Skip to main content

IT News

Tech Tip – Use Task Scheduler to Automate Tasks in Windows

By Blog, News No Comments

Automating routine tasks can save time and ensure that critical operations aren’t overlooked. The Windows Task Scheduler allows you to automate tasks such as daily backups, weekly disk cleanups, off-hours software updates, periodic service restarts, and sending reminder emails for events by setting them to occur at specific times or when certain events happen. Here’s how to use Task Scheduler:

– Search for Task Scheduler in the Windows search bar and open it.

– To create a new task, click on Create Basic Task or Create Task for more detailed options.

– Follow the wizard to specify when the task should run and what action it should perform, such as launching a program, sending an email, or displaying a message.

– After setting up your task, it will run automatically according to your specified schedule or event trigger.

Featured Article : Don’t Ask Gemini About The Election

By Blog, News No Comments

Google has outlined how it will restrict the kinds of election-related questions that its Gemini AI chatbot will return responses to.

Why? 

With 2024 being an election year for at least 64 countries (including the US, UK, India, and South Africa) the risk of AI being misused to spread misinformation has grown dramatically. This problem extends to a lack of trust by various countries’ governments (e.g. India) around AI’s reliability being taken seriously. There are also worries about how AI could be abused by adversaries of the country holding the election, e.g. to influence the outcome.

Recently, for example, Google’s AI made the news for when its text-to-image AI tool was overly ‘woke’ and had to be paused and corrected following “inaccuracies.” For example, when Google Gemini was asked to generate images of the Founding Fathers of the US, it returned images of a black George Washington. Also, in another reported test, when asked to generate images of a 1943 German (Nazi) soldier, Google’s Gemini image generator returned pictures of people of clearly diverse nationalities (a black and an Asian woman) in Nazi uniforms.

Google also says that its restrictions of election-related responses are being used out of caution and as part of the company’s commitment to supporting the election process by “surfacing high-quality information to voters, safeguarding our platforms from abuse, and helping people navigate AI-generated content.” 

What Happens If You Ask The ‘Wrong’ Question? 

It’s been reported that Gemini is already refusing to answer questions about the US presidential election, where President Joe Biden and Donald Trump are the two contenders. If, for example, users ask Gemini a question that falls into its election-related restricted category, it’s been reported that they can expect Gemini’s response to go along the lines of: “I’m still learning how to answer this question. In the meantime, try Google Search.” 

India 

With India being the world’s largest democracy (about to undertake the world’s biggest election involving 970 million voters, taking 44 days), it’s not surprising that Google has addressed India’s AI concerns specifically in a recent blog post. Google says: “With millions of eligible voters in India heading to the polls for the General Election in the coming months, Google is committed to supporting the election process by surfacing high-quality information to voters, safeguarding our platforms from abuse and helping people navigate AI-generated content.” 

With its election due to start in April, the Indian government has already expressed its concerns and doubts about AI and has asked tech companies to seek its approval first before launching “unreliable” or “under-tested” generative AI models or tools. It has also warned tech companies that their AI products shouldn’t generate responses that could “threaten the integrity of the electoral process.” 

OpenAI Meeting 

It’s also been reported that representatives from ChatGPT’s developers, OpenAI, met with officials from the Election Commission of India (ECI) last month to look at how OpenAI’s ChatGPT tool could be used safely in the election.

OpenAI advisor and former India head at ‘X’/Twitter, Rishi Jaitly, is quoted from an email to the ECI (made public) as saying: “It goes without saying that we [OpenAI] want to ensure our platforms are not misused in the coming general elections”. 

Could Be Stifling 

However, Critics in India have said that clamping down too much on AI in this way could actually stifle innovation and could lead to the industry being suffocated by over-regulation.

Protection 

Google has highlighted a number of measures that it will be using to keep its products safe from abuse and thereby protect the integrity of elections. Measures it says it will be taking include enforcing its policies and using AI models to fight abuse at scale, enforcing policies and restrictions around who can run election-related advertising on its platforms, and working with the wider ecosystem on countering misinformation. This will include measures such as working with Shakti, India Election Fact-Checking Collective, a consortium of news publishers and fact-checkers in India.

