ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

A Few Security Lessons Your Business Can Learn From Game of Thrones

A Few Security Lessons Your Business Can Learn From Game of Thrones

Security is a major concern for anything successful, and television programming is no different. Game of Thrones, the BBC’s epic production based on George R.R. Martin's book series A Song of Ice and Fire, has always been concerned with their security--and with the television series overtaking the book series, that concern has only grown as the production has brand new secrets to keep safe. As a result, the production has seen a steady increase in security.

Last season, scripts were handed out much more sparingly, and code words were assigned to characters and scenes. The network has also stopped the tradition of distributing advance copies of the program to members of the press, which is normally done so that reviews may be written.

With the action in the show finally overtaking the action in the books this season, the concern for the show’s security has leapt to new heights.

This year, two-factor authentication had to be set up on every cast member’s email account, where they would receive their copy of the script. According to Nathalie Emmanuel, who plays the role of Missandei on the show, these copies were not to be printed out. Even the notes that the cast members received during rehearsal were not to leave the set, and had to be turned in before the actors could leave.

This dedication to secrecy only makes sense. Game of Thrones is a bona fide cultural phenomenon, and more importantly has generated an astonishing amount of revenue. This is mainly because subscribers to HBO’s content repeatedly tune in every week to find out who is next on the chopping block--the show’s version of critical data. If that data was to get out ahead of schedule, subscribers would have less of an incentive to subscribe and would quickly transfer their focus (and capital) elsewhere.

Your business’ data needs to be secured for similar reasons--just substitute ‘subscribers’ for ‘clients’ in the situation above, and you see the importance of keeping your data secured.

Taking a page from Game of Thrones’ production can help you here. Two-factor authentication is a method of ensuring data security by requiring a secondary form of authentication to access an account, for example, a unique code sent to a mobile device. If the password were to somehow be guessed by some other party, they wouldn’t be able to access the account without the secondary code. There are many businesses that are already using this method, both as a means of compliance with various regulations and to reinforce their security.

So, tell us: are you looking forward to the rest of this season of Game of Thrones? Tell us in the comments, but please don’t spoil anything!



No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Backup Google Microsoft Privacy Business Computing Hackers Innovation Hardware Malware Data Cybercrime Efficiency Small Business Internet Software Mobile Devices Managed IT Services Business Productivity Smartphones Email Computer Windows Business Continuity Law Enforcement Server Automation How To Chrome Computers Safety Android Spam Data Breach Mobile Device Management Social Media Ransomware Gadgets Business Management User Tips App Cybersecurity Downtime Data Storage Social Engineering Windows 10 Windows 10 Quick Tips Alert Collaboration Browser Saving Money Network Internet Exlporer Unsupported Software Data storage Physical Security Disaster Recovery Phishing Spam Blocking Private Cloud Save Money Network Security Google Drive Bring Your Own Device Public Cloud Operating System Miscellaneous The Internet of Things Office 365 Upgrade VoIP Hosted Solutions Bandwidth Smartphone Computer Fan Skype Router Wireless Technology Government Cleaning Cast BDR Netflix Frequently Asked Questions User Error Sports FENG Start Menu Cloud Computing Tech Support HaaS Current Events IT Services IT Support Excel Robot Recovery Tools Reputation Apple Laptop Shadow IT IT Management Knowledge Outsourced IT Tip of the week End of Support OneNote Word Customer Chromecast iPhone Touchpad IT Plan Flexibility Network Congestion Managed IT Services Settings Windows Server 2008 Internet exploMicrosoft Managed IT Marketing Hacking Managed Service Provider Productivity IT Consultant Windows 7 Advertising DDoS Automobile Root Cause Analysis Botnet Software Tips Flash Outlook Passwords Travel Health Gmail BYOD webinar Wi-Fi Windows 10s Redundancy Humor YouTube Meetings Facebook Networking Hiring/Firing Data Security Conferencing Vulnerability Sync Hybrid Cloud Samsung Virtualization Data Backup IBM Patch Management Files HBO Emails Solid State Drive Communication Value Monitor Going Green Uninterrupted Power Supply Data loss Supercomputer Office History Black Market Telephone Systems Audit Telephony NarrowBand Office Tips Screen Mirroring Budget Relocation Money Internet of Things Computing Infrastructure SaaS Benefits Audiobook Techology Instant Messaging Applications Firewall Entertainment Worker Users Wireless Assessment Wearable Technology Smart Technology Holiday IT Support Rootkit VPN Virtual Reality Television USB Two Factor Authentication Training Remote Computing Worker Commute CrashOverride Public Computer Troubleshooting Risk Management Mobility Search Vendor Management Artificial Intelligence Big Data Electronic Medical Records Politics Thank You Legal How to Charger Work/Life Balance Books Save Time Keyboard Congratulations Best Practice Computer Care Microsoft Office Avoiding Downtime Emergency Experience Mobile Device Apps Data Recovery Communications Employer Employee Relationship Music Video Games Battery PDF Scam Computer Accessories Scalability Webinar Data Management Education Information Technology Loyalty Content Password Transportation Bluetooth Workplace Tips IT solutions