MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

With the mountainous success of Game of Thrones, the BBC-produced show has always been understandably concerned with their security. However, with the show officially overtaking the original source material, A Song of Ice and Fire, there is an increased presence of curious fans and members of the press with an eye out for a sneak peek at the action. This has led to more; somewhat more modern measures being adopted to keep the production’s secrets safe.

This is by no means the first time HBO has moved to increase the show’s security. During last year’s season, fewer of the actors were given scripts and code words for certain characters and scenes were developed, just in case. HBO also put a stop to distributing screeners, or advance copies of the program, to members of the press to view so they can write their reviews.

Now that the show has overtaken the books, the importance of secrecy and security has increased even more.

This year, the cast was required to enable and set up two-factor authentication on their email accounts, where they exclusively received digital copies of the script that they were not allowed to print out. This is according to Nathalie Emmanuel, who plays the character Missandei on the show. Emmanuel added that even any rehearsal notes the cast members received were restricted to the set, signed for and returned before the actors were permitted to leave.

For good reason, too. The series is a cultural juggernaut, and has generated its showrunners a vast amount of money. It is--in all senses of the word--a business, and if it was to lose its critical data or trade secrets (like who’s next to be violently eliminated from the Game of Thrones), their audience would have less of an incentive to tune in, and viewers would swiftly shift their support to a different project.

In this way, it is just as important that you ensure that your business’ data is secured as well. Otherwise, the same scenario would likely happen, your ‘audience’ replaced by your customers and clients.

Two-Factor Authentication requires a user to not only know their password to log into their email or online accounts, but also have their mobile device on hand to type in a texted code. Even if someone were to guess the password, it would still require the mobile device to log in. Many businesses are adopting this to comply with various regulations, but it’s also quickly becoming a best practice for security.

Are you excited about this season of Game of Thrones? Let us know in the comments what you think--but no spoilers, please!

e-max.it: your social media marketing partner
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 22 September 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Business Computing Privacy Best Practices Hackers Malware Hosted Solutions Backup Software Network Security Internet Computer Disaster Recovery google Productivity Business Microsoft Managed IT Services Windows 10 Business Continuity IT Support IT Services VoIP Innovation Outsourced IT User Tips Hardware Mobile Devices communications Business Management Windows Efficiency Email Mobility Ransomware Productivity Managed IT Server Cybercrime Saving Money Mobile Device Management Save Money Telephone Systems Hosted Solution Quick Tips Apps Android Smartphone Virtualization Operating System Law Enforcement Recovery Password Small Business Microsoft Office Cybersecurity Chrome BYOD Data BDR Information Technology Passwords browser Unsupported Software upgrade Social Hacking Avoiding Downtime Communication Health Miscellaneous Managed Service Provider Computers Money Office 365 VPN Facebook Wireless Budget Smartphones Gadgets Data Management Workplace Tips Risk Management Cloud Computing Shortcut Work/Life Balance Google Drive Wi-Fi search Automation Telephony Firewall App Application Alert Current Events Applications Private Cloud Office tips Government Proactive IT Social Media USB Data Backup Save Time Computer Care Phone System IT solutions Employer-Employee Relationship DDoS Holiday Network Users Identity Theft Television Social Engineering Hacker Internet Exlporer IT Support Streaming Media Flexibility Solid State Drive Wireless Technology Cost Management WiFi Going Green Data Recovery Bandwidth Mobile Computing Samsung Antivirus Transportation Battery Audit Spam HaaS Robot Phishing History Compliance Personal Information End of Support Remote Computing Data Storage Managed IT Services Automobile Best Practice Internet of Things Gmail The Internet of Things Saving Time Humor Disaster Cleaning Update Office Data storage Settings Video Games Twitter control Data Security Marketing Virtual Reality Scam Administration Chromecast Licensing Music Legal WSJ Encryption Exchange Sports HBO Webinar Employer Employee Relationship Distributed Denial of Service altivista Colocation Mobile Tech Support Analytics Hard Drives Instant Messaging SBS Files Data Protection Keyboard IT solutions Computer Accessories Lithium-ion battery Collaboration Worker Commute Artificial Intelligence compaq Administrator Professional Services Mobile Device Big Data Apple Managing Stress Wearable Technology IT Management Windows 10s Travel Nanotechnology hp Relocation Access Commerce Books Scalability Hard Disk Drive Education domain WIndows Server 2008 Hiring/Firing Tablets Vendor Management Root Cause Analysis Router iPhone SaaS How To PDF Windows 10 remote Patch Management Benefits NFL Augmented Reality eWaste Yahoo Unified Threat Management Business Intelligence Content Filtering Touchscreen Text Messaging Vulnerability Running Cable Server 2008 Outlook Word Training Entertainment Ali Rowghani Upgrades Managed IT Service Electronic Medical Records Trending iOS Point of Sale User Error Excel Company Culture HIPAA Laptop Consultant Uninterrupted Power Supply Black Market Computer Fan server installation dvd "cannot install required files" Regulation Smart Technology Value OneNote Politics Avoid Downtime stock Touchpad Two-factor Authentication Screen Mirroring Data Breach Shadow IT Dark Web Document Management Reputation Sync Meetings Experience tweet Advertising Cast Emails calculator Adobe Worker WannaCry Cache Monitors Remote Monitoring Windows Ink CrashOverride Safety Thank You Emergency Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...