4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

With the mountainous success of Game of Thrones, the BBC-produced show has always been understandably concerned with their security. However, with the show officially overtaking the original source material, A Song of Ice and Fire, there is an increased presence of curious fans and members of the press with an eye out for a sneak peek at the action. This has led to more; somewhat more modern measures being adopted to keep the production’s secrets safe.

This is by no means the first time HBO has moved to increase the show’s security. During last year’s season, fewer of the actors were given scripts and code words for certain characters and scenes were developed, just in case. HBO also put a stop to distributing screeners, or advance copies of the program, to members of the press to view so they can write their reviews.

Now that the show has overtaken the books, the importance of secrecy and security has increased even more.

This year, the cast was required to enable and set up two-factor authentication on their email accounts, where they exclusively received digital copies of the script that they were not allowed to print out. This is according to Nathalie Emmanuel, who plays the character Missandei on the show. Emmanuel added that even any rehearsal notes the cast members received were restricted to the set, signed for and returned before the actors were permitted to leave.

For good reason, too. The series is a cultural juggernaut, and has generated its showrunners a vast amount of money. It is--in all senses of the word--a business, and if it was to lose its critical data or trade secrets (like who’s next to be violently eliminated from the Game of Thrones), their audience would have less of an incentive to tune in, and viewers would swiftly shift their support to a different project.

In this way, it is just as important that you ensure that your business’ data is secured as well. Otherwise, the same scenario would likely happen, your ‘audience’ replaced by your customers and clients.

Two-Factor Authentication requires a user to not only know their password to log into their email or online accounts, but also have their mobile device on hand to type in a texted code. Even if someone were to guess the password, it would still require the mobile device to log in. Many businesses are adopting this to comply with various regulations, but it’s also quickly becoming a best practice for security.

Are you excited about this season of Game of Thrones? Let us know in the comments what you think--but no spoilers, please!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 26 July 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Internet Business Computing software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware Business Google Efficiency IT Services Innovation Windows IT Support Workplace Tips Disaster Recovery Hardware Saving Money Miscellaneous VoIP Windows 10 Business Continuity Computer Upgrade Virtualization Mobile Devices Data Mobile Device Management Server Mobile Computing User Tips Save Money Network Security Communication Network Quick Tips Alert Social Media Smartphones BYOD Going Green Mobile Office Email Information Technology Microsoft Office communications Office Smartphone Health Apps Small Business Gadgets Android Application Ransomware Operating System Avoiding Downtime Managed IT Services Outsourced IT Disaster Tablet Browser Firewall The Internet of Things WiFi Remote Computing Unified Threat Management IT Solutions Productivity Passwords BDR Search Risk Management Mobility Holiday Chrome Facebook Telephone Systems Employer-Employee Relationship Hard Drives Spam Budget Managed IT Saving Time Vendor Management Automation Hacking Best Practice Data Management Remote Monitoring History Password Cybercrime Hosted Solution Big Data Apple Recovery Marketing Cybersecurity Office Tips Wireless Technology Customer Relationship Management VPN PowerPoint Phishing Money Virus Printer Computers Telephony USB Content Filtering Analytics Phone System Bring Your Own Device Gmail Router Proactive IT Law Enforcement User Error Lithium-ion battery Humor Collaboration Administration Antivirus Wearable Technology iPhone Social Maintenance Current Events Education Trending Net Neutrality Wireless Users Social Engineering Google Drive Cloud Computing Windows 8 Tech Support Save Time Private Cloud Encryption Government App Work/Life Balance Cost Management Point of Sale IT COnsultant Intranet Office 365 Bandwidth Printer Server Computer Repair HaaS Laptop OneNote Business Intelligence Battery Biometrics Robot Social Networking Computer Care Retail Virtual Reality Automobile Display Unsupported Software Meetings End of Support Augmented Reality Emails Internet Exlporer Paperless Office Instant Messaging HIPAA Entertainment Internet of Things Outlook Fax Server Benefits Identity Theft Workplace DDoS Data Protection Computer Accessories Solid State Drive Flexibility Streaming Media Mouse Network Congestion Uninterrupted Power Supply online currency Help Desk IT Support Samsung Two-factor Authentication Managing Stress SaaS Audit hacker Efficency Personal Information Shortcut Transportation Update Customer Service Website Data Storage Teamwork Music Hard Drive Busines Continuity Dark Web Hiring/Firing Networking Near Field Communication Data storage OneDrive Screen Mirroring Books Uograde Images Amazon Co-managed IT Data Backup Smart Technology Video Games Human Resources Document Management IT consulting Cast Windows 10s Running Cable Data Breach Advertising Nanotechnology Legal Reliable Computing Touchpad Ebay Data Security Mobile Device Computing Hard Disk Drive Managed Security Root Cause Analysis Scam Bloatware Wiring HBO best practices Information Sports CrashOverride Employer Employee Relationship Branding Worker Commute Operating Sysytem Debate IT Management data breach Distributed Denial of Service PDF Compliance Files Settings Scalability Twitter WIndows 7 risk management eWaste Safety Text Messaging Inbound Marketing Regulations Chromecast Surge Protector How To Upgrades Television Wi-Fi 3D Printing Windows 10 Emergency Excel Artificial Intelligence Nokia Value Cameras Administrator Commerce Training Consultant Applications User Colocation Vulnerability The Blindside Of Science Black Market Presentation Access ISP Data Recovery Company Culture Virtual Desktop Touchscreen Bluetooth Politics Best Available iOS IT Technicians IT Security Travel Programming Blogging Managed IT Service Cleaning Managed IT Services SharePoint Experience Computer Fan Keyboard Avoid Downtime Buisness Webinar Microblogging Youtube IT solutions Sales Managed Service Provder Lifestyle Webinar Taxes Tutorial Supercomputer Electronic Medical Records WIndows Server 2008 IT Budget Storage IT service Reputation Domains Gift Giving Shadow IT Relocation