What Does This Mean For Your Business? 

The combination of rapidly advancing and widely available generative AI tools, popular social media channels and paid online advertising look very likely to pose considerable challenges to the integrity of the large number of global elections this year.

Most notably, with India about to host the world’s largest election, the government there has been clear about its fears over the possible negative influence of AI, e.g. through convincing deepfakes designed to spread misinformation, or AI simply proving to be inaccurate and/or making it much easier for bad actors to exert an influence.

The Indian government has even met with OpenAI to seek reassurance and help. The AI companies such as Google (particularly since its embarrassment over its recent ‘woke’ inaccuracies, and perhaps after witnessing the accusations against Facebook after the last US election and UK Brexit vote), are very keen to protect their reputations and show what measures they’ll be taking to stop their AI and other products from being misused with potentially serious results.

Although governments’ fears about AI deepfake interference may well be justified, some would say that following the recent ‘election’ in Russia, misusing AI is less worrying than more direct forms of influence. Also, although protection against AI misuse in elections is needed, a balance must be struck so that AI is not over-regulated to the point where innovation is stifled.

Tech Insight : DMARC Diligence (Part 3) : Implementing and Optimising DMARC for Maximum Security

By Blog, News No Comments

In this third and final part of our series of ‘DMARC Diligence’ insights, we explore the detailed process of DMARC deployment, its monitoring, optimisation, and preparing businesses for future email security challenges.

Last Week … 

Last week in part 2 of this series of ‘DMARC Diligence’ articles, we looked at the crucial yet often neglected aspect of securing non-sending or “forgotten” domains against cyber threats. Here we highlighted the potential risks posed by these domains when not protected by DMARC policies, and offered some guidance on how businesses can extend their DMARC implementation to cover all owned domains, thereby preventing unauthorised use for spam or phishing attacks.

This Week … Implementing DMARC: A Step-by-Step Approach 

As noted in the previous article in this series, implementing DMARC is now critical for UK businesses to protect against threats like email spoofing and phishing.

To briefly summarise a step-by-step approach to implementing this, businesses can start by ensuring Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) are correctly set up for the domain(s), as DMARC relies on these for email authentication. Next, it’s a case of creating a DMARC record with a policy of “none” to monitor traffic without affecting it. This record is added to your DNS.

Over time, it’s important to analyse your DMARC reports in order to identify any unauthorised use. Finally, gradually shift your policy to “quarantine” or “reject” to block or flag unauthenticated emails, enhancing your email security posture. Looking at this approach in a bit more detail, implementing DMARC means:

– Understanding SPF and DKIM. Before implementing DMARC, ensure you have SPF and DKIM records correctly set up for your domain. These records help in email verification and are crucial for DMARC to function effectively.

– Creating a DMARC record. Draft a DMARC TXT record for your DNS. Start with a policy of ‘none’ (p=none) to monitor your email traffic without affecting it. This stage is critical for understanding your email ecosystem and preparing for stricter enforcement without impacting legitimate email delivery.

– Analysing the reports. Use the data collected from DMARC reports (Aggregate reports – RUA, and Forensic reports – RUF) to identify legitimate sources of email and potential gaps in email authentication practices.

– Gradually adjusting policy: Gradually adjust your DMARC policy from ‘none’ to ‘quarantine’ (p=quarantine) as you become more confident in your email authentication setup. This move will start to prevent unauthenticated emails from reaching inboxes but may still allow them to be reviewed.

– Full enforcement. Once you’re assured that legitimate emails are correctly authenticated and not negatively impacted, shift your policy to ‘reject’ (p=reject). This is the final step where unauthenticated emails are actively blocked, providing full protection against phishing, and spoofing under DMARC.

– Continuous monitoring and updating. Email authentication landscapes and practices evolve, so it’s crucial to continuously monitor DMARC reports and update your SPF, DKIM, and DMARC settings as necessary to adapt to new email flows, domain changes, or security threats.

Monitoring and Reporting – The Key to Effective DMARC 

For businesses, effective DMARC implementation relies heavily on consistent monitoring and reporting.

Why? 

By analysing DMARC reports, businesses can gain insights into both legitimate and fraudulent email sources using their domain. This process not only helps in identifying authentication failures but also in refining DMARC policies over time (as suggested in the step-by-step approach above) for better security.
Remember, regular reviews of these reports is essential for adapting to new threats and ensuring email communication integrity.

Optimising DMARC Policies 

Optimising a DMARC policy involves fine-tuning it to create a balance between security against spoofing and phishing, and ensuring legitimate emails are delivered smoothly.

But How? 

The starting point (as mentioned above) is the analysis of your DMARC reports to identify authentication failures and adjust your SPF and DKIM setups accordingly.

A Phased Approach 

Taking a phased approach, i.e. gradually increasing the DMARC policy from ‘none’ to ‘quarantine’ and then to ‘reject’ as confidence in your email authentication improves, is the way to minimise potential disruptions to legitimate email flow while maximising protection against unauthorised use of your domain.

Future-Proofing Your Email Security Strategy 

Going forward, looking at ways to future-proof your business email security strategy, these could include:

– Keeping up to date with emerging threats and trends in email security (continuous education).

– Implementing advanced security technologies like AI-driven threat detection can offer proactive protection.

– Regularly reviewing and updating your email authentication protocols (SPF, DKIM, DMARC) to adapt to changes in your email infrastructure.

– Fostering a security-aware culture within your business e.g., using training to recognising phishing attempts and safe email practices.

– Engage in industry forums and cybersecurity communities to help stay ahead of evolving email threats and to gain and share information about best practices.

What Does This Mean For Your Business? 

For UK businesses, implementing and optimising DMARC, as outlined in this final instalment, is a commitment to safeguarding email communications that benefits your business and your customers. Taking a step-by-step approach, as outlined above, from establishing SPF and DKIM records, through to DMARC policy enforcement, are now crucial for building an effective defence against email spoofing and phishing (these are now major threats). Taking the phased approach of regular monitoring and gradual policy adjustments ensures that businesses can not only react to current threats but also proactively adapt to emerging challenges. This strategic approach to email security is essential in maintaining the trust of your customers and partners, protecting your brand’s reputation, and complying with today’s data protection regulations. It’s also worth remembering that actively engaging in continuous education and leveraging advanced technologies are ways to stay ahead in the fast-evolving cybersecurity landscape.

Tech News : Bogus Bitcoin Boffin

By Blog, News No Comments

A High Court judge has ruled that Australian computer scientist Dr Craig Wright is not the inventor of the Bitcoin cryptocurrency, despite him claiming to be so since 2016.

Real Bitcoin Inventor A Secret

The challenge with trying to conclusively identify Bitcoin’s inventor is that, from the outset, Bitcoin’s creator has only been known by the pseudonym Satoshi Nakamoto and they have chosen to keep their real identity hidden. Also, the creation and early development of Bitcoin were done under this pseudonym, with all communications conducted online via emails and forums. With the additional complications of Bitcoin being a decentralised currency (i.e. not controlled by any single entity or individual) and the fact that no definitive evidence from numerous investigations has been found linking the pseudonym to a real individual or group of individuals, it’s possible to see why many people have claimed (or suspected) to be Bitcoin’s inventor.

Dr Wright

Dr Wright, who has claimed to be Satoshi for almost 8 years (challenged many people in court who have disputed his claims) has had his evidence questioned by cryptocurrency experts for some time now.

The Court Case

The recently concluded case against Dr Wright was brought by a consortium / alliance of Bitcoin companies called the Crypto Open Patent Alliance (COPA) as a way to stop what has been described as Dr Wright’s campaign of intimidatory lawsuits against anyone challenging his claim to be Bitcoin’s creator. The case was held at the Intellectual Property Court (a division of London’s High Court). There, the judge declared that the evidence against Dr Wright being Bitcoin’s creator is “overwhelming.” The four key declarations made by the judge (prior to writing the full, lengthy ruling) were that:

1. Dr Wright is not the author of the Bitcoin White Paper.

2. Dr Wright is not the person who adopted or operated under the pseudonym Satoshi Nakamoto in the period 2008 to 2011.

3. Dr Wright is not the person who created the Bitcoin system.

4. Dr Wright is not the author of the initial versions of the Bitcoin software.

Forgery For Fraud?

COPA’s KC, Jonathan Hough, accused Dr Wright of backing his claim with forgery ‘on an industrial scale’ and of trying to use the courts (through his many legal challenges) ‘as a vehicle for fraud’.

So, If Dr Wright Didn’t, Invent It, Who Did?

Over the years, there’s been a great deal of speculation as to the true identity of Bitcoin’s creator(s). Figures who have been suspected (although none have been proven) include:

– Dorian Nakamoto. In March 2014, a Newsweek article identified Dorian Prentice Satoshi Nakamoto, a Japanese-American physicist and systems engineer, as the Bitcoin creator. This speculation was based on similarities in name and background. Dorian Nakamoto has since denied any involvement with Bitcoin.

– Hal Finney. Hal Finney was a cryptographic pioneer and the second person (after Satoshi) to use the Bitcoin software, file bug reports, and make improvements. He also lived only a short distance (a few streets away) from Dorian Nakamoto. Finney denied being Satoshi but suspicions about him remain due to his early and deep involvement with Bitcoin and his background in cryptography.

– Nick Szabo. A computer scientist, legal scholar, and cryptographer known for his research in digital contracts and digital currency. He developed a precursor to Bitcoin called “bit gold” in 1998, which shared many similarities with Bitcoin. Szabo has consistently denied being Satoshi.

– Wei Dai. Another figure linked to Bitcoin’s creation is Wei Dai, the creator of “b-money,” an early proposal for an autonomous digital currency mentioned in the Bitcoin whitepaper. Dai’s involvement in the cypherpunk movement and his innovative ideas about digital currency led some to speculate about his possible involvement with Bitcoin. However, Dai has denied being Satoshi.

What Does This Mean For Your Business?

As highlighted in COPA’s comments after the ruling against DR Wright, developers in the Bitcoin community may have felt for many years as though they were being bullied and intimidated by Dr Wright and his financial backers’ many challenges to those who questioned his assertion that he was Satoshi Nakamoto. The ruling, therefore, is likely to have brought them some satisfaction and some peace, plus the hope that the legal challenges will now cease. Also, some see the ruling against Dr Wright as a win not just for the truth, but for the whole open-source community which is known for its focus on collaboration transparency, freedom, and inclusivity.

It’s also been noted that the judge’s willingness to comment on the outcome prior to the full written judgement being released is unusual and may be taken as a sign of how solid and sure the judgement was in this case.

Possible reasons why Bitcoin’s real creator has chosen to remain anonymous could include avoiding legal and personal repercussions, maintaining the decentralised ethos of the currency, and protecting their privacy and security. It may have been all part of what appears to be some very successful original planning on their part.

The culmination of the case coincided with Bitcoin reaching its highest value of $69,000 recently which the real inventor of the currency is, no doubt, privately enjoying.

Tech News : Chrome’s Real-Time Safe Browsing Change

By Blog, News No Comments

Google has announced the introduction of real-time, privacy-preserving URL protection to Google Safe Browsing for those using Chrome on desktop or iOS (and Android later this month).

Why? 

Google says with attacks constantly evolving, and with the difference between successfully detecting a threat or not now perhaps being just a “matter of minutes,” this new measure has been introduced “to keep up with the increasing pace of hackers.” 

