ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

A Few Security Lessons Your Business Can Learn From Game of Thrones

A Few Security Lessons Your Business Can Learn From Game of Thrones

Security is a major concern for anything successful, and television programming is no different. Game of Thrones, the BBC’s epic production based on George R.R. Martin's book series A Song of Ice and Fire, has always been concerned with their security--and with the television series overtaking the book series, that concern has only grown as the production has brand new secrets to keep safe. As a result, the production has seen a steady increase in security.

Last season, scripts were handed out much more sparingly, and code words were assigned to characters and scenes. The network has also stopped the tradition of distributing advance copies of the program to members of the press, which is normally done so that reviews may be written.

With the action in the show finally overtaking the action in the books this season, the concern for the show’s security has leapt to new heights.

This year, two-factor authentication had to be set up on every cast member’s email account, where they would receive their copy of the script. According to Nathalie Emmanuel, who plays the role of Missandei on the show, these copies were not to be printed out. Even the notes that the cast members received during rehearsal were not to leave the set, and had to be turned in before the actors could leave.

This dedication to secrecy only makes sense. Game of Thrones is a bona fide cultural phenomenon, and more importantly has generated an astonishing amount of revenue. This is mainly because subscribers to HBO’s content repeatedly tune in every week to find out who is next on the chopping block--the show’s version of critical data. If that data was to get out ahead of schedule, subscribers would have less of an incentive to subscribe and would quickly transfer their focus (and capital) elsewhere.

Your business’ data needs to be secured for similar reasons--just substitute ‘subscribers’ for ‘clients’ in the situation above, and you see the importance of keeping your data secured.

Taking a page from Game of Thrones’ production can help you here. Two-factor authentication is a method of ensuring data security by requiring a secondary form of authentication to access an account, for example, a unique code sent to a mobile device. If the password were to somehow be guessed by some other party, they wouldn’t be able to access the account without the secondary code. There are many businesses that are already using this method, both as a means of compliance with various regulations and to reinforce their security.

So, tell us: are you looking forward to the rest of this season of Game of Thrones? Tell us in the comments, but please don’t spoil anything!

 

Comments

No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Google Privacy Business Computing Hackers Microsoft Cloud Backup Innovation Small Business Email Smartphones Hardware Android Software Business Cybercrime How To Network Security Windows Malware Mobile Devices Data Data Backup Ransomware Efficiency VoIP Chrome Computers Internet Business Continuity User Tips Browser Cybersecurity Cloud Computing Social Engineering Productivity Managed IT Services Business Management Telephone Systems Smartphone Internet of Things Computer Spam Data Breach Operating System Social Media Two-factor Authentication App Server Automation Money Disaster Recovery Safety Data Recovery Law Enforcement Communication Bring Your Own Device Windows 10 Mobile Device Management Outsourced IT Gadgets Alert Collaboration Managed IT Services Upgrade Physical Security Artificial Intelligence Phishing Spam Blocking Private Cloud Google Drive Word Wi-Fi Downtime Public Cloud Data Security Vulnerability Windows 10 Recovery Office 365 Communications Quick Tips Saving Money Network Redundancy Internet Exlporer Avoiding Downtime Data storage Router Comparison BDR Government Save Money Passwords Data Storage Gmail Remote Monitoring Business Intelligence IT Management Virtualization Miscellaneous OneNote The Internet of Things IT Plan CES Hosted Solutions Bandwidth Unsupported Software Black Market Content Management Advertising Google Docs Telecommuting Data Management Big Data Excel Automobile Root Cause Analysis NarrowBand Legal Google Apps Office Tips Electronic Medical Records Tools Software Tips Blockchain Charger Website Remote Work Tip of the week Work/Life Balance Wireless Technology webinar Employer-Employee Relationship Health Cleaning Keyboard BYOD Windows 10s HIPAA Sports Computer Care Voice over Internet Protocol Identity Theft Windows Server 2008 Microsoft Office Meetings Facebook Networking Conferencing Workers Tech Support Hiring/Firing Managed IT Apps Robot Human Resources Hybrid Cloud Samsung Credit Cards Patch Management Windows 7 IBM Laptop Emails Infrastructure Files Shadow IT Botnet HBO Solid State Drive Staff PDF Value Multi-Factor Security Fraud Office Scam Flash Data loss Chromecast Supercomputer Touchpad Password Manager History Travel Audit Data Protection Trending Amazon Relocation Screen Mirroring Password Budget Business Mangement Computer Fan Digital Signature Amazon Web Services DDoS Sync Cast Netflix Recycling User Error Outlook FENG Specifications Current Events Online Shopping HaaS IT Services IT Support eWaste Humor YouTube Reputation Knowledge Evernote Apple Telephony Holiday Criminal End of Support Update Millennials Customer Flexibility Network Congestion Wireless Charging iPhone Skype Settings Internet exploMicrosoft Hacking Frequently Asked Questions Monitor Marketing Workforce Going Green IT Consultant Cortana Managed Service Provider Uninterrupted Power Supply Productivity Start Menu Search Vendor Management Politics How to Books Best Practice Save Time Emergency Mobile Device Experience Video Games Employer Employee Relationship Music Battery VPN Scalability Webinar Computer Accessories Education Information Technology Remote Computing Loyalty Transportation Content Workplace Tips IT solutions Bluetooth Computing Infrastructure SaaS Benefits Audiobook Techology Instant Messaging Thank You Applications Encryption Firewall Entertainment Worker Congratulations Wearable Technology Users Wireless Assessment Smart Technology IT Support Rootkit USB Virtual Reality Television Two Factor Authentication Training WiFi Troubleshooting Worker Commute CrashOverride Public Computer Mobility Risk Management