Do you allow your employees to use Evernote?


I'm conflicted over an issue we are currently discussing at work; whether or not to prohibit use of Evernote. I personally really, really like Evernote, and use it daily to keep track of everything ranging from what I need to bring to an afternoon meeting to what groceries to pick up on the way home. If you haven't used Evernote, you can make a note/take a photo on your smartphone/tablet/laptop/desktop and Evernote synchs up with all your devices so that it is accessible wherever you are. Super convenient, clean interface, and very useful. But you can see the obvious security concerns we have as a business. Part of me thinks that while there are those concerns about using a consumer focused cloud product, you can never have a 100% secure environment anyway, and the usefulness of Evernote as a tool outweighs the risk of data loss. What would you do, allow Evernote or lock it down?

Topic: Security
Answer this Question


2 total
Vote Up (32)

We allow Evernote, but not Dropbox.  I'm not sure how that is a coherent security regime, but there you go.  Basically, so many of us use Evernote as a productivity tool that while we accept that there is some risk of proprietary information being compromised, but find the level acceptable.  Let's face it, most people aren't using Evernote to save the quarterly report that they are working on, they use it to remind themselves to talk to Bob (or whoever) about the quarterly report at 9:30 the next morning.  If I worked at a hospital or the White House or something, I might feel differently, but the world of injection molded plastics just isn't as sensitive.  It is just glamourous. 

Vote Up (31)

I'd suggest allowing it, but with defined rules as to its use. You should specify which types of data related to your business that it should not be used for, and you should let users know that if they violate your clearly spelled out policies then you may remove access to the application at any time.

Ask a question

Join Now or Sign In to ask a question.
Over a thousand major enterprise networks and small and medium businesses in the U.S. have been compromised by a recently discovered malware package called "Backoff" and are probably unaware of it, the U.S. Department of Homeland Security (DHS) said in a cybersecurity alert on Friday.
When online services lack privacy controls, you can roll your own using near military-grade encryption.
The increased adoption of mobile, social and cloud computing is driving growth in security spending among organizations that are also becoming more aware of threats on all those fronts.
In the wake of recent security breaches of medical databases, doctors can’t be too careful
A security precaution skipped in mobile applications such as Facebook's Messenger could be abused to make an expensive phone call at a victim's expense, a developer contends.
The U.S. National Institute of Standards and Technology (NIST) is developing a guide for testing third-party apps to ensure that they are secure and don't introduce any vulnerabilities.
With a Microsoft-mandated deadline a little more than two months away, computer makers are still selling PCs equipped with Windows 7 Home Premium.
Many businesses focus on record retention, but here's why one lawyer says "Destroy!"
With a single massive power burst, storage media that suddenly heads south, or interaction with a light-fingered ne'er-do-well, the technology your student depends on can vanish. Take these five tips to heart, however, and the loss of a device or data need not be catastrophic.
U.S government agencies will work to release cyberthreat information faster to the health-care industry after a massive breach at hospital operator Community Health Systems, representatives of two agencies said.

White Papers & Webcasts

Webcast On Demand

Cloud BI Overview: Jaspersoft for AWS

Sponsor: TIBCO Jaspersoft

Webcast On Demand

Cloud BI in Action: Recorded Webinar of Customer, Kony, Inc.

Sponsor: TIBCO Jaspersoft

See more White Papers | Webcasts

Join us: