MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

With the mountainous success of Game of Thrones, the BBC-produced show has always been understandably concerned with their security. However, with the show officially overtaking the original source material, A Song of Ice and Fire, there is an increased presence of curious fans and members of the press with an eye out for a sneak peek at the action. This has led to more; somewhat more modern measures being adopted to keep the production’s secrets safe.

This is by no means the first time HBO has moved to increase the show’s security. During last year’s season, fewer of the actors were given scripts and code words for certain characters and scenes were developed, just in case. HBO also put a stop to distributing screeners, or advance copies of the program, to members of the press to view so they can write their reviews.

Now that the show has overtaken the books, the importance of secrecy and security has increased even more.

This year, the cast was required to enable and set up two-factor authentication on their email accounts, where they exclusively received digital copies of the script that they were not allowed to print out. This is according to Nathalie Emmanuel, who plays the character Missandei on the show. Emmanuel added that even any rehearsal notes the cast members received were restricted to the set, signed for and returned before the actors were permitted to leave.

For good reason, too. The series is a cultural juggernaut, and has generated its showrunners a vast amount of money. It is--in all senses of the word--a business, and if it was to lose its critical data or trade secrets (like who’s next to be violently eliminated from the Game of Thrones), their audience would have less of an incentive to tune in, and viewers would swiftly shift their support to a different project.

In this way, it is just as important that you ensure that your business’ data is secured as well. Otherwise, the same scenario would likely happen, your ‘audience’ replaced by your customers and clients.

Two-Factor Authentication requires a user to not only know their password to log into their email or online accounts, but also have their mobile device on hand to type in a texted code. Even if someone were to guess the password, it would still require the mobile device to log in. Many businesses are adopting this to comply with various regulations, but it’s also quickly becoming a best practice for security.

Are you excited about this season of Game of Thrones? Let us know in the comments what you think--but no spoilers, please! your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 February 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Cloud Privacy Best Practices Business Computing Hackers Network Security Malware Software Internet Hosted Solutions Backup google Business Management Productivity Managed IT Services Microsoft Computer Disaster Recovery Business IT Support Outsourced IT Mobile Devices Business Continuity User Tips Windows 10 communications VoIP Email Hardware IT Services Innovation Productivity Cybercrime Data Backup Efficiency Windows Managed IT Mobility Mobile Device Management Apps Smartphone Cybersecurity Server Ransomware Saving Money Data Recovery browser Telephone Systems Save Money Small Business Hosted Solution Quick Tips Android Operating System Virtualization Law Enforcement Internet of Things Recovery Data Security Chrome Microsoft Office BYOD Data BDR VPN Money Office 365 Passwords Information Technology Password Holiday Smartphones Data Management Risk Management Unsupported Software Social upgrade Cloud Computing App Google Drive Hacking Communication IT Support Avoiding Downtime Work/Life Balance Alert Health Miscellaneous Facebook Managed Service Provider Computers Government Phishing Best Practice Social Media Gadgets Wireless Budget USB Save Time Social Engineering Identity Theft search Wireless Technology Flexibility Collaboration Shortcut Automation Telephony Wi-Fi Firewall Application User Error Current Events Windows 10 Office tips Applications Audit Private Cloud History Vulnerability Personal Information Proactive IT Managed IT Services Politics The Internet of Things Workplace Tips Two-factor Authentication Data Breach Cleaning Employer-Employee Relationship Office Phone System Television Computer Care Project Management Data Loss Network Sports Streaming Media Legal Apple Marketing Users Tech Support Encryption Google Docs WiFi Hacker Solid State Drive Internet Exlporer Artificial Intelligence Going Green Bandwidth Data Protection eWaste Redundancy iPhone Cost Management Blockchain Commerce Mobile Computing Transportation SaaS Cortana Samsung Antivirus Robot Content Filtering Battery HaaS Remote Computing Gmail End of Support Spam Compliance Update Excel Automobile IT solutions Data Storage OneNote Humor Disaster DDoS Saving Time Dark Web Data storage Networking Exchange Sync Ciminal altivista Software as a Service Meetings Distributed Denial of Service Video Games Sales Cast Administration Emails Chromecast Virtual Reality Workers SBS Adobe compaq Settings Scam Music Retail Colocation Hard Drives WannaCry Wearable Technology Updates Licensing MSP hp Employer Employee Relationship Files Administrator Analytics Lithium-ion battery Conferencing HBO Webinar Keyboard Instant Messaging Microsoft Word domain Mobile intranet Microsoft Excel Computer Accessories Worker Commute Access Big Data Gifts Relocation Mobile Device IT solutions Managing Stress remote Professional Services IT budget Yahoo File Sharing Books Scalability IT Management Maintenance Windows 10s PDF Nanotechnology Hiring/Firing Education Running Cable Server 2008 Travel Router Ali Rowghani Storage Vendor Management Trending How To Credit Cards WIndows Server 2008 Device Security Hard Disk Drive Text Messaging Root Cause Analysis Benefits Tablets Identities FAQ Patch Management Devices Unified Threat Management Augmented Reality server installation dvd "cannot install required files" NFL stock Lifestyle Business Intelligence Training Touchscreen Entertainment Electronic Medical Records Charger Outlook Spyware Upgrades Laptop Uninterrupted Power Supply Point of Sale Word tweet Legislation Managed IT Service Company Culture HIPAA Black Market Wireless Charging Fraud Consultant iOS Windows Ink Touchpad Smart Technology calculator Avoid Downtime Twitter Comparison Reputation Value Computer Fan Shadow IT Evernote control Regulation Edge Advertising Google Maps Document Management WSJ Specifications Screen Mirroring Experience Worker Cache Monitors Remote Monitoring Thank You Congratulations Safety CrashOverride Emergency

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...