Not Even Google Will Know Which Websites You’re Visiting 

Google says because this new capability uses encryption and other privacy-enhancing techniques, the level of privacy and security is such that no one, including Google, will know what website you’re visiting.

What Was Happening Before? 

Prior to the addition of the new real-time protection, Google’s Standard protection mode of Safe Browsing relied upon a list stored on the user’s device to check if a site or file was known to be potentially dangerous. The list was updated every 30 to 60 minutes. However, as Google now admits, the average malicious site only actually exists for less than 10 minutes – hence the need for a real-time, server-side list solution.

Another challenge that has necessitated the introduction of a server-side real-time solution is the fact that Safe Browsing’s list of harmful websites continues to grow rapidly and not all devices have the resources necessary to maintain this growing list, nor to receive and apply the required updates to the list.

Extra Phishing Protection 

Google says it expects this new real-time protection capability to be able to block 25 per cent more phishing attempts.

Partnership With Fastly 

Google says that the new enhanced level of privacy between Chrome and Safe Browsing has been achieved through a partnership with edge computing and security company Fastly.

Like Enhanced Mode 

In its announcement of the new capability, Google also highlighted the similarity between the new feature and Google’s existing ‘Enhanced Protection Mode’ (in Safe Browsing) which also uses a real-time list to compare the URLs customers visit against. However, the opt-in Enhanced Protection also uses “AI to block attacks, provides deep file scans and offers extra protection from malicious Chrome extensions.” 

What Does This Mean For Your Business? 

As noted by Google, the evolving, increasing number of cyber threats, the fact that malicious sites are only around for a few minutes, and that many devices don’t have the resources on board to handle a growing security list (and updates) have necessitated a better security solution. Having the list of suspect sites server-side and offering real-time improved protection kills a few birds with one stone, allows Google a more efficient (and hopefully effective) way to increase its level of security and privacy. It’s also a way for Google to plug a security gap for those who have not taken the opportunity to opt-in to its Enhance Protection Mode since its introduction last year.

For business users and other users of Chrome, the chance to get a massive (estimated) 25 per cent increase in phishing protection without having to do much or pay extra must be attractive. For example, with phishing accounting for 60 per cent of social engineering attacks and, according to a recent Zscaler report, phishing attacks growing by a massive 47 per cent last year, businesses are likely to welcome any fast, easy, extra phishing protection they can get.

An Apple Byte : Apple Pays Norfolk Council £385 Million

By Blog, News No Comments

Following a class action lawsuit led by Norfolk County Council over the effect of an alleged cover-up by Apple’s boss about iPhone demand in China, Apple has agreed to pay £385m to settle the lawsuit.

The lawsuit related to comments by Apple’s CEO, Tim Cook, to investors back in 2018 where he told them there was “sales pressure” in some countries but not in China, thereby indicating demand for iPhones there was normal. However, two months later (January 2019), Apple cited China-US tensions as a reason for downgrading its quarterly revenue forecast, which resulted in a sharp fall in Apple’s share price. The lawsuit, led by Norfolk County Council (and including a group of Apple investors) therefore alleged that that they had been falsely reassured by Mr Cook’s comments, lost money because of this, and Mr Cook had been covering up the company’s knowledge about lower demand for iPhones in China.

Following Apple’s agreement to settle the lawsuit, a statement by the Norfolk Pension Fund said it was “very proud of this recovery for investors” and that it’s willing to take “decisive action to recover losses when our participants’ investments are harmed by fraud”.

Security Stop Press : Bill Ackman Imposter Scam Warning

By Blog, News No Comments

Billionaire hedge-fund manager, Bill Ackman’s Pershing Square Capital Management company has warned of the risks posed by recent Facebook ads impersonating Mr Ackman as part of an imposter fraud scam.

Mr Ackman’s company says it has already discovered 90 different versions of the advert which lures people into clicking on the ad by using Mr Ackman’s photo and identity (celeb-bait) and promising unrealistic investment returns. The intention of the adverts, placed by cyber criminals, is to steal the money of investors who fall victim the scam.

