(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Few Security Lessons Your Business Can Learn From Game of Thrones

Security is a major concern for anything successful, and television programming is no different. Game of Thrones, the BBC’s epic production based on George R.R. Martin's book series A Song of Ice and Fire, has always been concerned with their security--and with the television series overtaking the book series, that concern has only grown as the production has brand new secrets to keep safe. As a result, the production has seen a steady increase in security.

Last season, scripts were handed out much more sparingly, and code words were assigned to characters and scenes. The network has also stopped the tradition of distributing advance copies of the program to members of the press, which is normally done so that reviews may be written.

With the action in the show finally overtaking the action in the books this season, the concern for the show’s security has leapt to new heights.

This year, two-factor authentication had to be set up on every cast member’s email account, where they would receive their copy of the script. According to Nathalie Emmanuel, who plays the role of Missandei on the show, these copies were not to be printed out. Even the notes that the cast members received during rehearsal were not to leave the set, and had to be turned in before the actors could leave.

This dedication to secrecy only makes sense. Game of Thrones is a bona fide cultural phenomenon, and more importantly has generated an astonishing amount of revenue. This is mainly because subscribers to HBO’s content repeatedly tune in every week to find out who is next on the chopping block--the show’s version of critical data. If that data was to get out ahead of schedule, subscribers would have less of an incentive to subscribe and would quickly transfer their focus (and capital) elsewhere.

Your business’ data needs to be secured for similar reasons--just substitute ‘subscribers’ for ‘clients’ in the situation above, and you see the importance of keeping your data secured.

Taking a page from Game of Thrones’ production can help you here. Two-factor authentication is a method of ensuring data security by requiring a secondary form of authentication to access an account, for example, a unique code sent to a mobile device. If the password were to somehow be guessed by some other party, they wouldn’t be able to access the account without the secondary code. There are many businesses that are already using this method, both as a means of compliance with various regulations and to reinforce their security.

So, tell us: are you looking forward to the rest of this season of Game of Thrones? Tell us in the comments, but please don’t spoil anything!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 19 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Privacy Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Efficiency Mobile Devices IT Support Business VoIP Managed Service Provider Miscellaneous IT Services Server Workplace Tips Business Continuity Upgrade Disaster Recovery Network Innovation Data Hardware Email Software Save Money Saving Money Business Management Communication Computer Windows Mobile Device Management User Tips Microsoft Office Network Security Virtualization Browser Smartphones Holiday Android Windows 10 WiFi Smartphone Managed IT Services Hacking BYOD Social Media Operating System Mobile Computing communications IT Solutions Cybercrime Chrome Small Business Application Apple Outsourced IT Proactive IT Remote Monitoring Avoiding Downtime Computers The Internet of Things Big Data Alert Ransomware Quick Tips Data Backup Automation Information Technology Passwords Office Marketing Budget Collaboration Health Mobility VPN Bring Your Own Device Managed IT Services Recovery spam Social Engineering Employer-Employee Relationship Going Green Remote Computing User Error Vendor Management iPhone Gadgets Save Time Cybersecurity Firewall App Telephone Systems Managed IT Wireless Technology IT Support Office 365 PowerPoint Website Excel Phone System Antivirus Office Tips Content Filtering Downtime History Tablet Analytics Router Gmail Lithium-ion battery Memory Retail Search Private Cloud Bandwidth Compliance Mouse Networking Redundancy Black Market Law Enforcement Data Management Solid State Drive Humor Two-factor Authentication Saving Time Statistics Internet of Things Document Management Data Storage Internet Exlporer Risk Management Online Currency Word Data storage Biometrics Windows 10 Business Owner Outlook Printer Money Flexibility Hard Drives Current Events Facebook Administration Data Recovery Maintenance Entertainment Running Cable Value Physical Security DDoS Unsupported Software BDR Unified Threat Management Robot Skype Public Cloud Mobile Office Environment Google Drive Customer Relationship Management Intranet Phishing SaaS How To Vulnerability Best Available Data Security Artificial Intelligence People Safety Programming Government Network Congestion Trending Meetings HaaS IT Consultant Cloud Computing Fax Server Apps Hacker Professional Services Worker Commute Cost Management Piracy Computer Fan Lifestyle Cast Tip of the week Shadow IT Applications Science Tools User Wireless Files Streaming Media Instant Messaging Company Culture Licensing FENG Data Protection Productivity Windows 8.1 Update Samsung Windows Server 2008 Wi-Fi Shortcut Twitter Windows 8 Workers SharePoint Colocation Encryption Business Intelligence Crowdfunding Windows 7 Sports Bluetooth Tablets Botnet Monitor Hosted Solution eWaste Computing Infrastructure Notifications OneNote Data Warehousing Regulations YouTube USB Travel Print Server Reputation Wearable Technology End of Support Windows Media Player Social IT Management Servers NarrowBand Work/Life Balance Customers Internet exploMicrosoft IT Plan Best Practice Social Networking Net Neutrality Hiring/Firing Root Cause Analysis Computer Repair Flash Chromecast WIndows 7 Analyitcs Software as a Service Patch Management Advertising Data loss Sync Laptop Managing Stress Settings Distributed Denial of Service Update Scam Software Tips Virus Virtual Desktop Touchscreen LinkedIn Human Resources Telephony Touchpad IT service Hybrid Cloud Virtual Reality Debate Google Docs Relocation Computer Care Uninterrupted Power Supply Computer Accessories Training Start Menu HIPAA Domains IaaS Bloatware Spam Blocking Voice over Internet Protocol Audit Video Surveillance HBO Cleaning Cameras Customer Service Mobile Consultant Entrepreneur Education Multi-Factor Security Screen Mirroring Frequently Asked Questions Tech Support Printer Server Experience Two Factor Authentication Assessment Music Password Television Troubleshooting Techology Comparison Electronic Medical Records Public Computer Legal Specifications Employer Employee Relationship Data Breach Automobile Emails Books Mobile Device CrashOverride IBM Webinar Emergency Users Worker Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix Charger Scalability Politics Transportation How to webinar PDF Benefits Loyalty Conferencing Keyboard Windows 10s Smart Technology Battery