Velocity Technology Partners Blog

Velocity Technology Partners has been serving Athens, Gainesville and North Georgia since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

With the mountainous success of Game of Thrones, the BBC-produced show has always been understandably concerned with their security. However, with the show officially overtaking the original source material, A Song of Ice and Fire, there is an increased presence of curious fans and members of the press with an eye out for a sneak peek at the action. This has led to more; somewhat more modern measures being adopted to keep the production’s secrets safe.

This is by no means the first time HBO has moved to increase the show’s security. During last year’s season, fewer of the actors were given scripts and code words for certain characters and scenes were developed, just in case. HBO also put a stop to distributing screeners, or advance copies of the program, to members of the press to view so they can write their reviews.

Now that the show has overtaken the books, the importance of secrecy and security has increased even more.

This year, the cast was required to enable and set up two-factor authentication on their email accounts, where they exclusively received digital copies of the script that they were not allowed to print out. This is according to Nathalie Emmanuel, who plays the character Missandei on the show. Emmanuel added that even any rehearsal notes the cast members received were restricted to the set, signed for and returned before the actors were permitted to leave.

For good reason, too. The series is a cultural juggernaut, and has generated its showrunners a vast amount of money. It is--in all senses of the word--a business, and if it was to lose its critical data or trade secrets (like who’s next to be violently eliminated from the Game of Thrones), their audience would have less of an incentive to tune in, and viewers would swiftly shift their support to a different project.

In this way, it is just as important that you ensure that your business’ data is secured as well. Otherwise, the same scenario would likely happen, your ‘audience’ replaced by your customers and clients.

Two-Factor Authentication requires a user to not only know their password to log into their email or online accounts, but also have their mobile device on hand to type in a texted code. Even if someone were to guess the password, it would still require the mobile device to log in. Many businesses are adopting this to comply with various regulations, but it’s also quickly becoming a best practice for security.

Are you excited about this season of Game of Thrones? Let us know in the comments what you think--but no spoilers, please!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, July 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Data Storage Backup Content Filter Workers Passwords Big Data Productivity Excel PowerPoint The Internet of Things Server Data Backup Apps Spyware IT budget Alert Wireless Charging Value HBO Microsoft Office Apple Legal Hard Drive Best Practice VoIp Remote Computing NFL Identities Google Drive Charger Wi-Fi Company Culture Bring Your Own Device Microsoft Excel Spam Patch Management Communications Streaming Media Screen Mirroring Cost Management Computer Forensics Politics Blockchain Cybersecurity Flexibility Update Travel Microsoft Word History Hardware Money Automation Vendor Management Telephone IoT intranet Chrome Computer Internet of Things Audit Microsoft Data Theft Internet Software Managed Service Provider Websites Data Breach Softphones Lifestyle Comparison Holiday Wireless Technology Collaboration Work/Life Balance Data Recovery Identity Theft eWaste Antivirus Tip of the Week Ransomware Business Management Evernote Application Storage Gadgets Sports Marketing Ciminal Shortcut Virtualization BYOD Analysis Remote Monitoring Wireless Internet Unified Communications Gmail Mobile Security WIndows Server 2008 Software as a Service Proactive IT IT Support Maintenance Connectivity IT support Managed IT Services Computing Disaster Recovery Business Computing Specifications Encryption Device Security WannaCry App Chromebook Google Assistant User Error Hosted Solutions Router Managing Stress Personal Information Mobile Device Management Data Commerce Virus Licensing Social Media IT Services WiFi User Tips Malware Language Education Office 365 Business Continuity Hybrid Cloud Sync Best Practices Printing Smart Tech Smartphones Identity Data Management Windows Data Protection Business Telephone Systems BDR Hosted Solution Memory Government Google Maps IT Solutions Operating System Tablets Privacy Hackers Communication Cast SaaS Google Docs Technology Mobility Small Business Two-factor Authentication Managed IT Cleaning Browser Edge Tech Support OneNote Emergency Updates Redundancy Tech Term Computers Risk Management Fraud Gamification Data Loss Adobe Twitter Social Engineering Gifts Saving Money Conferencing Efficiency Windows 10 Phishing Legislation Outsourced IT Devices Word Cortana Cybercrime Mobile Devices Unsupported Software Smartphone Artificial Intelligence Outlook Applications Project Management IT Management Proactive Thank You Safety Credit Cards File Sharing Financial Technology MSP Google Cloud Computing Data Security Compliance Managed IT services VPN Law Enforcement Sales Management iPhone Retail Windows Ink Network Data Privacy Content Filtering Employer-Employee Relationship Financial Networking Innovation Students Network Security Email Monitoring Vulnerability Cloud Security Congratulations Android FAQ App store