Facebook has described trying to stop such ads (more appear as soon as others are reported and taken down) like being like a game of “whack-a-mole”. Mr Ackman joins a long line of celebrities whose identities have been used by scammers. The general advice is that if an ad seems too good to be true or uses a celebrity to grab your attention, double-check before you click or buy anything.

Sustainability-in-Tech : First For Energy-Saving Magnetic Levitation Train

By Blog, News No Comments

Italian firm IronLev has claimed to have completed the first-ever magnetic levitation (maglev) test on an existing train track.

Energy Saving Potential 

The use of maglev technology for trains is particularly valuable because, if scaled up, it has the potential to reduce costs and energy usage as the industry seeks more efficient systems. This is because, unlike traditional trains that rely on wheels and rails (thereby creating significant friction), the idea of maglev trains is to levitate the train above the tracks using powerful magnets. The absence of physical contact with the track eliminates the wear and tear on tracks and wheels, leading to lower maintenance costs.

Also, the reduced friction means maglev trains require less energy to achieve and maintain high speeds, making them more energy efficient. Extra energy savings may also come from the trains’ streamlined design (minimising air resistance). Other benefits of maglev for trains are reduced noise and vibration for those living near train tracks.

Test Video 

Recently, at the LetExpo2024 trade fair in the Veneto region, Italian company Ironlev (from Treviso) showcased a video of its apparently successful maglev test on a conventional train track. The video showed a one-ton prototype traveling at a speed of 70 km/h (43 mph) over a two-kilometre stretch of line in the hinterland of Venice.

A First 

Massimo Bergamasco, director of the Institute of Mechanical Intelligence at the Scuola Superiore Sant’Anna in Pisa, said: “The test carried out by IronLev represents the first and only case of magnetic levitation applied to an existing railway track without requiring the modification or integration of accessory elements.” 

IronLev’s Chairperson, Adriano Girotto, also highlighted how Ironlev’s ability to create a workable new solution that uses existing infrastructure is an improvement on many of the mostly ad hoc stabs at achieving maglev train travel by others. Mr Girotto said: “Some of our competitors have carried out tests on specific tracks built to accommodate a magnetic levitation vehicle. We have demonstrated that our vehicle can levitate on an existing track.” 

Already Used In China, Korea, and Japan 

Although Ironlev can claim a first for magnetic levitation being applied to an existing railway track without needing modifications, maglev trains are already in use in China, South Korea, and Japan, albeit in very small numbers. Also, a maglev train was run in Germany just after the fall of the Berlin Wall.

Other Applications Of Maglev By Ironlev 

Interestingly, Ironlev is already finding other practical uses for its maglev technology, e.g. to move heavy windows, for elevators, and to transport loads within industrial settings.

What Does This Mean For Your Organisation? 

Although only successful in a test so far, Ironlev’s maglev technology shows great promise in many key areas. For example, if rolled out at scale, not only could it help the rail industry to decarbonise, save energy, and meet targets, but it may also improve performance and lessen the impact on homes close to railway.

Ironlev’s technology’s apparent success is rooted in its ability to solve two of the key challenges that have been holding back maglev railways up until now, i.e. it costs less than previous efforts and it can run on existing infrastructure without the need for costly, complicated, and time-consuming modifications. Also, as Ironlev has pointed out, its maglev technology can be leveraged in other areas, such as for elevators, thereby promising many other possible opportunities in different industries.

Although still at the testing stage, Ironlev’s system shows how existing technology can be modified to overcome a major challenge, thereby enabling that technology to evolve and benefit not just a whole industry, but our pressing collective need to decarbonise.

Tech Tip – Optimise Power Plans For Your Battery Life

By Blog, News No Comments

Windows allows users to customise or switch between different power plans based on their current needs, balancing performance with energy consumption. This is especially useful for laptop users who may need to maximise battery life or require full performance during intensive tasks. Here’s how works:

– Right-click on the battery icon in the taskbar and select Power Options, or search for “Edit Power Plan” in the Start menu.

