MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

With the mountainous success of Game of Thrones, the BBC-produced show has always been understandably concerned with their security. However, with the show officially overtaking the original source material, A Song of Ice and Fire, there is an increased presence of curious fans and members of the press with an eye out for a sneak peek at the action. This has led to more; somewhat more modern measures being adopted to keep the production’s secrets safe.

This is by no means the first time HBO has moved to increase the show’s security. During last year’s season, fewer of the actors were given scripts and code words for certain characters and scenes were developed, just in case. HBO also put a stop to distributing screeners, or advance copies of the program, to members of the press to view so they can write their reviews.

Now that the show has overtaken the books, the importance of secrecy and security has increased even more.

This year, the cast was required to enable and set up two-factor authentication on their email accounts, where they exclusively received digital copies of the script that they were not allowed to print out. This is according to Nathalie Emmanuel, who plays the character Missandei on the show. Emmanuel added that even any rehearsal notes the cast members received were restricted to the set, signed for and returned before the actors were permitted to leave.

For good reason, too. The series is a cultural juggernaut, and has generated its showrunners a vast amount of money. It is--in all senses of the word--a business, and if it was to lose its critical data or trade secrets (like who’s next to be violently eliminated from the Game of Thrones), their audience would have less of an incentive to tune in, and viewers would swiftly shift their support to a different project.

In this way, it is just as important that you ensure that your business’ data is secured as well. Otherwise, the same scenario would likely happen, your ‘audience’ replaced by your customers and clients.

Two-Factor Authentication requires a user to not only know their password to log into their email or online accounts, but also have their mobile device on hand to type in a texted code. Even if someone were to guess the password, it would still require the mobile device to log in. Many businesses are adopting this to comply with various regulations, but it’s also quickly becoming a best practice for security.

Are you excited about this season of Game of Thrones? Let us know in the comments what you think--but no spoilers, please!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 20 July 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Privacy Business Computing Best Practices Hackers Malware Backup Internet Hosted Solutions Software Network Security Productivity Computer google Business Microsoft Disaster Recovery Windows 10 Innovation Business Continuity Managed IT Services IT Support VoIP Business Management IT Services Hardware Outsourced IT Efficiency Mobility Mobile Devices Save Money Windows Productivity Ransomware Saving Money communications Telephone Systems Apps Quick Tips User Tips Smartphone Operating System Hosted Solution Server Mobile Device Management Password Recovery Small Business Email Managed IT Android Virtualization Data BDR Cybercrime Law Enforcement Passwords Information Technology Budget upgrade Social Hacking Avoiding Downtime BYOD Communication Health Miscellaneous Wireless VPN Money Facebook Cybersecurity browser Gadgets Workplace Tips Smartphones Data Management Work/Life Balance Firewall Application Current Events Chrome Office 365 search Google Drive App Automation Telephony Alert Unsupported Software Cloud Computing Managed Service Provider Computers USB Private Cloud Save Time Office tips Government Social Media Update The Internet of Things Disaster Humor Samsung Flexibility Audit DDoS Holiday Employer-Employee Relationship Wi-Fi Television Network Social Engineering Antivirus Streaming Media Hacker Solid State Drive Microsoft Office Internet Exlporer Battery Saving Time Wireless Technology HaaS WiFi Going Green Office Computer Care Personal Information Bandwidth Cleaning Automobile Mobile Computing Transportation Users Robot Applications History End of Support Remote Computing Risk Management Gmail Best Practice Internet of Things Identity Theft Reputation SaaS Analytics Managed IT Service calculator Webinar Advertising Benefits Instant Messaging Worker Commute IT solutions Twitter Root Cause Analysis Unified Threat Management Big Data Data Storage control IT solutions Data storage Managing Stress WSJ Augmented Reality Training Administration Upgrades Chromecast Books Scalability Screen Mirroring Exchange Distributed Denial of Service altivista Windows 10s Compliance Education Sports Router Spam Company Culture SBS Colocation Consultant How To Cast compaq Hard Disk Drive Hard Drives Smart Technology Tech Support Files Apple OneNote Value Two-factor Authentication Administrator Content Filtering Lithium-ion battery Wearable Technology Data Security hp Windows 10 Entertainment Meetings HBO domain Relocation Touchscreen Access Electronic Medical Records Point of Sale Vulnerability HIPAA Settings Data Protection remote iPhone Phishing Black Market eWaste Yahoo iOS PDF Scam Politics Avoid Downtime IT Support Server 2008 Managed IT Services Shadow IT Running Cable Document Management Ali Rowghani Computer Fan Text Messaging Employer Employee Relationship Experience Trending Commerce Data Breach Keyboard User Error Dark Web Computer Accessories Mobile Device Phone System Video Games Data Recovery server installation dvd "cannot install required files" Emails Shortcut Virtual Reality Uninterrupted Power Supply stock Data Backup Artificial Intelligence Laptop Cost Management Proactive IT Music Legal Business Intelligence Marketing Hiring/Firing Encryption tweet Nanotechnology Touchpad Vendor Management

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.