What You Need to Know About GameStop's Data Breach

GameStop’s Data Breach

Just in case you missed it, GameStop quietly announced a major data breach of sensitive customer information which occurred for a six-month period. We say “quietly” announced because they sent out snail mail letters to anyone that might be a potential victim.

Snail mail, in 2017, to discuss a major data breach online. Well, that’s one way to do it, we suppose.

What Happened?

Back in April, GameStop made it clear they were looking into a “potential” data breach that might have exposed customer credit card numbers and related information.

If you made a purchase with GameStop, particularly through their website, anytime between August 10, 2016, and February 9, 2017, your credit card data may be at risk. Eagle-eyed readers will notice that’s a remarkably long period of time, and probably includes a massive number of customers. Sadly, the company has yet to announce any concrete numbers, so it’s hard to say how many are actually at risk.

What was compromised?

Oh, just some names, addresses, credit card numbers and even three-digit security codes — you know, the ones that prevent unauthorized purchases from your credit and debit cards?

Way to go, guys and gals, that’s quite the egregious error on your part. Hopefully, most of the customers who made purchases during that timeframe are safe.

Of course, this is nothing new. Honestly, it’s par for the course with big corporations and organizations like GameStop, as data breaches have become an incredibly common occurrence. Data breaches such as this one cost an average of $4 million for the companies involved.

Worse yet, there has been a 29 percent increase in data breaches from 2013 to 2016, as IBM pointed out.

How to Protect Yourself If You’re a GameStop Customer

GameStop did outline some precautions you can take to protect your sensitive data and identity in the letters they sent out to customers, but that doesn’t really help anyone not receiving said letter — for example, anyone who’s been through an address or name change since the time of the breach.

Chances are, there are a few people who will never see those letters, which means they might not be aware of the breach, or how to protect themselves. No worries, that’s where we come in.

Here are some steps you can take to boost your personal security:

  • Cancel any cards you used to make purchases at GameStop and request a replacement.
  • Accept or enroll in free — or premium — identity protection services.
  • Call your bank or financial institution, inform them of the potential breach and ask for help keeping an eye on your account.
  • File a 90-day fraud alert with the credit bureau of your choice.
  • Request a security freeze for any and all affected accounts.
  • Change your account passwords associated with your GameStop profile.
  • If applicable, turn on two-factor authentication for your accounts, especially your credit profile or mobile apps.
  • Review every statement carefully to ensure there are no fraudulent or unexpected charges.
  • Sign up for security and activity alerts. Most banks will notify you when a major account change or purchase goes through on your account.

It’s also a good idea to get out of the habit of storing your credit card information via online services and accounts. That won’t necessarily prevent a breach, as hackers can still gain access even with old transactions in some cases.

That said, keeping your credit card information close to your chest is safer, even if it is a hassle to re-enter that information every time you want to make a purchase. Better safe than sorry, especially when it comes to your finances and identity theft!

By Kayla Matthews

Episode 6: Cloud Migration: Why It’s More Important Than Ever

The Importance of Cloud Migration Moving fully to the cloud is still a concern for ...

Episode 3: The Bottomless Cloud – An Interview with David Friend of Wasabi

Why data is not “the new oil” and why “cloud” means more than we think ...

Episode 2: Coronavirus Phishing Emails and Work-from-Home Meetings

Coronavirus Phishing Emails What to watch out for as scammers exploit pandemic panic, and tips ...
Customers Will Recover From Downtime. But Will Your Business?

Customers Will Recover From Downtime. But Will Your Business?

Downtime Recovery Today’s society relies heavily on being connected to service providers. The ability of a business to transact or provide services online is now ...
Kayla Matthews

6 Reasons More Organizations Are Adopting Zero Trust

Organizations Adopting Zero Trust The zero trust model is becoming more commonplace in security. It's based on the realization that threats exist inside and outside ...
Torsten

Five Ways to Secure Access to Web Workloads

Secure Access to Cloud Workloads Organizations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. That’s a major ...
Anita Raj

The Criticality of Data Governance in a Multi-cloud Environment

The Criticality of Data Governance Multi-cloud has emerged as an enterprise favorite in almost no time.  In fact, Security Boulevard  makes a reference to a ...
Anita Raj

Coronavirus: Can technology help fight the pandemic?

Coronavirus and Telemedicine Technology COVID-19 has brought the world to a near standstill. From NBA to Met Ball and Coachella, all major events and festivals ...
Kokumai

How to Enhance Security of Digital Identity

Enhance Security of Digital Identity Introduction The subject of this article is a fragile digital identity built with a weak password, which makes a grave ...
Ben Ferguson

7 Reasons Why You Should Consider Deploying SD-WAN Alongside Public Cloud Services

Why You Should Consider Deploying SD-WAN Software-defined WAN (SD-WAN) and public cloud IaaS services both offer powerful benefits to virtually any business. Many of these same ...
Matt Holleran

Cloud Marketplaces Give Startups A Leg Up – Part 2

Cloud Marketplaces In my last post, Cloud Platforms, Marketplaces, and Startups Part One, I examined the proliferation of partner ecosystems within the cloud software business, ...
Jeremy Daniel

Find Competitive Advantage through AWS by Partnering With The Experts

Setting up your cloud configuration is too important to not involve the experts MediaTemple & CloudTweaks Thought Leadership Brand Series So many great business ideas ...
Marty

Digital Transformation: Adapting Your Business Online

The Age of Digital Transformation There is little doubt that the transition to cloud computing is driving an insatiable demand for digital transformation. Countless organizations ...