Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
    financial analytics
    Financial Analytics Shows The Hidden Cost Of Not Switching Systems
    4 Min Read
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Cybersecurity: Evernote Adds Two-Factor Authentication
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Data Management > Best Practices > Cybersecurity: Evernote Adds Two-Factor Authentication
Best PracticesData ManagementITPrivacySecurity

Cybersecurity: Evernote Adds Two-Factor Authentication

onlinetech
onlinetech
3 Min Read
cybersecurity two-factor authentication
SHARE

On Saturday, the online SaaS (software as a service) note-collecting Evernote posted a blog with subsequent email stating that they had discovered and blocked unauthorized activity on their network. In response to the attack, they reset the passwords of the nearly 50 million people that are currently using their system.

On Saturday, the online SaaS (software as a service) note-collecting Evernote posted a blog with subsequent email stating that they had discovered and blocked unauthorized activity on their network. In response to the attack, they reset the passwords of the nearly 50 million people that are currently using their system.

cybersecurity two-factor authenticationEvernote explained that their passwords were both salted and hashed. The company still felt inclined, for safety’s sake, to implement the password reset. I personally think taking this approach, although mildly inconvenient for the people who have to change their passwords, is ultimately smarter for the company, and shows a great respect for their user’s security (ABC News reports that Evernote was the only hacked company that has ever required the reset).

The data accessed included usernames, encrypted passwords, and email addresses, although none of the user’s content was available:

More Read

DIY Culture: Should Non-IT Employees Be Compensated for Building Apps?
4 Things You Should Know About Operation Clandestine Fox
Cybersecurity Lessons from the Brickerbot Outbreak
Tips for Developing a Super HR Analytics Team
Lean Mean Data Governance Machine – Waste Prevention – Part 3 of 3

“In our security investigation, we have found no evidence that any of the content that you store in Evernote was accessed, changed, or lost. We also have no evidence that any payment information for Evernote Premium or Evernote Business customers was accessed.”

In response to this breach, Evernote has decided to speed up the setup of their two-factor authentication. In an email to InformationWeek, spokesperson Ronda Scott explained that these plans had already been in the works before the breach:

“We were already planning to roll out optional two-factor authentication to all of our users later this year…We are accelerating those plans now.”

As I mentioned in an earlier blogpost, two-factor authentication is a wonderful bit of added security to keep attackers from accessing your data. It requests that the user give both a password, and verification from a source they have on their person (often this comes in the form of a hardware fob or cellphone app). In the event that the same sort of breach happened to a company that uses two-factor authentication, even if the passwords were decrypted, they wouldn’t be able to access the system without also having the physical phones or fobs belonging to the usernames and email addresses.

TAGGED:cybersecuritytwo-factor authentication
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

Edge Computing in IoT
Unique Capabilities of Edge Computing in IoT
Exclusive Internet of Things
Turning Geographic Data Into Competitive Advantage
The Rise of Location Intelligence: Turning Geographic Data Into Competitive Advantage
Big Data Exclusive
AI Recruitment Software Solution
The Best AI Recruitment Software Solution: Transforming Hiring with Smarter Tech
Artificial Intelligence Exclusive
real estate data
How Big Data Is Changes How We Buy and Sell Real Estate
Big Data Exclusive

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

cybersecurity
Big DataData ManagementExclusivePrivacyRisk Management

Improving Big Data Analytics To Address Cybersecurity Challenges

5 Min Read
what cyber criminals can do with your metadata
Best PracticesBig DataData ManagementExclusivePrivacyRisk ManagementSecurity

What Cyber Criminals Can Do With Your Metadata

8 Min Read
Email Data
Data ManagementPrivacySecurity

How to Protect Your Organization’s Sensitive Email Data

7 Min Read

Avoiding Cyber Threat Amnesia

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive
data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?