What You Need to Know About GameStop's Data Breach

GameStop’s Data Breach

Just in case you missed it, GameStop quietly announced a major data breach of sensitive customer information which occurred for a six-month period. We say “quietly” announced because they sent out snail mail letters to anyone that might be a potential victim.

Snail mail, in 2017, to discuss a major data breach online. Well, that’s one way to do it, we suppose.

What Happened?

Back in April, GameStop made it clear they were looking into a “potential” data breach that might have exposed customer credit card numbers and related information.

If you made a purchase with GameStop, particularly through their website, anytime between August 10, 2016, and February 9, 2017, your credit card data may be at risk. Eagle-eyed readers will notice that’s a remarkably long period of time, and probably includes a massive number of customers. Sadly, the company has yet to announce any concrete numbers, so it’s hard to say how many are actually at risk.

What was compromised?

Oh, just some names, addresses, credit card numbers and even three-digit security codes — you know, the ones that prevent unauthorized purchases from your credit and debit cards?

Way to go, guys and gals, that’s quite the egregious error on your part. Hopefully, most of the customers who made purchases during that timeframe are safe.

Of course, this is nothing new. Honestly, it’s par for the course with big corporations and organizations like GameStop, as data breaches have become an incredibly common occurrence. Data breaches such as this one cost an average of $4 million for the companies involved.

Worse yet, there has been a 29 percent increase in data breaches from 2013 to 2016, as IBM pointed out.

How to Protect Yourself If You’re a GameStop Customer

GameStop did outline some precautions you can take to protect your sensitive data and identity in the letters they sent out to customers, but that doesn’t really help anyone not receiving said letter — for example, anyone who’s been through an address or name change since the time of the breach.

Chances are, there are a few people who will never see those letters, which means they might not be aware of the breach, or how to protect themselves. No worries, that’s where we come in.

Here are some steps you can take to boost your personal security:

  • Cancel any cards you used to make purchases at GameStop and request a replacement.
  • Accept or enroll in free — or premium — identity protection services.
  • Call your bank or financial institution, inform them of the potential breach and ask for help keeping an eye on your account.
  • File a 90-day fraud alert with the credit bureau of your choice.
  • Request a security freeze for any and all affected accounts.
  • Change your account passwords associated with your GameStop profile.
  • If applicable, turn on two-factor authentication for your accounts, especially your credit profile or mobile apps.
  • Review every statement carefully to ensure there are no fraudulent or unexpected charges.
  • Sign up for security and activity alerts. Most banks will notify you when a major account change or purchase goes through on your account.

It’s also a good idea to get out of the habit of storing your credit card information via online services and accounts. That won’t necessarily prevent a breach, as hackers can still gain access even with old transactions in some cases.

That said, keeping your credit card information close to your chest is safer, even if it is a hassle to re-enter that information every time you want to make a purchase. Better safe than sorry, especially when it comes to your finances and identity theft!

By Kayla Matthews

Data Fallout.png
Holiday Photos.png
It’s Magic
The Sticky Note.png
Savvy Team
An Internet Hive Mind? The idea of a hive mind has been around for quite a long time in science fiction. It's also been one that has been thrown around to describe the internet or ...
Rakesh Soni
Businesses now see the cloud as a standard, and they are always on a hunt for ways to leverage the cloud to its full potential. And if enterprises need to be competitive in the ever-expanding ...
Adam Cole
Mitigating Regulatory Risk Some of the great business opportunities for Unified Communications as a Service (UCaaS) integrators and Value-Added Resellers (VARs) have been the emergence of cloud, telephony and Unified Communications (UC) technologies such as ...
Mark Ardito
OPEX is the new battleground I recently wrote in CloudTweaks about how cloud is forcing CIOs to work more closely with their C-suite colleagues to sell the benefits and its role as a business driver ...
Gary Bernstein
Most Dangerous Botnets While it’s no secret that the technical sophistication of cyber-attacks grows exponentially, adversaries often need widespread networks to make it happen. One of the ways to do that is to infect legitimate ...