4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

With the mountainous success of Game of Thrones, the BBC-produced show has always been understandably concerned with their security. However, with the show officially overtaking the original source material, A Song of Ice and Fire, there is an increased presence of curious fans and members of the press with an eye out for a sneak peek at the action. This has led to more; somewhat more modern measures being adopted to keep the production’s secrets safe.

This is by no means the first time HBO has moved to increase the show’s security. During last year’s season, fewer of the actors were given scripts and code words for certain characters and scenes were developed, just in case. HBO also put a stop to distributing screeners, or advance copies of the program, to members of the press to view so they can write their reviews.

Now that the show has overtaken the books, the importance of secrecy and security has increased even more.

This year, the cast was required to enable and set up two-factor authentication on their email accounts, where they exclusively received digital copies of the script that they were not allowed to print out. This is according to Nathalie Emmanuel, who plays the character Missandei on the show. Emmanuel added that even any rehearsal notes the cast members received were restricted to the set, signed for and returned before the actors were permitted to leave.

For good reason, too. The series is a cultural juggernaut, and has generated its showrunners a vast amount of money. It is--in all senses of the word--a business, and if it was to lose its critical data or trade secrets (like who’s next to be violently eliminated from the Game of Thrones), their audience would have less of an incentive to tune in, and viewers would swiftly shift their support to a different project.

In this way, it is just as important that you ensure that your business’ data is secured as well. Otherwise, the same scenario would likely happen, your ‘audience’ replaced by your customers and clients.

Two-Factor Authentication requires a user to not only know their password to log into their email or online accounts, but also have their mobile device on hand to type in a texted code. Even if someone were to guess the password, it would still require the mobile device to log in. Many businesses are adopting this to comply with various regulations, but it’s also quickly becoming a best practice for security.

Are you excited about this season of Game of Thrones? Let us know in the comments what you think--but no spoilers, please!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 23 November 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Malware Google IT Services Business Efficiency Windows IT Support Innovation Disaster Recovery Hardware Business Continuity Workplace Tips VoIP Computer User Tips Saving Money Windows 10 Miscellaneous Virtualization Upgrade Mobile Device Management Mobile Devices Data Network Security Server Mobile Computing Email Alert Microsoft Office Communication Network Save Money Small Business Smartphone Quick Tips communications Social Media Smartphones Information Technology BYOD Going Green Mobile Office Apps Office Health Android Application Ransomware Browser Gadgets Managed IT Services Outsourced IT Operating System Chrome Tablet WiFi Productivity Managed IT Holiday Mobility Firewall Disaster Avoiding Downtime Remote Computing Risk Management Unified Threat Management IT Solutions Telephone Systems Spam BDR Cybersecurity Search Passwords Best Practice Data Management The Internet of Things Cybercrime Facebook Employer-Employee Relationship Budget Remote Monitoring Hard Drives History Saving Time Automation Apple Hacking Vendor Management VPN Computers Big Data Money iPhone Content Filtering Customer Relationship Management Recovery Phone System Data Backup Proactive IT User Error Office Tips Collaboration Law Enforcement Marketing Wireless Technology Phishing Password Data Recovery Hosted Solution Humor Administration Telephony Printer Wearable Technology USB Maintenance Analytics Encryption PowerPoint Gmail Virus Router Government Lithium-ion battery Work/Life Balance Antivirus Bring Your Own Device Shortcut Office 365 Social Current Events Vulnerability Computer Repair Tech Support Wireless Unsupported Software Private Cloud Outlook Cloud Computing Google Drive Save Time Users App Data Security Windows 8 Data Protection Cost Management SaaS Intranet Audit Bandwidth HaaS Printer Server Laptop Business Intelligence OneNote Education Point of Sale Trending IT COnsultant Politics Net Neutrality Personal Information Social Engineering Computer Care Battery Instant Messaging Robot Augmented Reality Emails Paperless Office HIPAA Data Storage Automobile Entertainment Benefits End of Support DDoS Fax Server Computer Accessories Social Networking Workplace Mouse Internet Exlporer Compliance Streaming Media Internet of Things Uninterrupted Power Supply Identity Theft online currency Two-factor Authentication Managing Stress Solid State Drive Flexibility Excel Sports Samsung Travel Wi-Fi Efficency Artificial Intelligence Network Congestion Emergency IT Support Update Customer Service Biometrics Applications Windows 10 Help Desk Retail Virtual Reality hacker Meetings Display Transportation IT consulting Data Loss Experience iOS Amazon Human Resources Running Cable Avoid Downtime Co-managed IT Keyboard Managed IT Service Adobe Managed IT Services Reliable Computing Google Docs Music Computer Fan Lifestyle Hiring/Firing Licensing Ebay Bloatware Data storage Microsoft Excel Books Dark Web Computing Video Games Smart Technology Screen Mirroring Document Management File Sharing Data Breach Hard Drive Branding Advertising Distributed Denial of Service Legal Cast Mobile Device Windows 10s Touchpad WIndows 7 systems Uograde Managed Security Nanotechnology Images eWaste Storage Inbound Marketing Scam Tablets Hard Disk Drive Twitter Regulations hack Root Cause Analysis HBO Surge Protector Value Employer Employee Relationship NFL Worker Commute best practices Operating Sysytem Television Cameras User Cortana CrashOverride 3D Printing PDF IT Management Scalability Science Files Word data breach Wiring Virtual Desktop Presentation Bluetooth Text Messaging Best Available Legislation Information Safety Settings WIndows Server 2008 ISP IT Technicians How To Chromecast Upgrades Windows Ink Debate risk management SharePoint Training Patch Management Programming Blogging Administrator Consultant Google Maps Colocation Teamwork The Blindside Of Commerce Company Culture Regulation Black Market Website Access Busines Continuity Near Field Communication Touchscreen Software as a Service Networking Nokia IT Security Cleaning Sync OneDrive Relocation Webinar Mobile IT solutions Professional Services Microblogging Youtube Tutorial Taxes Sales IT service Managed Service Provder Supercomputer Webinar Electronic Medical Records Domains IT Budget Gift Giving Reputation Comparison Buisness Specifications Shadow IT