Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Few Security Lessons Your Business Can Learn From Game of Thrones

A Few Security Lessons Your Business Can Learn From Game of Thrones

Security is a major concern for anything successful, and television programming is no different. Game of Thrones, the BBC’s epic production based on George R.R. Martin's book series A Song of Ice and Fire, has always been concerned with their security--and with the television series overtaking the book series, that concern has only grown as the production has brand new secrets to keep safe. As a result, the production has seen a steady increase in security.

Last season, scripts were handed out much more sparingly, and code words were assigned to characters and scenes. The network has also stopped the tradition of distributing advance copies of the program to members of the press, which is normally done so that reviews may be written.

With the action in the show finally overtaking the action in the books this season, the concern for the show’s security has leapt to new heights.

This year, two-factor authentication had to be set up on every cast member’s email account, where they would receive their copy of the script. According to Nathalie Emmanuel, who plays the role of Missandei on the show, these copies were not to be printed out. Even the notes that the cast members received during rehearsal were not to leave the set, and had to be turned in before the actors could leave.

This dedication to secrecy only makes sense. Game of Thrones is a bona fide cultural phenomenon, and more importantly has generated an astonishing amount of revenue. This is mainly because subscribers to HBO’s content repeatedly tune in every week to find out who is next on the chopping block--the show’s version of critical data. If that data was to get out ahead of schedule, subscribers would have less of an incentive to subscribe and would quickly transfer their focus (and capital) elsewhere.

Your business’ data needs to be secured for similar reasons--just substitute ‘subscribers’ for ‘clients’ in the situation above, and you see the importance of keeping your data secured.

Taking a page from Game of Thrones’ production can help you here. Two-factor authentication is a method of ensuring data security by requiring a secondary form of authentication to access an account, for example, a unique code sent to a mobile device. If the password were to somehow be guessed by some other party, they wouldn’t be able to access the account without the secondary code. There are many businesses that are already using this method, both as a means of compliance with various regulations and to reinforce their security.

So, tell us: are you looking forward to the rest of this season of Game of Thrones? Tell us in the comments, but please don’t spoil anything!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity IT Support Smartphones Communication Miscellaneous Smartphone Mobile Device Network Browser Small Business Collaboration Productivity Cybersecurity Quick Tips Business Management Users Phishing Upgrade Windows Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Cloud Computing Server Save Money Data Recovery Passwords Windows 10 Saving Money Holiday Chrome Virtualization Gadgets Tech Term Social Media Microsoft Office Managed IT Services Managed Service Automation Artificial Intelligence Cybercrime Operating System Computers Facebook BYOD Wi-Fi Mobile Device Management Health Networking IT Support Hacking Internet of Things Remote Managed Service Provider Spam Office 365 Covid-19 Information Telephone Systems Information Technology Alert Recovery Employer-Employee Relationship Bandwidth Social Engineering Mobility Router BDR Application Password Money Human Resources Encryption Applications Big Data Remote Monitoring Data Breach Law Enforcement App History Mobile Computing Apps Data Storage Patch Management Remote Computing Mobile Office Blockchain Paperless Office Government Office Tips Private Cloud Training How To Managed IT VPN Bring Your Own Device Settings Data Management Work/Life Balance Two-factor Authentication Vulnerability Windows 7 Word Mouse HaaS Google Drive Servers Avoiding Downtime Flexibility Data Security Marketing Wireless WiFi Infrastructure IT solutions Voice over Internet Protocol Entertainment Website Gmail Budget USB Cleaning Firewall Data Protection Virtual Reality Conferencing Apple End of Support Education Physical Security Scam Social Safety Sports User Error HIPAA Redundancy Meetings Vendor Vendor Management Keyboard Managed Services Telephone System Staff Software as a Service Display Machine Learning Risk Management Connectivity Remote Work Hacker Employee/Employer Relationship RMM The Internet of Things Save Time Lithium-ion battery Customer Service Fraud Environment Remote Worker Digital Signage Computing Infrastructure Hiring/Firing Going Green IT Consultant Fax Server Cryptocurrency SaaS Humor Procurement Battery Shadow IT Workplace Strategy Comparison Net Neutrality Legal Business Intelligence Network Congestion CES Help Desk Internet Exlporer Worker eWaste Printing Audit IT Management Business Technology Content Management Access Control Botnet PDF Managed Services Provider IT Plan Virtual Assistant Proactive IT Wearable Technology Authentication Database Unsupported Software Hard Drives Retail Remote Workers Virus Instant Messaging Best Practice YouTube Charger Robot Excel Processor Unified Threat Management Black Market Computer Accessories Biometrics Update Compliance Computer Care Virtual Desktop OneNote Hard Drive Current Events Document Management Telephony Google Docs Wireless Technology Samsung DDoS Identity Theft Solid State Drive How to Downtime SharePoint Computing Printer Value Bluetooth Data storage Augmented Reality Automobile Spam Blocking Electronic Medical Records Loyalty Search Engine Twitter Messaging Cabling Screen Mirroring NIST Policy Business Mangement Hypervisor Frequently Asked Questions Monitor Books Dark mode Antivirus Smart Tech Trend Micro Mobile Trending Windows 10s Amazon Default App Cast Windows 8 Addiction SMS Procedure IT service Recycling Saving Time Tip of the week Reputation webinar Streaming Media Emergency Tech Support Employer Employee Relationship Wiring dark theme Practices Shopping Content Professional Services Google Search Public Cloud Amazon Web Services IT Infrastructure Techology Tablet Laptop Assessment Cache AI Safe Mode FinTech Domains Criminal Windows Server 2008 Bing Customers GDPR Hosted Computing Social Network Audiobook Tools Online Shopping Investment Touchpad Television IaaS Wireless Internet Maintenance File Sharing Employees Consultant Employee/Employer Relationships Bloatware Camera Windows 365 Inventory Politics Analytics Specifications ISP Advertising Evernote ROI Tablets Public Computer Wire Video Conferencing Sales Best Available Bitcoin Regulations Entrepreneur Travel Shortcuts Notifications Transportation Rootkit Printers Point of Sale WIndows 7 Personal Millennials Cryptomining Computer Fan Wireless Charging Smart Office Supply Chain Management Shortcut Monitoring Batteries Cost Management Relocation Workers Benefits Virtual Private Network Windows 8.1 Digitize Social Networking Workforce FENG Cables Windows Server 2008 R2 Video Games IBM Customer relationships Worker Commute Flash Smart Technology Project Management Email Best Practices User Running Cable Nanotechnology IT Assessment Experience PowerPoint Telecommuting Manufacturing Windows Media Player Cortana Scalability Software Tips Memory Supercomputer Computer Tips Digital Signature Managed IT Service Business Owner Sync Security Cameras Emails NarrowBand Warranty Virtual CIO Managing Stress OneDrive Biometric Security Google Apps Search HVAC Peripheral Digital Security Cameras Analysis Using Data Cameras iPhone Netflix Two Factor Authentication Science Administrator Devices Copiers 5G Root Cause Analysis HBO Knowledge Music Enterprise Content Management Quick Tip MSP Ergonomics Accountants Skype Smartwatch Files Chromecast Microchip Distributed Denial of Service Thought Leadership Development Customer Relationship Management Credit Cards OLED Data loss Password Manager Virtual Machine Outlook Analyitcs Leadership Troubleshooting Password Management PCI DSS 2FA Fiber Optics Start Menu Printer Server Programming Multi-Factor Security Employee Colocation Uninterrupted Power Supply

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code