SHARE
Facebook X Pinterest WhatsApp

Evernote Hack and What SMBs Can Learn from It

New Cyber Attack Methods Uncovering Vulnerable Blind-Spots You’ve probably read about how Evernote was hacked over the weekend by now. According to the popular productivity service, no user data was accessed, though it admitted that the hackers succeeded in gaining access to, and copying out the email addresses and hashed passwords of its users. As […]

Written By
thumbnail
Paul Mah
Paul Mah
Mar 7, 2013
Slide Show

New Cyber Attack Methods Uncovering Vulnerable Blind-Spots

You’ve probably read about how Evernote was hacked over the weekend by now. According to the popular productivity service, no user data was accessed, though it admitted that the hackers succeeded in gaining access to, and copying out the email addresses and hashed passwords of its users. As a result, the company has initiated a password reset for its 50 million users.

So what are some lessons that small and mid-sized businesses can glean from this unfortunate incident?

Don’t save passwords in plaintext

The first lesson that SMBs can learn from the Evernote hack is the importance of not storing passwords in plaintext. Clearly, hackers do place a priority on seizing the password file or database once they gain unauthorized access to a server. As such, it is imperative that programmers take steps to protect passwords by salting and hashing them prior to storing them to disk.

For those not familiar with the term, hashing refers to the use of a cryptographic function that takes an arbitrary block of data and returns a fixed-sized string. The algorithm behind a good hash function is essentially a one-way function that is impractical to reverse by computational means. This makes it possible to store passwords with greatly reduced risks since only the hashes are stored.

On the other hand, salting involves an additional step of concatenating a random non-secret value (salt) in order to defeat rainbow tables. Rainbow tables are essentially huge tables of pre-computed hashes used to find a match to recover the original plaintext password. The use of a salt renders using a rainbow table infeasible.

One common misconception on this front is how this seemingly complex procedure needn’t be of concern to smaller businesses. This is an erroneous assumption though, since all software that requires the use of a password will need to store the login credentials somewhere. As such, it is in the interest of SMBs to ensure that they use proper salting and hashing techniques where applicable.

Encourage employees not to reuse password

Finally, the Evernote hack is a somber reminder that users should use a different password for each online service. Think about it: What if the hackers had successfully made off with the Evernote password file without anyone being the wiser? Indeed, it is entirely plausible that hackers may have succeeded in breaking into other popular Web services.

A common issue here is the challenge of remembering so many disparate passwords. Thankfully, there are many password management utilities to help out here. For more information on this topic, check out my post on three tools for proper password management.

Recommended for you...

How DeFi is Reshaping the Future of Finance
Kihara Kimachia
Aug 25, 2022
Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.