gaming

What You Need to Know About GameStop’s Data Breach

GameStop's Data Breach

Just in case you missed it, GameStop quietly announced a major data breach of sensitive customer information which occurred for a six-month period. We say “quietly” announced because they sent out snail mail letters to anyone that might be a potential victim.

Snail mail, in 2017, to discuss a major data breach online. Well, that’s one way to do it, we suppose.

What Happened?

Back in April, GameStop made it clear they were looking into a “potential” data breach that might have exposed customer credit card numbers and related information.

If you made a purchase with GameStop, particularly through their website, anytime between August 10, 2016, and February 9, 2017, your credit card data may be at risk. Eagle-eyed readers will notice that’s a remarkably long period of time, and probably includes a massive number of customers. Sadly, the company has yet to announce any concrete numbers, so it’s hard to say how many are actually at risk.

What was compromised?

Oh, just some names, addresses, credit card numbers and even three-digit security codes — you know, the ones that prevent unauthorized purchases from your credit and debit cards?

Way to go, guys and gals, that’s quite the egregious error on your part. Hopefully, most of the customers who made purchases during that timeframe are safe.

Of course, this is nothing new. Honestly, it’s par for the course with big corporations and organizations like GameStop, as data breaches have become an incredibly common occurrence. Data breaches such as this one cost an average of $4 million for the companies involved.

Worse yet, there has been a 29 percent increase in data breaches from 2013 to 2016, as IBM pointed out.

How to Protect Yourself If You’re a GameStop Customer

GameStop did outline some precautions you can take to protect your sensitive data and identity in the letters they sent out to customers, but that doesn’t really help anyone not receiving said letter — for example, anyone who’s been through an address or name change since the time of the breach.

Chances are, there are a few people who will never see those letters, which means they might not be aware of the breach, or how to protect themselves. No worries, that’s where we come in.

Here are some steps you can take to boost your personal security:

  • Cancel any cards you used to make purchases at GameStop and request a replacement.
  • Accept or enroll in free — or premium — identity protection services.
  • Call your bank or financial institution, inform them of the potential breach and ask for help keeping an eye on your account.
  • File a 90-day fraud alert with the credit bureau of your choice.
  • Request a security freeze for any and all affected accounts.
  • Change your account passwords associated with your GameStop profile.
  • If applicable, turn on two-factor authentication for your accounts, especially your credit profile or mobile apps.
  • Review every statement carefully to ensure there are no fraudulent or unexpected charges.
  • Sign up for security and activity alerts. Most banks will notify you when a major account change or purchase goes through on your account.

It’s also a good idea to get out of the habit of storing your credit card information via online services and accounts. That won’t necessarily prevent a breach, as hackers can still gain access even with old transactions in some cases.

That said, keeping your credit card information close to your chest is safer, even if it is a hassle to re-enter that information every time you want to make a purchase. Better safe than sorry, especially when it comes to your finances and identity theft!

By Kayla Matthews

Kayla Matthews

Kayla Matthews is a technology writer dedicated to exploring issues related to the Cloud, Cybersecurity, IoT and the use of tech in daily life.

Her work can be seen on such sites as The Huffington Post, MakeUseOf, and VMBlog. You can read more from Kayla on her personal website, Productivity Bytes.

View Website

CONTRIBUTORS

As Enterprises Execute Their Digital Strategies, New Multi-cloud Landscape Emerge

As Enterprises Execute Their Digital Strategies, New Multi-cloud Landscape Emerge

The Multi-cloud Landscape The digital universe is expanding rapidly, and cloud computing is building the foundation for almost infinite use ...
10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

Prevent Data Leaks In The Cloud More companies are turning to the cloud for storage. In fact, over 60 percent ...
Cyber Security Tips For Digital Collaboration

Cyber Security Tips For Digital Collaboration

Cyber Security Tips October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security ...
Scale Matters in the Enterprise Cloud

Scale Matters in the Enterprise Cloud

The Enterprise Cloud What used to be an unknown and mysterious term, “the cloud” is now a common and mostly ...
How Big Data Can Empower Native Ads

How Big Data Can Empower Native Ads

Empower Native Ads The realm of big data is expanding an astonishing rate, and its presence can be felt across ...
What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) ...
Principles of an Effective Cybersecurity Strategy

Principles of an Effective Cybersecurity Strategy

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as ...
Bryan Doerr

Cyber-Threats and the Need for Secure Industrial Control Systems

Secure Industrial Control Systems (ICS) Industrial Control Systems (ICS) tend to be “out of sight, out of mind.” These systems ...
What Futuristic Transportation Will Look Like In Your Lifetime

What Futuristic Transportation Will Look Like In Your Lifetime

Futuristic Transportation Being stuck in traffic or late for work because of a hold up on the dreaded commute could ...
3 Ways to Protect Users From Ransomware With the Cloud

3 Ways to Protect Users From Ransomware With the Cloud

Protect Users From Ransomware The threat of ransomware came into sharp focus over the course of 2016. Cybersecurity trackers have ...

NEWS

U.S. IT Sector Employment Expands by 8,100 Jobs in November, CompTIA Analysis Reveals

U.S. IT Sector Employment Expands by 8,100 Jobs in November, CompTIA Analysis Reveals

DOWNERS GROVE, Ill., Dec. 8, 2017 /PRNewswire-USNewswire/ -- New hiring in computer and electronics manufacturing and technology services and custom ...
Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

NEW YORK, Dec. 12, 2017 /PRNewswire/ -- Deloitte forecasts double digital growth in machine learning deployments for the enterprise, an increasing worldwide ...
Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system (Reuters) - Hackers likely working for a nation-state recently penetrated the safety system of ...