video filmed in someone’s workplace—those “day in the life” clips or rants about coworkers, supervisors, or customers. Or you may have seen a video of someone discussing an unrelated subject while sitting at their desk. It’s safe to say that TikTok has found its way into many workplaces, for better or for worse. But the issue goes deeper than catching unsanctioned glimpses into the workplace environment. Many organizations are worried about TikTok itself, the data it gathers, and which hands that data ends up in.

 

Does TikTok Pose a Security Risk to Corporate Networks?

TikTok, like any other social media app, can pose a potential security threat to a corporate network if used by employees. The app may collect personal information and usage data that could be exploited by cybercriminals, and the app’s security protocols could be compromised.

There have been concerns raised about TikTok’s data collection practices, which include tracking user behavior, location, and contacts. Additionally, TikTok’s parent company, ByteDance, is based in China, which has led to concerns about potential government access to user data.

If employees use TikTok on a corporate network, it could potentially compromise the network’s security. Hackers could exploit vulnerabilities in the app to gain access to sensitive corporate data or use the app as a vector to distribute malware to other devices on the network.

To mitigate these risks, companies may choose to restrict or ban the use of TikTok on their corporate networks. They could also implement security protocols and software to monitor and control access to social media apps and other potentially risky applications. Additionally, it’s essential to educate employees about the potential risks associated with using social media apps on company devices and networks.

 

TikTok Security Concerns Are Mounting

Many states have growing TikTok security concerns. These concerns have led 18 Republican-led states to ban the use of the app on government devices. Federal agencies also bar staffers from using TikTok on their government phones and devices, including the Pentagon, the State Department, and the Transportation Security Agency.

Moreover, Europe is taking a similar approach to TikTok risk, with the European Parliament banning the app on staff phones. This move came just one day after the White House gave federal agencies 30 days to remove TikTok from all government devices. Canada has also followed suit, banning TikTok from government devices over security concerns.

But what TikTok security concerns are at play here? More generally, officials believe that the app could collect sensitive data from users, which the Chinese government may then access. In addition, they’re equally worried that the app may pose a threat to network security and endpoint security. For example, could the app be used to access sensitive information on government devices or to infiltrate government networks (an attack vector)?

The concern here stems from a lack of trust in ByteDance and fears over how much access and control Beijing has over the company and, subsequently, the app. ByteDance denies allegations that the Chinese government is involved in its operations, but these denials are largely falling on deaf ears.

 

Assessing the Seriousness of the Risk

There have been some reports of cybersecurity incidents involving TikTok, but it’s not clear if any companies have specifically experienced a cyber attack involving the app.

For example, in 2020, TikTok was found to be accessing users’ clipboards on iOS devices, which raised concerns about the app’s data collection practices. However, there have been no reports of TikTok being used as a vector for a cyber attack specifically targeting a corporate network.

That being said, it’s important to note that the threat landscape is constantly evolving, and new threats can emerge at any time. Companies should remain vigilant and take steps to mitigate potential risks associated with the use of social media apps on their networks, including TikTok.

 

TikTok Security Strategies Are Evolving

Government agencies banning TikTok is noteworthy, but what does it mean for everyone else? Some argue that governments are being a little paranoid, especially in assessing TikTok’s risk to endpoint security and network security. Still, others argue that governments have a duty to take stringent security measures regarding government data and systems.

But what should private companies do? First, it’s important to note that TikTok poses other significant concerns. For example, employees may unintentionally share confidential company information by filming a video with visible employee screens. They may also give the company a bad reputation by sharing negative stories about the workplace on the platform.

The less popular app BeReal is also coming under scrutiny for similar reasons. BeReal takes a less sensationalist approach than TikTok (it has no filters, hashtags, or followers) and is aimed at users showing an unfiltered view of their everyday life. Since this app requires you to be someone’s friend before you view their BeReal, it may create a false sense of security where users feel less inclined to censor confidential information.

Companies will have to determine their own risk tolerance, but it’s telling that organizations most focused on cybersecurity believe that TikTok is a significant security risk. More widely, companies should update their social media policies to define whether TikTok is allowed on company devices and how (and if) its use is sanctioned in the workplace – don’t leave your security up to chance!

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Are Passwords a Threat to Enterprise Security?

Enterprise security attackers are growing in number and sophistication. Organizations are only one password away from it being their worst day. To that point, is it time to ditch all those annoying, hackable passwords and live in a passwordless society?

