Emerald City Solutions

Stay up-to-date with the latest technology news.

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

With the mountainous success of Game of Thrones, the BBC-produced show has always been understandably concerned with their security. However, with the show officially overtaking the original source material, A Song of Ice and Fire, there is an increased presence of curious fans and members of the press with an eye out for a sneak peek at the action. This has led to more; somewhat more modern measures being adopted to keep the production’s secrets safe.

This is by no means the first time HBO has moved to increase the show’s security. During last year’s season, fewer of the actors were given scripts and code words for certain characters and scenes were developed, just in case. HBO also put a stop to distributing screeners, or advance copies of the program, to members of the press to view so they can write their reviews.

Now that the show has overtaken the books, the importance of secrecy and security has increased even more.

This year, the cast was required to enable and set up two-factor authentication on their email accounts, where they exclusively received digital copies of the script that they were not allowed to print out. This is according to Nathalie Emmanuel, who plays the character Missandei on the show. Emmanuel added that even any rehearsal notes the cast members received were restricted to the set, signed for and returned before the actors were permitted to leave.

For good reason, too. The series is a cultural juggernaut, and has generated its showrunners a vast amount of money. It is--in all senses of the word--a business, and if it was to lose its critical data or trade secrets (like who’s next to be violently eliminated from the Game of Thrones), their audience would have less of an incentive to tune in, and viewers would swiftly shift their support to a different project.

In this way, it is just as important that you ensure that your business’ data is secured as well. Otherwise, the same scenario would likely happen, your ‘audience’ replaced by your customers and clients.

Two-Factor Authentication requires a user to not only know their password to log into their email or online accounts, but also have their mobile device on hand to type in a texted code. Even if someone were to guess the password, it would still require the mobile device to log in. Many businesses are adopting this to comply with various regulations, but it’s also quickly becoming a best practice for security.

Are you excited about this season of Game of Thrones? Let us know in the comments what you think--but no spoilers, please!

Tip of the Week: Backup Your Personal Files With G...
Keep Bring Your Own Device From Becoming Bring You...

Related Posts



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 17 August 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

Tag Cloud

Tip of the Week security email technology Best Practices Business Computing Privacy IT Support malware Internet Business Management Software Backup hackers User Tips Cloud Hosted Solutions Unsupported Software Passwords Google phishing business Managed IT Services Ransomware Small Business Social Media Windows emails Android Managed IT Microsoft Marketing Browser Productivity threats Hardware Disaster Recovery Screen Mirroring IT Services business owner Efficiency App devices Alert Gadgets Cloud Computing Facebook Smartphone Outsourced IT Data Security Smartphones Best Practice Business ’ Security Businesses Shortcut SaaS Webinar Facebook pop-ups Network HBO network security Emerald City Solutions Excel Root Cause Analysis Save Money IT solutions search engines Google Drive iOS Upgrades data leak access Microsoft Office Application Commerce Operating System Data Protection Business Continuity Law Enforcement company ’s network today ’s business world Computers Augmented Reality Data Recovery Windows 10s Social Engineering Risk Management Audit WiFi solutions Virtualization Chrome Hosted Solution Solid State Drive Employer-Employee Relationship business computer system IT Management Cybersecurity Wireless mobile business Spam Data Storage Hard Disk Drive Communications snail mail IT Solutions Computer Care consumer goods cyber threats CrashOverride Money Information Technology Telephone Systems spam cost Proactive IT Computer Fan BDR technology research organization OneNote Touchscreen Cast Computer Consultant WIndows Server 2008 locks users Office 365 Managed Service Provider BYOD Windows 10 Unified Threat Management time Patch Management Innovation Apps email protection blocks admittance Mobile Device Management Vulnerability Cybercrime employees Outlook Nanotechnology today ’s Internet text messages Meetings

Recent Comments

No comments yet.