– Here, you can switch between pre-defined plans such as Balanced, Power saver, or High performance.

– Customise these plans or create your own by modifying settings like screen brightness, sleep timers, and processor power management.

Featured Article : TikTok Termination?

By Blog, News No Comments

A recent US congressional vote means that TikTok and its parent company’s alleged ties with the Chinese Communist Party must be severed within six months or the popular TikTok app must be sold, thereby banning it in the US.

The Vote  

The unanimous Energy and Commerce Committee vote (50-0) in favour of forcing TikTok’s parent company ByteDance to divest itself or sell the app could see 170 million American users no longer able to use TikTok. There is now a wait to see whether the US Senate approves the measure before it becomes law. The stated purpose of the bill (as it stands) is to “protect the national security of the United States from the threat posed by foreign adversary controlled applications.” 

Chinese Links 

The worries that ByteDance’s links to the Chinese state make TikTok’s usage in the US a threat to national security date back to the Trump presidency. Back in 2020, (then) President Donald Trump tried to ban the app but was blocked by the courts. It was part of a wider trade and political war with China which is still carrying on. Other apps with links to China banned by Trump in 2021, for example, included the Ant Group’s Alipay mobile payment app, QQ Wallet, WeChat Pay, CamScanner, SHAREit, Tencent QQ, VMate (published by Alibaba Group subsidiary UCWeb), and Beijing Kingsoft Office Software’s WPS Office.

Bans In Many Countries 

The ban on TikTok was extended to number of other institutions and countries including:

– The European Commission, the UK government (and the BBC), the US government banned the TikTok app from staff devices, to protect sensitive personal data, increase cybersecurity, protect against misinformation, and to protect national security.

– In June 2020, India banned TikTok and around 300 other Chinese apps from government devices.

– In 2023, the TikTok app was banned from government devices in Australia and Canada.

– Other countries with a government device TikTok ban also include Taiwan, Ireland, Denmark, and Belgium.

Many may also remember how, in March last year, the CEO of TikTok, Shou Chew, had to appear before the House Energy and Commerce Committee in the US to discuss concerns about TikTok’s consumer privacy, data security practices, its impact on children, and the app’s alleged links to China.

This Time 

This time, however, rather than facing just a government device ban, TikTok is facing a whole country ban. Worse than that, it’s the country with TikTok’s largest audience, with estimates ranging around 113.3 million to 116.5 million users.

The stark choice facing ByteDance is to now either sell the TikTok app within 6 months (thereby severing alleged links with the Chinese state) or face removal from mobile app stores in the US, effectively wiping out its biggest audience, threatening the app itself.

What Would A Ban Mean? 

Looking at the broader picture, Banning TikTok in the US completely could have a significant impact on several fronts, given the app’s massive user base and economic influence in the country. Some of the potential effects could include :

– Massive user impact (businesses and home users). With millions of active users in the US, a ban would abruptly cut off access for a large community of creators and viewers. It would affect the way people consume and create short-form video content, potentially shifting these users to alternative platforms.

– A blow to the creator economy. Many US-based content creators rely on TikTok for income through brand partnerships, sponsored content, and the app’s creator fund. A ban could disrupt this economy, affecting the livelihood of thousands of influencers and content creators.

– A significant effect on market competition and innovation. For example, TikTok’s absence could create a vacuum in the social media landscape, encouraging competitors like Instagram Reels, YouTube Shorts, and Snapchat to fill the gap. This could lead to innovations within these platforms as they vie for the TikTok audience.

– Trouble for advertisers (brands). Brands that leverage TikTok for marketing and customer engagement would need to pivot their strategies to other channels. This could reshape digital marketing trends and impact the effectiveness of social media campaigns.

– More regulations. Heightened awareness and concerns over data privacy and security issues related to social media, could lead to more stringent regulations and policies affecting all platforms, not just TikTok.

