MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

With the mountainous success of Game of Thrones, the BBC-produced show has always been understandably concerned with their security. However, with the show officially overtaking the original source material, A Song of Ice and Fire, there is an increased presence of curious fans and members of the press with an eye out for a sneak peek at the action. This has led to more; somewhat more modern measures being adopted to keep the production’s secrets safe.

This is by no means the first time HBO has moved to increase the show’s security. During last year’s season, fewer of the actors were given scripts and code words for certain characters and scenes were developed, just in case. HBO also put a stop to distributing screeners, or advance copies of the program, to members of the press to view so they can write their reviews.

Now that the show has overtaken the books, the importance of secrecy and security has increased even more.

This year, the cast was required to enable and set up two-factor authentication on their email accounts, where they exclusively received digital copies of the script that they were not allowed to print out. This is according to Nathalie Emmanuel, who plays the character Missandei on the show. Emmanuel added that even any rehearsal notes the cast members received were restricted to the set, signed for and returned before the actors were permitted to leave.

For good reason, too. The series is a cultural juggernaut, and has generated its showrunners a vast amount of money. It is--in all senses of the word--a business, and if it was to lose its critical data or trade secrets (like who’s next to be violently eliminated from the Game of Thrones), their audience would have less of an incentive to tune in, and viewers would swiftly shift their support to a different project.

In this way, it is just as important that you ensure that your business’ data is secured as well. Otherwise, the same scenario would likely happen, your ‘audience’ replaced by your customers and clients.

Two-Factor Authentication requires a user to not only know their password to log into their email or online accounts, but also have their mobile device on hand to type in a texted code. Even if someone were to guess the password, it would still require the mobile device to log in. Many businesses are adopting this to comply with various regulations, but it’s also quickly becoming a best practice for security.

Are you excited about this season of Game of Thrones? Let us know in the comments what you think--but no spoilers, please!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, July 20 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Business Computing Network Security Hackers Malware Software Productivity Internet Managed IT Services Hosted Solutions Business Management Backup Mobile Devices google Computer Business Microsoft Disaster Recovery Outsourced IT Hardware IT Support communications VoIP Business Continuity Windows 10 Innovation IT Services Email Cybersecurity User Tips Data Backup Efficiency Tech Term Cybercrime Windows Data Recovery Saving Money Mobile Device Management Managed IT Server Small Business Ransomware Apps Internet of Things Mobility Operating System Productivity browser Data Law Enforcement Smartphone Office 365 Android Telephone Systems Virtualization BDR Money Save Money Smartphones Hosted Solution Quick Tips Phishing Passwords Cloud Computing Data Security Communication Recovery Network VPN Microsoft Office BYOD Automation Password Holiday Managed Service Provider Information Technology Chrome IT Support Budget Data Management Facebook Vulnerability Government Two-factor Authentication Wireless Google Drive Update Hacking Avoiding Downtime Data Breach Gadgets Risk Management Workplace Tips Unsupported Software Alert Health Miscellaneous Computers Work/Life Balance Cost Management Social upgrade Wi-Fi Collaboration Best Practice Social Media Application App Current Events Audit Employer-Employee Relationship Compliance Personal Information User Error Politics Spam Tech Support Gmail Cleaning Wireless Technology USB Managed IT Services Save Time Telephony Users Identity Theft Artificial Intelligence Applications Social Engineering Private Cloud Flexibility Blockchain Office tips History Shortcut Streaming Media Remote Computing Data Protection Proactive IT Router Firewall search The Internet of Things Antivirus Humor Content Filtering Commerce Disaster Battery eWaste HaaS Fraud Cortana Patch Management Windows 10 Sports Automobile Value Wireless Charging Hacker Excel Internet Exlporer Project Management Solid State Drive Saving Time Data Storage Office Phone System OneNote MSP Computer Care IT solutions Networking iPhone Legal Mobile Computing Encryption DDoS Transportation Data Loss Marketing Television Robot Management Google Docs Big Data Apple End of Support Education Mobile Security Devices WiFi Vendor Management SaaS Redundancy Going Green Google Assistant Bandwidth Samsung Travel Unified Threat Management Storage Business Technology Language remote Yahoo Credit Cards WIndows Server 2008 Hard Disk Drive Data Privacy Data storage Entertainment Root Cause Analysis Computer Forensics Training Tablets Upgrades Electronic Medical Records Wasting Money Running Cable Server 2008 Ali Rowghani FAQ Administration Chromecast Point of Sale Hard Drive HIPAA Augmented Reality PowerPoint Trending Edge Company Culture NFL Consultant Lifestyle Safety Business Intelligence Amazon Black Market Touchscreen Virus Charger Colocation Smart Technology Outlook Chromebook Wireless Internet Avoid Downtime Ciminal Hard Drives Word server installation dvd "cannot install required files" Legislation Managed IT Service Virtual Assistant Files Shadow IT Proactive Lithium-ion battery stock Administrator Document Management iOS Smart Tech Experience Gamification Windows Ink Comparison Alexa for Business Websites tweet Evernote Relocation Regulation Access Computer Fan Connectivity Memory Video Games Google Maps calculator Specifications Screen Mirroring Virtual Reality Data Theft Twitter Scam Sync Dark Web Content Filter Music Meetings Students intranet control PDF Software as a Service Sales Cast Emails Computing WSJ Workers Employer Employee Relationship Adobe Monitoring Analytics Settings Unified Communications IT budget Exchange Text Messaging altivista Retail Keyboard Instant Messaging Analysis Distributed Denial of Service Maintenance Updates Computer Accessories Licensing Worker Commute WannaCry Financial SBS Mobile Device compaq Conferencing HBO Managing Stress Webinar App store Financial Technology Device Security Microsoft Word Mobile Microsoft Excel Laptop Books Remote Monitoring Bring Your Own Device Uninterrupted Power Supply Scalability Identities Wearable Technology hp Gifts Hiring/Firing IT solutions Printing Professional Services File Sharing Touchpad Hybrid Cloud How To IoT domain Reputation Benefits IT Management Windows 10s Identity Nanotechnology Spyware Advertising Emergency Thank You CrashOverride Congratulations Worker Cache Monitors

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...