CLOUDTWEAKS CONTRIBUTOR PROGRAM

Join the CloudTweaks thought leadership contributor program which includes a customized profile, branded identity page, newsletter marketing, social amplification and more...

The program is currently available to consultants, influencers or executive level contributors.

gaming

What You Need to Know About GameStop’s Data Breach

GameStop’s Data Breach

Just in case you missed it, GameStop quietly announced a major data breach of sensitive customer information which occurred for a six-month period. We say “quietly” announced because they sent out snail mail letters to anyone that might be a potential victim.

Snail mail, in 2017, to discuss a major data breach online. Well, that’s one way to do it, we suppose.

What Happened?

Back in April, GameStop made it clear they were looking into a “potential” data breach that might have exposed customer credit card numbers and related information.

If you made a purchase with GameStop, particularly through their website, anytime between August 10, 2016, and February 9, 2017, your credit card data may be at risk. Eagle-eyed readers will notice that’s a remarkably long period of time, and probably includes a massive number of customers. Sadly, the company has yet to announce any concrete numbers, so it’s hard to say how many are actually at risk.

What was compromised?

Oh, just some names, addresses, credit card numbers and even three-digit security codes — you know, the ones that prevent unauthorized purchases from your credit and debit cards?

Way to go, guys and gals, that’s quite the egregious error on your part. Hopefully, most of the customers who made purchases during that timeframe are safe.

Of course, this is nothing new. Honestly, it’s par for the course with big corporations and organizations like GameStop, as data breaches have become an incredibly common occurrence. Data breaches such as this one cost an average of $4 million for the companies involved.

Worse yet, there has been a 29 percent increase in data breaches from 2013 to 2016, as IBM pointed out.

How to Protect Yourself If You’re a GameStop Customer

GameStop did outline some precautions you can take to protect your sensitive data and identity in the letters they sent out to customers, but that doesn’t really help anyone not receiving said letter — for example, anyone who’s been through an address or name change since the time of the breach.

Chances are, there are a few people who will never see those letters, which means they might not be aware of the breach, or how to protect themselves. No worries, that’s where we come in.

Here are some steps you can take to boost your personal security:

  • Cancel any cards you used to make purchases at GameStop and request a replacement.
  • Accept or enroll in free — or premium — identity protection services.
  • Call your bank or financial institution, inform them of the potential breach and ask for help keeping an eye on your account.
  • File a 90-day fraud alert with the credit bureau of your choice.
  • Request a security freeze for any and all affected accounts.
  • Change your account passwords associated with your GameStop profile.
  • If applicable, turn on two-factor authentication for your accounts, especially your credit profile or mobile apps.
  • Review every statement carefully to ensure there are no fraudulent or unexpected charges.
  • Sign up for security and activity alerts. Most banks will notify you when a major account change or purchase goes through on your account.

It’s also a good idea to get out of the habit of storing your credit card information via online services and accounts. That won’t necessarily prevent a breach, as hackers can still gain access even with old transactions in some cases.

That said, keeping your credit card information close to your chest is safer, even if it is a hassle to re-enter that information every time you want to make a purchase. Better safe than sorry, especially when it comes to your finances and identity theft!

By Kayla Matthews

Kayla Matthews

Kayla Matthews is a technology writer dedicated to exploring issues related to the Cloud, Cybersecurity, IoT and the use of tech in daily life.

Her work can be seen on such sites as The Huffington Post, MakeUseOf, and VMBlog. You can read more from Kayla on her personal website, Productivity Bytes.

View Website
The Lighter Side Of The Cloud - Holiday Photos
The Lighter Side Of The Cloud - Checking It Twice
The Lighter Side Of The Cloud - Xoogler
The Lighter Side Of The Cloud - Brain Clutter
The Lighter Side Of The Cloud - Location?
Multi or Hybrid Cloud, What’s the Difference?

Multi or Hybrid Cloud, What’s the Difference?

Multi Cloud You’ve likely heard about the latest trend in cloud computing commonly referred to as multi-cloud, and it is ...
The 3% Edge: How Data Drives Success in Business and the Olympics

The 3% Edge: How Data Drives Success in Business and the Olympics

Data Drives Success in Business A recent Bloomberg BusinessWeek article entitled “The Tech Guy Building Wearables for America’s Olympians” profiles ...
Driving Transformation? It is possible to predict the future.

Driving Transformation? It is possible to predict the future.

Driving Transformation Previously, I wrote about the criticality of defining the Vision for your transformation - what is your real objective, how ...
Part 2: Strategies for Securing Mobile Devices in a Cloud-based World

Part 2: Strategies for Securing Mobile Devices in a Cloud-based World

Part 2: Strategies for Securing Mobile Devices With workplace mobility now a way of life and companies investing in cloud-based ...
The Cloud Has Your Data (Whether You Like It Or Not)

The Cloud Has Your Data (Whether You Like It Or Not)

Cloud Cleanup Anyone? Following on where we left off from my last two articles now we shift focus to what ...
Cloud Developers are Using the Programmable Infrastructure to Open a World of Innovation and Business Transformation

Cloud Developers are Using the Programmable Infrastructure to Open a World of Innovation and Business Transformation

In the past few years, we have seen a surge of advancement in cloud development. New platforms, developer tools, and ...
Infosec thought leaders

Cryptocurrencies and Ransomware: How VDI Can Help Defend Against the Next Ransomware Attack

Cryptocurrencies and Ransomware The WannaCry ransomware made headlines back in May when it crippled hospitals across the UK and put ...
real time hacking attacks

Live Real Time Hacking and Ransomware Tracking Maps Online

Real Time Hacking Attacks We've recently covered a few real time hacking maps but have decided to extend the list based on the recent ransomware activities with some additional real time hacking attack and ransomware tracking maps. Ransomware refers to malicious ...
How Security Certification Helps Cloud Service Providers Stay Transparent and Credible

How Security Certification Helps Cloud Service Providers Stay Transparent and Credible

Security Certification Helps Cloud Service Providers If you are a cloud service provider (CSP), you know your customers have a choice as to who to work with, but do you know what will help tip the scales in your favor? ...
Data Protection Officers

Free Linux Firewalls of 2018

A firewall is an important aspect of computer security these days, and most modern routers have one built in, which while helpful, can be difficult to configure. Fortunately there are also distributions (distros) of the free operating system Linux which ...
DevOps

DevOps

FIRST THINGS FIRST. WHAT ARE MICROSERVICES? Microservices are an engineering approach and architectural style of computing that is becoming extremely important for organizations wanting to innovate through a stronger engagement with their ecosystem of customers, suppliers and partners. To explain ...
The Developer’s Guide to Azure

The Developer’s Guide to Azure

Develop on a cloud platform designed for you. In this update of the Developer’s Guide to Azure, see how the comprehensive set of Azure app platform services fits your needs. Use it to navigate the architectural approaches and most common ...