Passwords have been the primary method of authentication for decades. While they have served their purpose and served it well, there may be better alternatives for protecting your mission-critical data and digital resources. As technology advances, cybercriminals find new ways to steal corporate credentials, making password security less effective.

In fact, according to a recent study, 81% of company data breaches were due to poor passwords. Password reuse is of particular concern as it could lead to credential stuffing attacks where threat actors take advantage of reused credentials by automating login attempts against systems using known emails and password pairs.

The same report revealed that 80% of hacking incidents were caused by stolen or reused login information.

These attacks weren’t on small companies with limited resources and weak cybersecurity protocols. They were on household name enterprises such as Ticketmaster, GoDaddy, Microsoft, SolarWinds, and even the New York City Law Department. In the case of SolarWinds, the hackers could get in with a weak password an intern had been using (“solarwinds123”), which was publicly accessible via a misconfigured GitHub repository.

Not only are passwords less secure, but they are also productivity inhibitors. In another recent report on passwordless security, 45% of respondents indicated that a passwordless approach to security would increase productivity.

In addition to weak passwords and credential reuse, passwords can be a hindrance to enterprise security in several ways:

  1. Passwords can be easily compromised: Bad actors can steal or hack credentials using various methods, such as phishing, brute force attacks, or social engineering.
  2. Password Sharing: Employees may share their passwords with others, which can put enterprise data at risk. Password sharing is especially problematic when employees leave the company or change positions, as they may be disgruntled or their old passwords remain active.
  3. Human Error: Employees may inadvertently reveal passwords through phishing scams or other social engineering tactics, which gives attackers access to enterprise data even if they do not have the correct login credentials.
  4. Lack of Two-Factor Authentication: Passwords alone may not be enough to secure enterprise accounts. Two-factor authentication can add an extra layer of security.
  5. User frustration: Password policies can frustrate users who must remember multiple passwords, adhere to strict complexity rules, and change them frequently.
  6. Cost of password management: Organizations need to invest in password management systems, such as password policies, training, and resets. These systems can be costly and time-consuming.

Given these reasons, enterprises should consider more secure alternatives to password security, such as Zero Trust, biometrics, multi-factor authentication, and certificate-based authentication. As compromised credentials continue to be a common attack vector, it only takes one nefarious login to bring a company to its knees. Of course, enterprises can’t just suddenly pull the plug on passwords altogether, but it is an option worthy of consideration.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

保障企業安全的關鍵:深入探究 Managed Detection and Response (MDR) 方案

在今天的 A.I. 時代,企業網絡和系統越來越複雜,面對的威脅也變得更加多樣化和智能化。在這樣的環境下,傳統的安全防禦措施已經無法滿足企業需求。因此,更全面、更高效的安全解決方案 – MDR 被開發出來,以應對當今的安全挑戰。

MDR 是 Managed Detection and Response(管理式檢測和響應)的縮寫,是一種新興的安全解決方案,結合了先進的技術、威脅情報和專業的安全人員,旨在為企業提供更全面、更有效的安全防禦和威脅應對能力。

傳統的安全防禦措施一般包括防火牆、入侵檢測和防病毒軟件等。這些措施主要是靠已知威脅的簽名進行檢測和阻擋,而這些簽名都是基於已發現的威脅和攻擊方式。因此,當面對未知的威脅時,這些措施往往會失效收場。至於 MDR 解決方案,通過結合機器學習、行為分析和威脅情報等技術,可以更加全面地檢測和防禦威脅。它能夠檢測未知的威脅行為、內部員工的異常行為、來自外部的進階威脅等。這些威脅往往是傳統防禦措施無法檢測和防禦的,而 MDR 則可以提前發現,並及時進行相應的響應和處理。

在選擇 MDR 解決方案時,您應該注意以下幾方面:

  • 技術能力:技術能力是選擇的重要因素之一。您需要確保所選的 MDR 解決方案具有先進的安全技術,如行為分析、威脅檢測和應對等技術。
  • 安全專業知識:供應商應具有充足的安全專業知識和經驗,能夠有效地監控和應對安全事件。
  • 彈性和可擴展性:能夠根據企業的需求進行彈性配置和擴展,從而滿足企業的不同規模和需求。
  • 監控範圍:監控範圍應該覆蓋企業的所有關鍵資源和應用程式,包括雲端環境和流動設備等。
  • 反應時間:反應時間應該越短越好,能夠快速應對安全事件,從而減少損失和風險。
  • 認證和合規性:供應商應具有相關的認證和合規性,如 ISO 27001、SOC 2、HIPAA 等。
  • 成本效益:成本效益應該是您選擇的重要因素之一。您需要確保所選的 MDR 解決方案能夠提供良好的性能和安全性,同時不會對企業造成過大的負擔。

MDR是一種新興的安全解決方案,旨在提供全天候的安全監控和反應。在選擇MDR解決方案時,你應該注意技術能力、安全專業知識、彈性和可擴展性、監控範圍、反應時間、認證和合規性以及成本效益等方面。MDR解決方案可以幫助企業提高安全水平、減少風險、優化IT資源的使用。如果你想要了解更多關於MDR解決方案的信息,請聯繫我們的專業團隊,我們將竭誠為您提供協助。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

保障企業安全的關鍵:深入探究 Managed Detection and Response (MDR) 方案

在今天的 A.I. 時代,企業網絡和系統越來越複雜,面對的威脅也變得更加多樣化和智能化。在這樣的環境下,傳統的安全防禦措施已經無法滿足企業需求。因此,更全面、更高效的安全解決方案 – MDR 被開發出來,以應對當今的安全挑戰。

MDR 是 Managed Detection and Response(管理式檢測和響應)的縮寫,是一種新興的安全解決方案,結合了先進的技術、威脅情報和專業的安全人員,旨在為企業提供更全面、更有效的安全防禦和威脅應對能力。

傳統的安全防禦措施一般包括防火牆、入侵檢測和防病毒軟件等。這些措施主要是靠已知威脅的簽名進行檢測和阻擋,而這些簽名都是基於已發現的威脅和攻擊方式。因此,當面對未知的威脅時,這些措施往往會失效收場。至於 MDR 解決方案,通過結合機器學習、行為分析和威脅情報等技術,可以更加全面地檢測和防禦威脅。它能夠檢測未知的威脅行為、內部員工的異常行為、來自外部的進階威脅等。這些威脅往往是傳統防禦措施無法檢測和防禦的,而 MDR 則可以提前發現,並及時進行相應的響應和處理。

在選擇 MDR 解決方案時,您應該注意以下幾方面:

  • 技術能力:技術能力是選擇的重要因素之一。您需要確保所選的 MDR 解決方案具有先進的安全技術,如行為分析、威脅檢測和應對等技術。
  • 安全專業知識:供應商應具有充足的安全專業知識和經驗,能夠有效地監控和應對安全事件。
  • 彈性和可擴展性:能夠根據企業的需求進行彈性配置和擴展,從而滿足企業的不同規模和需求。
  • 監控範圍:監控範圍應該覆蓋企業的所有關鍵資源和應用程式,包括雲端環境和流動設備等。
  • 反應時間:反應時間應該越短越好,能夠快速應對安全事件,從而減少損失和風險。
  • 認證和合規性:供應商應具有相關的認證和合規性,如 ISO 27001、SOC 2、HIPAA 等。
  • 成本效益:成本效益應該是您選擇的重要因素之一。您需要確保所選的 MDR 解決方案能夠提供良好的性能和安全性,同時不會對企業造成過大的負擔。

MDR是一種新興的安全解決方案,旨在提供全天候的安全監控和反應。在選擇MDR解決方案時,你應該注意技術能力、安全專業知識、彈性和可擴展性、監控範圍、反應時間、認證和合規性以及成本效益等方面。MDR解決方案可以幫助企業提高安全水平、減少風險、優化IT資源的使用。如果你想要了解更多關於MDR解決方案的信息,請聯繫我們的專業團隊,我們將竭誠為您提供協助。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

Version 2 Newsletter (March 2023 Issue)

CVE-2023–23752: Joomla Unauthorized Access Vulnerability Critical Infrastructure’s Silent Threat: Part 2 – Understanding PLCs Reaching beyond 1Gbps: How we achieved NAT traversal with vanilla WireGuard Is a scarcity of security experts a growing global data risk? What is the CCPA? runZero 3.6: Introducing organizational hierarchies 10 Best Practices for Email Security to Protect Your Business
×

Hello!

Click one of our contacts below to chat on WhatsApp

×