ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

A Few Security Lessons Your Business Can Learn From Game of Thrones

A Few Security Lessons Your Business Can Learn From Game of Thrones

Security is a major concern for anything successful, and television programming is no different. Game of Thrones, the BBC’s epic production based on George R.R. Martin's book series A Song of Ice and Fire, has always been concerned with their security--and with the television series overtaking the book series, that concern has only grown as the production has brand new secrets to keep safe. As a result, the production has seen a steady increase in security.

Last season, scripts were handed out much more sparingly, and code words were assigned to characters and scenes. The network has also stopped the tradition of distributing advance copies of the program to members of the press, which is normally done so that reviews may be written.

With the action in the show finally overtaking the action in the books this season, the concern for the show’s security has leapt to new heights.

This year, two-factor authentication had to be set up on every cast member’s email account, where they would receive their copy of the script. According to Nathalie Emmanuel, who plays the role of Missandei on the show, these copies were not to be printed out. Even the notes that the cast members received during rehearsal were not to leave the set, and had to be turned in before the actors could leave.

This dedication to secrecy only makes sense. Game of Thrones is a bona fide cultural phenomenon, and more importantly has generated an astonishing amount of revenue. This is mainly because subscribers to HBO’s content repeatedly tune in every week to find out who is next on the chopping block--the show’s version of critical data. If that data was to get out ahead of schedule, subscribers would have less of an incentive to subscribe and would quickly transfer their focus (and capital) elsewhere.

Your business’ data needs to be secured for similar reasons--just substitute ‘subscribers’ for ‘clients’ in the situation above, and you see the importance of keeping your data secured.

Taking a page from Game of Thrones’ production can help you here. Two-factor authentication is a method of ensuring data security by requiring a secondary form of authentication to access an account, for example, a unique code sent to a mobile device. If the password were to somehow be guessed by some other party, they wouldn’t be able to access the account without the secondary code. There are many businesses that are already using this method, both as a means of compliance with various regulations and to reinforce their security.

So, tell us: are you looking forward to the rest of this season of Game of Thrones? Tell us in the comments, but please don’t spoil anything!

 

Comments

No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Google Hackers Privacy Cloud Backup Microsoft Business Computing Innovation Smartphones Hardware Small Business Business Cybercrime Ransomware Efficiency Software Malware Data Android User Tips Cybersecurity Productivity Managed IT Services VoIP Email Internet Mobile Devices Business Continuity Data Backup Network Security Operating System Browser Social Media Server Automation Safety App Bring Your Own Device Mobile Device Management Gadgets Business Management Upgrade Law Enforcement Social Engineering How To Chrome Collaboration Computer Windows Spam Data Breach Computers Communication Google Drive Quick Tips Wi-Fi Public Cloud Saving Money Network Internet Exlporer Data storage Office 365 Disaster Recovery Save Money Passwords Cloud Computing Data Storage Money Word Windows 10 Router Government Miscellaneous The Internet of Things Bandwidth Hosted Solutions Telephone Systems Smartphone Unsupported Software Outsourced IT Alert Phishing Redundancy Spam Blocking Avoiding Downtime Managed IT Services Downtime Physical Security Windows 10 Artificial Intelligence Data Security Recovery Private Cloud Business Intelligence IBM Patch Management Health HBO Chromecast Emails Telephony Touchpad Solid State Drive Update Value Data loss Supercomputer Microsoft Office Scam Facebook Skype Audit Apps Hybrid Cloud Screen Mirroring Budget Frequently Asked Questions Communications DDoS Files Start Menu Computer Fan Google Docs Office Outlook Cast BDR Excel History Netflix Tools FENG Website Gmail Relocation Humor YouTube Current Events Tip of the week IT Support Voice over Internet Protocol IT Management Knowledge Windows Server 2008 Virtualization User Error Managed IT OneNote Two-factor Authentication Monitor IT Plan Network Congestion Windows 7 HaaS Uninterrupted Power Supply IT Services Going Green Settings Botnet Black Market Multi-Factor Security Reputation Apple NarrowBand IT Consultant Flash Productivity Travel Office Tips End of Support Internet of Things Root Cause Analysis Trending Customer Flexibility iPhone Software Tips Wireless Technology Cleaning Internet exploMicrosoft Hacking Comparison Sports Marketing Managed Service Provider BYOD webinar Sync Windows 10s Data Recovery Tech Support Computer Care Advertising Robot Meetings Specifications Networking Automobile Hiring/Firing Conferencing Vulnerability Remote Monitoring Shadow IT Samsung Laptop VPN Work/Life Balance Employer Employee Relationship Best Practice Keyboard Remote Computing Computer Accessories Mobile Device Webinar Experience WiFi Loyalty Transportation Bluetooth Video Games IT solutions Music SaaS Battery Thank You PDF Benefits Scalability Education Congratulations Information Technology Content Firewall Password Worker Workplace Tips Assessment Computing Infrastructure Wearable Technology Audiobook Smart Technology Techology Rootkit Instant Messaging Television Applications USB Entertainment Two Factor Authentication Training CrashOverride Public Computer Users Troubleshooting Wireless Holiday Data Management IT Support Vendor Management Virtual Reality Big Data Electronic Medical Records Charger Worker Commute Books Save Time Mobility Risk Management Search Emergency Legal Politics How to