4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

With the mountainous success of Game of Thrones, the BBC-produced show has always been understandably concerned with their security. However, with the show officially overtaking the original source material, A Song of Ice and Fire, there is an increased presence of curious fans and members of the press with an eye out for a sneak peek at the action. This has led to more; somewhat more modern measures being adopted to keep the production’s secrets safe.

This is by no means the first time HBO has moved to increase the show’s security. During last year’s season, fewer of the actors were given scripts and code words for certain characters and scenes were developed, just in case. HBO also put a stop to distributing screeners, or advance copies of the program, to members of the press to view so they can write their reviews.

Now that the show has overtaken the books, the importance of secrecy and security has increased even more.

This year, the cast was required to enable and set up two-factor authentication on their email accounts, where they exclusively received digital copies of the script that they were not allowed to print out. This is according to Nathalie Emmanuel, who plays the character Missandei on the show. Emmanuel added that even any rehearsal notes the cast members received were restricted to the set, signed for and returned before the actors were permitted to leave.

For good reason, too. The series is a cultural juggernaut, and has generated its showrunners a vast amount of money. It is--in all senses of the word--a business, and if it was to lose its critical data or trade secrets (like who’s next to be violently eliminated from the Game of Thrones), their audience would have less of an incentive to tune in, and viewers would swiftly shift their support to a different project.

In this way, it is just as important that you ensure that your business’ data is secured as well. Otherwise, the same scenario would likely happen, your ‘audience’ replaced by your customers and clients.

Two-Factor Authentication requires a user to not only know their password to log into their email or online accounts, but also have their mobile device on hand to type in a texted code. Even if someone were to guess the password, it would still require the mobile device to log in. Many businesses are adopting this to comply with various regulations, but it’s also quickly becoming a best practice for security.

Are you excited about this season of Game of Thrones? Let us know in the comments what you think--but no spoilers, please!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 18 February 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Business Management Hosted Solutions Managed Service Provider Google Malware Business IT Services Efficiency Windows IT Support Innovation Disaster Recovery Business Continuity Hardware Workplace Tips VoIP Computer Mobile Devices User Tips Saving Money Miscellaneous Windows 10 Network Security Virtualization Upgrade Mobile Device Management Data Server communications Mobile Computing Email Alert Save Money Microsoft Office Communication Network Social Media Smartphone Quick Tips Small Business Smartphones Managed IT Services Information Technology Outsourced IT BYOD Going Green Mobile Office Android Health Office Apps Application Ransomware Operating System Chrome Browser Gadgets Productivity Holiday Managed IT Firewall The Internet of Things Disaster Avoiding Downtime Cybersecurity Tablet Mobility WiFi Cybercrime Data Backup Search Telephone Systems Passwords Remote Computing Unified Threat Management Risk Management IT Solutions Best Practice Data Recovery Spam Data Management History BDR Apple Employer-Employee Relationship Budget Marketing VPN Vendor Management Automation Facebook Hacking Hard Drives Remote Monitoring Saving Time Hosted Solution Money User Error Computers Collaboration Recovery Phone System Wireless Technology Law Enforcement Office Tips Big Data Content Filtering iPhone Customer Relationship Management Proactive IT Phishing Password Intranet Telephony Lithium-ion battery Bring Your Own Device Current Events Work/Life Balance Printer Humor Administration Antivirus Office 365 Vulnerability USB Wearable Technology Shortcut Encryption Analytics Social Maintenance PowerPoint Gmail Router Virus Government Social Engineering Users Cost Management Wireless Unsupported Software Windows 8 Bandwidth Cloud Computing Printer Server Google Drive Data Security Private Cloud Laptop Save Time OneNote Data Protection Flexibility Trending Education Net Neutrality Point of Sale IT COnsultant SaaS Computer Repair Audit Tech Support HaaS Business Intelligence Outlook Politics Personal Information App Computer Care online currency Battery Meetings Robot Automobile Instant Messaging Emails End of Support HIPAA Entertainment Data Breach Benefits Internet Exlporer Efficency DDoS Computer Accessories Internet of Things Compliance Identity Theft Network Congestion Mouse Solid State Drive Sports Help Desk Two-factor Authentication Display Managing Stress IT Support Excel Samsung Augmented Reality Windows 10 Wi-Fi Artificial Intelligence Emergency Paperless Office Travel Applications Fax Server Data Loss Customer Service Workplace Update hacker Social Networking Biometrics Retail Transportation Streaming Media Virtual Reality Data Storage Redundancy Uninterrupted Power Supply Uograde Twitter Images Microsoft Excel Dark Web Screen Mirroring Music Surge Protector Human Resources IT consulting Hiring/Firing Television Running Cable Data storage File Sharing Cast 3D Printing Books Video Games Reliable Computing Windows 10s Smart Technology Document Management systems Nanotechnology Bloatware Advertising Legal Wiring Tablets Hard Disk Drive ISP Mobile Device Information Touchpad hack Root Cause Analysis HBO Managed Security Scam Blogging Debate Branding NFL best practices Programming CrashOverride Distributed Denial of Service Cortana IT Management Employer Employee Relationship Website Project Management Word WIndows 7 data breach Settings Inbound Marketing Worker Commute eWaste Operating Sysytem Legislation Storage PDF WIndows Server 2008 Regulations Scalability MSP Files Windows Ink risk management OneDrive Value Amazon Nokia Text Messaging Patch Management Cameras Safety Co-managed IT How To Chromecast Google Maps User Science Commerce Upgrades Lifestyle Virtual Desktop Regulation Presentation Training Ebay Bluetooth Administrator Software as a Service Best Available Consultant Computing IT Technicians Colocation Sync The Blindside Of Company Culture Black Market SharePoint Access iOS Managed IT Service Touchscreen Adobe Managed IT Services IT Security Cleaning Teamwork Hard Drive Google Docs Computer Fan Busines Continuity Experience Avoid Downtime Networking Licensing Near Field Communication Keyboard Credit Cards Sales Spyware Mobile IT solutions Managed Service Provder FAQ Webinar Fraud Professional Services Charger Edge Gift Giving Wireless Charging Ciminal Taxes WannaCry Supercomputer Evernote Electronic Medical Records IT service IT Budget Comparison Workers Blockchain Domains Reputation Specifications Updates Identities Conferencing Microsoft Word Gifts Device Security Buisness Shadow IT Tutorial Relocation Microblogging Devices Youtube Webinar