(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Few Security Lessons Your Business Can Learn From Game of Thrones

Security is a major concern for anything successful, and television programming is no different. Game of Thrones, the BBC’s epic production based on George R.R. Martin's book series A Song of Ice and Fire, has always been concerned with their security--and with the television series overtaking the book series, that concern has only grown as the production has brand new secrets to keep safe. As a result, the production has seen a steady increase in security.

Last season, scripts were handed out much more sparingly, and code words were assigned to characters and scenes. The network has also stopped the tradition of distributing advance copies of the program to members of the press, which is normally done so that reviews may be written.

With the action in the show finally overtaking the action in the books this season, the concern for the show’s security has leapt to new heights.

This year, two-factor authentication had to be set up on every cast member’s email account, where they would receive their copy of the script. According to Nathalie Emmanuel, who plays the role of Missandei on the show, these copies were not to be printed out. Even the notes that the cast members received during rehearsal were not to leave the set, and had to be turned in before the actors could leave.

This dedication to secrecy only makes sense. Game of Thrones is a bona fide cultural phenomenon, and more importantly has generated an astonishing amount of revenue. This is mainly because subscribers to HBO’s content repeatedly tune in every week to find out who is next on the chopping block--the show’s version of critical data. If that data was to get out ahead of schedule, subscribers would have less of an incentive to subscribe and would quickly transfer their focus (and capital) elsewhere.

Your business’ data needs to be secured for similar reasons--just substitute ‘subscribers’ for ‘clients’ in the situation above, and you see the importance of keeping your data secured.

Taking a page from Game of Thrones’ production can help you here. Two-factor authentication is a method of ensuring data security by requiring a secondary form of authentication to access an account, for example, a unique code sent to a mobile device. If the password were to somehow be guessed by some other party, they wouldn’t be able to access the account without the secondary code. There are many businesses that are already using this method, both as a means of compliance with various regulations and to reinforce their security.

So, tell us: are you looking forward to the rest of this season of Game of Thrones? Tell us in the comments, but please don’t spoil anything!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 September 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Productivity Business Computing Microsoft Backup Malware Hosted Solutions Internet Efficiency Mobile Devices IT Support Google Business Managed Service Provider Miscellaneous IT Services Server Workplace Tips VoIP Innovation Data Disaster Recovery Business Continuity Network Upgrade Hardware Email Windows Save Money Saving Money Business Management Computer Software Mobile Device Management Communication Virtualization User Tips Microsoft Office Network Security Windows 10 Browser Smartphone Smartphones Holiday Hacking Android BYOD Social Media WiFi Mobile Computing Computers communications IT Solutions Cybercrime Managed IT Services Chrome Application Apple Operating System Office Marketing Budget The Internet of Things Big Data Quick Tips Small Business Automation Proactive IT Information Technology Outsourced IT Going Green Remote Computing Collaboration Health VPN Alert Managed IT Services spam Employer-Employee Relationship Remote Monitoring Avoiding Downtime Passwords Wireless Technology Mobility User Error Bring Your Own Device Managed IT Vendor Management Ransomware Recovery iPhone Gadgets Save Time Social Engineering Firewall App Networking Mouse Office 365 IT Support PowerPoint Excel Phone System Antivirus Downtime Telephone Systems History Data Backup Tablet Gmail Lithium-ion battery Analytics Retail Memory Search Private Cloud Bandwidth Compliance People Safety Public Cloud Programming Network Congestion Meetings Redundancy HaaS How To IT Consultant Fax Server Black Market Data Management Humor Saving Time Statistics Internet of Things Document Management Risk Management Cloud Computing Internet Exlporer Law Enforcement Online Currency Data storage Solid State Drive Biometrics Outlook Website Printer Data Storage Content Filtering Flexibility Office Tips Hard Drives Windows 10 Current Events Facebook Administration Business Owner Maintenance Entertainment Running Cable Router Physical Security DDoS Value Skype Cybersecurity BDR Unified Threat Management Robot Google Drive Mobile Office Environment Customer Relationship Management Intranet Best Available Unsupported Software Domains Sync Government IaaS Bloatware Video Surveillance Software Tips Cleaning Cameras Customer Service Consultant Trending Phishing Telephony Vulnerability Hybrid Cloud Entrepreneur Education Apps Data Security Tech Support Printer Server Hacker Start Menu HIPAA Audit Worker Commute Cost Management Piracy Spam Blocking HBO Shadow IT Two-factor Authentication User Wireless Science Mobile Screen Mirroring Streaming Media Instant Messaging Company Culture Licensing Windows 8.1 Update Samsung Frequently Asked Questions Shortcut SharePoint Twitter Windows 8 Professional Services Cast Encryption Computer Fan Bluetooth Crowdfunding Tip of the week Sports Applications eWaste Files Tablets Tools Monitor FENG Notifications USB Money Windows Server 2008 YouTube Reputation Wearable Technology Colocation Workers Word Print Server Business Intelligence Windows Media Player Social Windows 7 NarrowBand Customers Hosted Solution Computing Infrastructure Botnet Hiring/Firing OneNote Computer Repair Data Warehousing Best Practice Social Networking Net Neutrality WIndows 7 Regulations Chromecast End of Support Analyitcs Travel IT Management Managing Stress Settings Servers Laptop Distributed Denial of Service Internet exploMicrosoft Touchscreen Root Cause Analysis LinkedIn IT Plan Virus Virtual Desktop IT service Human Resources Flash Touchpad Relocation Patch Management SaaS Advertising Virtual Reality Debate Artificial Intelligence Data loss Uninterrupted Power Supply Computer Accessories Training Knowledge Audiobook Scam Netflix Charger Scalability Politics Transportation Computer Care How to webinar Benefits PDF Loyalty Conferencing Keyboard Smart Technology Windows 10s Battery Experience Two Factor Authentication Assessment Music Productivity Password Television Wi-Fi Troubleshooting Electronic Medical Records Techology Public Computer Employer Employee Relationship Users Legal Data Breach Automobile Books Emails CrashOverride Mobile Device IBM Work/Life Balance Emergency Webinar Data Recovery Worker Supercomputer Content IT solutions Rootkit Video Games