– Effects on international relations. Given the geopolitical tensions underlying concerns about TikTok’s Chinese ownership, a ban could have diplomatic repercussions, influencing US-China relations (making them even worse) and possibly affecting American companies operating in China. Some commentators have already suggested we are witnessing a kind of ‘cold war’ with China now anyway, with the US restricting things like microchips and other components in a bid to perhaps stifle the growth of what it sees as a more powerful and growing economy.

– Legal and political ramifications. Implementing a ban would likely involve legal challenges and a complex regulatory process. It could set a precedent for how the U.S. government addresses concerns about foreign-owned technology companies in the future.

All in all, therefore, the impact of a TikTok ban in the US would extend well beyond the app itself, affecting the social media ecosystem, the digital economy, and even international relations. However, the specific outcomes would depend on a variety of factors, including how such a ban is implemented and the response from users, creators, businesses, and other stakeholders.

User Revolt Reported In The US 

Not surprisingly, there have been reports in the US of congressmen being inundated with calls from TikTok users objecting to a ban. It’s also been reported that TikTok encouraged its users to call their representative to vote against the measure.

Criticisms 

The vote and proposed ban have led to other criticisms, including that from The American Civil Liberties Union (ACLU) which pointed to the app’s value to many Americans for information and communication, and describing the ban as a “cheap” political point scoring measure in an election year.

What Does TikTok Say? 

TikTok has said (on the ‘X’ platform) that it amounts to “an outright ban” and that “This legislation will trample the First Amendment rights of 170 million Americans and deprive 5 million small businesses of a platform they rely on to grow and create jobs”. 

What Does This Mean For Your Business? 

The potential total ban of TikTok in the US represents a pivotal moment not only for the app’s parent company (ByteDance) but also for a broad spectrum of stakeholders ranging from individual creators to large corporations. For ByteDance, the forced sale or severance of its largest international market could significantly impact its valuation, strategic direction, and global influence.

The loss of the US market (TikTok’s largest) would not only diminish its advertising revenue but could also deter potential investors and partners concerned about the platform’s stability and future growth prospects.

For businesses and creators that rely on TikTok, the ramifications could be profound. The US, for example, is home to a significant creator economy where individuals and businesses leverage TikTok for brand building, audience engagement, and revenue generation. A ban would necessitate a strategic move to alternative platforms, which may not offer the same level of engagement or demographic reach as TikTok. This could disrupt marketing strategies, content distribution plans, and income streams for countless users.

The competition within the social media landscape would most likely intensify in the wake of a TikTok ban. Rivals such as Instagram Reels, YouTube Shorts, and Snapchat stand to gain the most, absorbing TikTok’s displaced user base – the US may not be too unhappy about US-based company apps taking TikTok’s place. This shift could spark a wave of innovation as platforms vie to capture and retain these new audiences, potentially reshaping the social media ecosystem.

From a broader economic perspective, a TikTok ban could have ripple effects beyond well the tech industry. The platform has become an integral part of digital marketing strategies for many businesses of all sizes. The disruption to these strategies could have downstream effects on sales, customer engagement, and brand loyalty across various sectors.

Also, the ban could bring about stricter regulatory scrutiny over social media platforms, leading to increased compliance costs and operational challenges. This heightened regulatory environment could stifle innovation and deter investment in the tech sector, impacting the wider economy.

The implications of a US-wide TikTok ban could, therefore, extend way beyond the app itself, affecting the livelihoods of creators, the strategies of businesses, the dynamics of social media competition, and the broader digital and national economies. Stakeholders will now, most likely, closely monitor developments and prepare should the worst happen. TikTok has held firm and denied any Chinese state links before. Nevertheless, the US is making a powerful statement with the unanimous vote and bill proposing a possible total ban which reflects the strength of resolve now in the US. It also reflects their willingness to pile-on the pressure in what is also a political battle with what they consider as a major rival.