Tag protection

Your Password or Your (Digital) Life: How to Protect Yourself From the Latest Online Threats

Having your identity stolen can have serious consequences. Learn about the steps you can take to protect yourself and keep your online accounts secure.

Part 2 – Protecting Customer Data on GCP

This is Part 2 of a 5-part series on Evernote’s transition to Google Cloud Platform (GCP). To read this series from the beginning, see Part 1. Our security team’s charter is to protect customer data. When we started the project to move to a cloud infrastructure, and Google specifically, we started work in parallel to understand how to keep customer data secure as we migrated into GCP. We focused on

Continue reading…

Enhanced Evernote Mobile Application Security

Today, we’re happy to announce the availability of a simple, powerful tool that our iOS customers can use to help protect their Evernote account from unauthorized access. Evernote has implemented the 1Password iOS App Extension, provided by AgileBits, a well-known development team based in Toronto, Canada. As of today if you have the 1Password app installed on your iOS device you can: Use 1Password to generate and store a strong,

Continue reading…

Evernote’s Three Laws of Data Protection [Update]

There are certain things that matter to us, that we fight for, and that define virtually every decision that we make at Evernote. In 2011, we laid them out in our 3 Laws of Data Protection: Your Data is Yours Your Data is Protected Your Data is Portable Over the past few years, we’ve seen a welcome shift across our entire industry towards more transparency around data use, intent, and

Continue reading…

Protecting your data: the broken drives edition

In our blog post “Evernote’s Three Laws of Data Protection”, Phil touches on some of the measures we take to protect your data and our goal of being a trusted place for it. There is much more we do, so I wanted to talk a bit about an important aspect: what happens when hard drives fail? You have probably read stories of people buying previously owned computers and finding they

Continue reading…