(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Few Security Lessons Your Business Can Learn From Game of Thrones

A Few Security Lessons Your Business Can Learn From Game of Thrones

Security is a major concern for anything successful, and television programming is no different. Game of Thrones, the BBC’s epic production based on George R.R. Martin's book series A Song of Ice and Fire, has always been concerned with their security--and with the television series overtaking the book series, that concern has only grown as the production has brand new secrets to keep safe. As a result, the production has seen a steady increase in security.

Last season, scripts were handed out much more sparingly, and code words were assigned to characters and scenes. The network has also stopped the tradition of distributing advance copies of the program to members of the press, which is normally done so that reviews may be written.

With the action in the show finally overtaking the action in the books this season, the concern for the show’s security has leapt to new heights.

This year, two-factor authentication had to be set up on every cast member’s email account, where they would receive their copy of the script. According to Nathalie Emmanuel, who plays the role of Missandei on the show, these copies were not to be printed out. Even the notes that the cast members received during rehearsal were not to leave the set, and had to be turned in before the actors could leave.

This dedication to secrecy only makes sense. Game of Thrones is a bona fide cultural phenomenon, and more importantly has generated an astonishing amount of revenue. This is mainly because subscribers to HBO’s content repeatedly tune in every week to find out who is next on the chopping block--the show’s version of critical data. If that data was to get out ahead of schedule, subscribers would have less of an incentive to subscribe and would quickly transfer their focus (and capital) elsewhere.

Your business’ data needs to be secured for similar reasons--just substitute ‘subscribers’ for ‘clients’ in the situation above, and you see the importance of keeping your data secured.

Taking a page from Game of Thrones’ production can help you here. Two-factor authentication is a method of ensuring data security by requiring a secondary form of authentication to access an account, for example, a unique code sent to a mobile device. If the password were to somehow be guessed by some other party, they wouldn’t be able to access the account without the secondary code. There are many businesses that are already using this method, both as a means of compliance with various regulations and to reinforce their security.

So, tell us: are you looking forward to the rest of this season of Game of Thrones? Tell us in the comments, but please don’t spoil anything!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 21 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Hackers Business Computing Microsoft Productivity Backup Malware Hosted Solutions Internet Mobile Devices Google Efficiency IT Support VoIP Business Miscellaneous IT Services Managed Service Provider Email Server Workplace Tips Disaster Recovery Business Continuity Data Windows Upgrade Innovation Network Software Hardware Business Management Save Money Saving Money Network Security Communication Computer Smartphones Android Mobile Device Management communications Managed IT Services Holiday User Tips Microsoft Office Smartphone Browser Virtualization Windows 10 Outsourced IT WiFi Computers Operating System Mobile Computing Hacking Chrome Data Backup BYOD Small Business Social Media Cybercrime IT Solutions Application Alert Apple Proactive IT Remote Monitoring Avoiding Downtime Budget Collaboration Passwords Marketing Managed IT Services Big Data The Internet of Things Ransomware Social Engineering Quick Tips Automation Employer-Employee Relationship Information Technology Office Health Mobility Bring Your Own Device VPN Going Green Remote Computing Recovery spam Data Recovery Telephone Systems Gadgets Managed IT Wireless Technology Cloud Computing User Error Two-factor Authentication Vendor Management Save Time Cybersecurity Firewall App iPhone BDR Bandwidth Compliance How To Redundancy Artificial Intelligence IT Support Office 365 Internet of Things PowerPoint Windows 10 Website Excel Phone System Risk Management Office Tips Content Filtering Money Downtime History Antivirus Tablet Gmail Lithium-ion battery Value Retail Memory Search Private Cloud Analytics Router Vulnerability Networking Mouse Intranet Network Congestion Credit Cards Trending Meetings HaaS Fax Server Black Market Law Enforcement Data Management Solid State Drive Humor Statistics Data Storage Internet Exlporer Apps IT Consultant Workers Word Data storage Biometrics Business Intelligence Business Owner Outlook Saving Time Document Management OneNote Flexibility Online Currency Hard Drives IT Management Work/Life Balance Facebook Administration Printer Entertainment Running Cable Physical Security DDoS Current Events Unified Threat Management Robot Skype Unsupported Software Mobile Office Environment Maintenance Google Drive Public Cloud Customer Relationship Management Phishing SaaS Identity Theft Best Available Data Security People Safety Programming Government Cleaning Touchscreen Cameras Customer Service Video Surveillance HBO Mobile Keyboard Consultant Cortana Entrepreneur Education Multi-Factor Security Screen Mirroring Tech Support Printer Server Fraud Frequently Asked Questions Professional Services Hacker Google Apps Worker Commute Cost Management Piracy Computer Fan Lifestyle Cast Shadow IT Applications Amazon Tip of the week Tools User Wireless Files Science Infrastructure Instant Messaging Licensing FENG Data Protection Productivity Streaming Media Password Wi-Fi Shortcut Amazon Web Services Samsung Windows Server 2008 SharePoint Colocation Twitter Windows 8 Password Manager Comparison Encryption Sports Bluetooth Online Shopping Crowdfunding Windows 7 Botnet Monitor Hosted Solution eWaste Computing Infrastructure Tablets Company Culture Specifications Data Warehousing Notifications YouTube Windows 8.1 Update USB Evernote Regulations Travel Reputation Wearable Technology End of Support Windows Media Player Social Millennials Mobile Device Servers NarrowBand Wireless Charging Customers Internet exploMicrosoft Social Networking Hiring/Firing Root Cause Analysis Workforce IT Plan Best Practice Flash Chromecast WIndows 7 Fiber-Optic Print Server Software as a Service Patch Management Advertising Analyitcs Data loss Telecommuting Sync Laptop Managing Stress Settings Cables Update Scam Distributed Denial of Service Net Neutrality Virus Virtual Desktop Computer Repair Remote Work LinkedIn Charger Software Tips Telephony Touchpad IT service Human Resources Unified Communications Virtual Reality Debate Google Docs Relocation Hybrid Cloud Uninterrupted Power Supply Computer Accessories Training Computer Care Start Menu HIPAA Domains Theft Bloatware Spam Blocking Voice over Internet Protocol Audit IaaS Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Electronic Medical Records Techology Public Computer Business Mangement Employer Employee Relationship Legal Automobile Data Breach Recycling Emails Books CrashOverride IBM Webinar Emergency Worker Supercomputer Content IT solutions Video Games Rootkit Knowledge Audiobook Netflix Scalability Users Politics Transportation How to webinar Benefits PDF