What You Need to Know About GameStop's Data Breach

GameStop’s Data Breach

Just in case you missed it, GameStop quietly announced a major data breach of sensitive customer information which occurred for a six-month period. We say “quietly” announced because they sent out snail mail letters to anyone that might be a potential victim.

Snail mail, in 2017, to discuss a major data breach online. Well, that’s one way to do it, we suppose.

What Happened?

Back in April, GameStop made it clear they were looking into a “potential” data breach that might have exposed customer credit card numbers and related information.

If you made a purchase with GameStop, particularly through their website, anytime between August 10, 2016, and February 9, 2017, your credit card data may be at risk. Eagle-eyed readers will notice that’s a remarkably long period of time, and probably includes a massive number of customers. Sadly, the company has yet to announce any concrete numbers, so it’s hard to say how many are actually at risk.

What was compromised?

Oh, just some names, addresses, credit card numbers and even three-digit security codes — you know, the ones that prevent unauthorized purchases from your credit and debit cards?

Way to go, guys and gals, that’s quite the egregious error on your part. Hopefully, most of the customers who made purchases during that timeframe are safe.

Of course, this is nothing new. Honestly, it’s par for the course with big corporations and organizations like GameStop, as data breaches have become an incredibly common occurrence. Data breaches such as this one cost an average of $4 million for the companies involved.

Worse yet, there has been a 29 percent increase in data breaches from 2013 to 2016, as IBM pointed out.

How to Protect Yourself If You’re a GameStop Customer

GameStop did outline some precautions you can take to protect your sensitive data and identity in the letters they sent out to customers, but that doesn’t really help anyone not receiving said letter — for example, anyone who’s been through an address or name change since the time of the breach.

Chances are, there are a few people who will never see those letters, which means they might not be aware of the breach, or how to protect themselves. No worries, that’s where we come in.

Here are some steps you can take to boost your personal security:

  • Cancel any cards you used to make purchases at GameStop and request a replacement.
  • Accept or enroll in free — or premium — identity protection services.
  • Call your bank or financial institution, inform them of the potential breach and ask for help keeping an eye on your account.
  • File a 90-day fraud alert with the credit bureau of your choice.
  • Request a security freeze for any and all affected accounts.
  • Change your account passwords associated with your GameStop profile.
  • If applicable, turn on two-factor authentication for your accounts, especially your credit profile or mobile apps.
  • Review every statement carefully to ensure there are no fraudulent or unexpected charges.
  • Sign up for security and activity alerts. Most banks will notify you when a major account change or purchase goes through on your account.

It’s also a good idea to get out of the habit of storing your credit card information via online services and accounts. That won’t necessarily prevent a breach, as hackers can still gain access even with old transactions in some cases.

That said, keeping your credit card information close to your chest is safer, even if it is a hassle to re-enter that information every time you want to make a purchase. Better safe than sorry, especially when it comes to your finances and identity theft!

By Kayla Matthews

Ronald van Loon

Cognitive Science + Data Science: Next-Gen Data Driven Marketing

Next-Gen Data Driven Marketing What are the psychological motivators driving customer purchasing decisions? The era of ubiquitous digitalization, advanced analytics, and big data is here. Yet marketers frequently grapple with obtaining information that answers critical ...
Automate Order Fallout Resolution Using Self-healing Framework

Automate Order Fallout Resolution Using Self-healing Framework

Automate Order Fallout Resolution Using Self-healing Framework to Accelerate Resolution Time by 98% Most Digital Service Providers (DSPs) face a common challenge of meeting due dates for their customer orders. The instability and delay in ...
Kaylamatthews

What You Need to Know – IoT and Real-Time Operating Systems

Real-Time Operating Systems A real-time operating system, or real-time OS, appears to execute tasks while using a single processing core simultaneously.  However, what's really happening is that the tasks' response time is so fast that ...
Gary Bernstein

5 Popular Telemedicine Software Services

Telemedicine Software Since the beginning of the Covid-19 pandemic, telemedicine software services have become extremely popular, and every day more people are using this service instead of going to hospitals and emergency departments as they ...
Digital Theft

Cross-Site Scripting – Why Is It A Serious Security Threat For Big Data Applications?

Security Threat And Big Data Applications (Updated August 11th, 2020) IBM, Amazon, Google, Yahoo, Microsoft - and the list goes on. All these leading IT enterprises have been affected by Cross-Site Scripting (XSS) attacks in ...
Jeremy Cioara

Demand for Cloud and AI Skills Continues To Increase

Demand for Cloud Skills Increases Thinking about adding more cloud skills to your repertoire? Stop thinking. The time to do it is now. For IT professionals, cloud computing skills are becoming an essential resume item.  ...