MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

With the mountainous success of Game of Thrones, the BBC-produced show has always been understandably concerned with their security. However, with the show officially overtaking the original source material, A Song of Ice and Fire, there is an increased presence of curious fans and members of the press with an eye out for a sneak peek at the action. This has led to more; somewhat more modern measures being adopted to keep the production’s secrets safe.

This is by no means the first time HBO has moved to increase the show’s security. During last year’s season, fewer of the actors were given scripts and code words for certain characters and scenes were developed, just in case. HBO also put a stop to distributing screeners, or advance copies of the program, to members of the press to view so they can write their reviews.

Now that the show has overtaken the books, the importance of secrecy and security has increased even more.

This year, the cast was required to enable and set up two-factor authentication on their email accounts, where they exclusively received digital copies of the script that they were not allowed to print out. This is according to Nathalie Emmanuel, who plays the character Missandei on the show. Emmanuel added that even any rehearsal notes the cast members received were restricted to the set, signed for and returned before the actors were permitted to leave.

For good reason, too. The series is a cultural juggernaut, and has generated its showrunners a vast amount of money. It is--in all senses of the word--a business, and if it was to lose its critical data or trade secrets (like who’s next to be violently eliminated from the Game of Thrones), their audience would have less of an incentive to tune in, and viewers would swiftly shift their support to a different project.

In this way, it is just as important that you ensure that your business’ data is secured as well. Otherwise, the same scenario would likely happen, your ‘audience’ replaced by your customers and clients.

Two-Factor Authentication requires a user to not only know their password to log into their email or online accounts, but also have their mobile device on hand to type in a texted code. Even if someone were to guess the password, it would still require the mobile device to log in. Many businesses are adopting this to comply with various regulations, but it’s also quickly becoming a best practice for security.

Are you excited about this season of Game of Thrones? Let us know in the comments what you think--but no spoilers, please!

e-max.it: your social media marketing partner
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 22 November 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Privacy Best Practices Business Computing Hackers Malware Software Backup Network Security Hosted Solutions google Internet Productivity Disaster Recovery Computer Microsoft Business Continuity Managed IT Services Business Windows 10 IT Support VoIP Innovation IT Services User Tips Outsourced IT Business Management Hardware Mobile Devices Managed IT Mobility communications Efficiency Ransomware Email Smartphone Productivity Mobile Device Management Windows Telephone Systems Small Business Server Save Money Cybercrime Saving Money Android Cybersecurity Virtualization Data Backup Apps Law Enforcement Operating System Hosted Solution Quick Tips Password BYOD Data BDR Money Chrome Information Technology Data Recovery Recovery VPN Passwords browser Microsoft Office Google Drive Hacking Work/Life Balance Avoiding Downtime Health Miscellaneous Managed Service Provider Computers Social upgrade Office 365 Communication Budget Wireless Smartphones Data Management Facebook Government Unsupported Software Cloud Computing Gadgets Shortcut Workplace Tips Automation Telephony Holiday Wi-Fi Alert Data Security Firewall Application Current Events Office tips Applications Audit Private Cloud Proactive IT Personal Information Social Media Best Practice search App Politics USB Save Time Risk Management Phishing Managed IT Services Update Artificial Intelligence Wireless Technology Flexibility IT solutions Cost Management DDoS iPhone Mobile Computing SaaS Transportation Television Social Engineering Antivirus Google Docs Samsung Robot Content Filtering Apple Streaming Media Battery HaaS History End of Support Remote Computing Data Protection WiFi Compliance IT Support Going Green Automobile Bandwidth Internet of Things Commerce The Internet of Things Humor Disaster Saving Time Cleaning Windows 10 Employer-Employee Relationship Office Computer Care Phone System User Error Vulnerability Network Sports Spam Users Encryption Gmail Identity Theft Data Storage Hacker Solid State Drive Internet Exlporer Worker Commute Google Maps Computer Accessories OneNote Mobile Device Access Screen Mirroring Big Data Data Breach calculator Relocation Specifications Twitter Sync Dark Web Managing Stress control Software as a Service Meetings Cast Books Emails Scalability Sales WSJ PDF Adobe Hiring/Firing Education Router Exchange Data Loss Vendor Management Settings Retail Marketing Distributed Denial of Service How To altivista Text Messaging Licensing Benefits SBS Unified Threat Management HBO Webinar compaq Mobile Training Entertainment Wearable Technology Microsoft Excel Upgrades Electronic Medical Records IT solutions hp Point of Sale Laptop Professional Services Uninterrupted Power Supply Collaboration Company Culture HIPAA domain File Sharing Consultant IT Management Windows 10s Black Market Touchpad Travel Smart Technology Nanotechnology Value Avoid Downtime remote Reputation Storage Yahoo Advertising Two-factor Authentication WIndows Server 2008 Hard Disk Drive eWaste Shadow IT Document Management Tablets Root Cause Analysis Experience Running Cable Server 2008 Cortana Ali Rowghani Data storage Patch Management Trending NFL Augmented Reality Chromecast Business Intelligence Touchscreen Video Games Administration Lifestyle Outlook Virtual Reality Word Scam Managed IT Service Music Legal server installation dvd "cannot install required files" Colocation Legislation stock Hard Drives Excel Tech Support iOS Windows Ink Employer Employee Relationship Files Administrator Analytics Lithium-ion battery Comparison tweet Regulation Keyboard Computer Fan Instant Messaging WannaCry Cache Monitors Remote Monitoring Safety Emergency Worker Thank You CrashOverride Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...