4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

With the mountainous success of Game of Thrones, the BBC-produced show has always been understandably concerned with their security. However, with the show officially overtaking the original source material, A Song of Ice and Fire, there is an increased presence of curious fans and members of the press with an eye out for a sneak peek at the action. This has led to more; somewhat more modern measures being adopted to keep the production’s secrets safe.

This is by no means the first time HBO has moved to increase the show’s security. During last year’s season, fewer of the actors were given scripts and code words for certain characters and scenes were developed, just in case. HBO also put a stop to distributing screeners, or advance copies of the program, to members of the press to view so they can write their reviews.

Now that the show has overtaken the books, the importance of secrecy and security has increased even more.

This year, the cast was required to enable and set up two-factor authentication on their email accounts, where they exclusively received digital copies of the script that they were not allowed to print out. This is according to Nathalie Emmanuel, who plays the character Missandei on the show. Emmanuel added that even any rehearsal notes the cast members received were restricted to the set, signed for and returned before the actors were permitted to leave.

For good reason, too. The series is a cultural juggernaut, and has generated its showrunners a vast amount of money. It is--in all senses of the word--a business, and if it was to lose its critical data or trade secrets (like who’s next to be violently eliminated from the Game of Thrones), their audience would have less of an incentive to tune in, and viewers would swiftly shift their support to a different project.

In this way, it is just as important that you ensure that your business’ data is secured as well. Otherwise, the same scenario would likely happen, your ‘audience’ replaced by your customers and clients.

Two-Factor Authentication requires a user to not only know their password to log into their email or online accounts, but also have their mobile device on hand to type in a texted code. Even if someone were to guess the password, it would still require the mobile device to log in. Many businesses are adopting this to comply with various regulations, but it’s also quickly becoming a best practice for security.

Are you excited about this season of Game of Thrones? Let us know in the comments what you think--but no spoilers, please!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 September 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Business Computing Internet software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware IT Services Business Google Efficiency Windows Innovation Disaster Recovery IT Support Hardware Workplace Tips Business Continuity VoIP Computer Saving Money Miscellaneous Virtualization User Tips Upgrade Windows 10 Mobile Devices Data Mobile Device Management Server Mobile Computing Email Network Security Communication Network Save Money Microsoft Office Alert communications Quick Tips Information Technology Social Media Smartphones BYOD Going Green Mobile Office Smartphone Health Apps Small Business Android Office Operating System Browser Chrome Gadgets Application Ransomware Outsourced IT Tablet Firewall Avoiding Downtime Disaster Productivity Managed IT Services Holiday WiFi The Internet of Things Mobility Remote Computing Unified Threat Management IT Solutions Passwords Cybercrime Spam BDR Telephone Systems Managed IT Search Risk Management Automation Cybersecurity Remote Monitoring History Hacking Best Practice Facebook Data Management Hard Drives Vendor Management Saving Time Employer-Employee Relationship Budget Collaboration Law Enforcement Customer Relationship Management VPN Wireless Technology Office Tips Big Data Apple Phishing Password Hosted Solution Marketing Computers Proactive IT Recovery Phone System Wearable Technology iPhone Maintenance PowerPoint Current Events Virus Office 365 Antivirus Shortcut Printer Social USB Content Filtering Money Bring Your Own Device Analytics Gmail Router Telephony User Error Humor Administration Lithium-ion battery Printer Server Laptop OneNote Work/Life Balance Data Recovery Trending Education Net Neutrality HaaS Users Windows 8 Business Intelligence Tech Support Data Backup Outlook Wireless Social Engineering Encryption Unsupported Software Cloud Computing Google Drive Government App Point of Sale Cost Management IT COnsultant Save Time Private Cloud Intranet Computer Repair Bandwidth Compliance IT Support Flexibility Mouse Efficency Two-factor Authentication Vulnerability Managing Stress Social Networking Samsung SaaS Excel Wi-Fi Emergency Audit Applications Display Travel Data Storage hacker Augmented Reality Personal Information Customer Service Update Transportation Biometrics Paperless Office Retail Virtual Reality Computer Care Battery Robot Fax Server Meetings Workplace Automobile End of Support Network Congestion Streaming Media Instant Messaging Emails Help Desk Uninterrupted Power Supply online currency HIPAA Internet Exlporer Entertainment Benefits DDoS Internet of Things Computer Accessories Identity Theft Data Protection Solid State Drive Employer Employee Relationship Distributed Denial of Service Sports Operating Sysytem Patch Management Worker Commute Windows 10 PDF ISP WIndows 7 Inbound Marketing Commerce Scalability eWaste Files Regulations Regulation Safety Text Messaging Programming Blogging Value How To Chromecast Cameras Upgrades Hard Drive Sync iOS Artificial Intelligence User Website Science Training Managed IT Service Administrator Colocation Virtual Desktop Uograde Presentation Consultant Images Adobe Managed IT Services The Blindside Of Computer Fan Bluetooth OneDrive Best Available Amazon Company Culture Black Market IT Technicians Access Touchscreen Co-managed IT Licensing Politics IT Security Dark Web SharePoint Cleaning Screen Mirroring Experience Keyboard Avoid Downtime Teamwork Ebay Computing Busines Continuity Wiring Cast Windows 10s Networking Information Near Field Communication Music Hiring/Firing Nanotechnology Debate Data Security Data storage Hard Disk Drive Human Resources IT consulting Tablets Books Smart Technology Root Cause Analysis Video Games Running Cable HBO Document Management best practices Advertising Reliable Computing NFL Data Breach Twitter CrashOverride Legal Bloatware Mobile Device IT Management Touchpad Surge Protector data breach Nokia Word Managed Security Scam Television Settings 3D Printing WIndows Server 2008 risk management Branding Supercomputer Electronic Medical Records Gift Giving Storage IT Budget IT service Reputation Domains Microblogging Youtube Sales Webinar Managed Service Provder Webinar Shadow IT IT solutions Relocation Buisness Mobile Lifestyle Professional Services Tutorial Taxes Windows Ink