What is Post Production?

Post-Production is part of the filmmaking, video production and photography, it occurs in the process predominantly after the filming but can be done in the process of while filming, it normally occurs onsite for photo-shoots as they colour correct to make certain aspects of the object or person to pop out and to make sure that only the object/person is where your eyes land first.

Post production in no particular order consists of:
1. Colour Correction
2. Sound Balancing
3. Titles
4. Effects
5. Diegetic sound

In post-production, cyber attacks can take place in several areas such as:


1. Digital Asset Management: Digital assets such as raw footage, special effects files, and audio recordings are often stored in digital asset management systems, which can be vulnerable to cyber attacks such as hacking and data theft.
2. Computer Workstations: The computers used in post-production, such as editing systems and visual effects workstations, can be targeted by cyber criminals for malware infections, which can compromise the data stored on the systems and potentially spread to other systems on the network.
3. Network and Server Infrastructure: The network and server infrastructure used in post- production, such as storage systems and file servers, can be targeted by cyber criminals for attacks such as denial of service (DoS) and data theft.
4.Cloud-Based Services: Cloud-based services, such as those used for remote collaboration and storage, can be vulnerable to cyber attacks, including data theft, hacking, and ransomware attacks.
5. Third-Party Vendors: Post-production companies often rely on third-party vendors, such as special effects companies and sound studios, to provide specialized services. These vendors may not have the same level of security as larger organizations, making them a weak link in the post-production supply chain and vulnerable to cyber attacks. It's important for post-production companies to be aware of these areas of vulnerability and to take steps to protect themselves and their data, such as implementing strong security protocols, regularly updating software, and conducting regular security audits.