Ed Brennan

By Ed Brennan

October 6, 2016


Mobility is the great connector of our time, enabling people to access worlds of information from our devices in a matter of seconds. While the power of mobility continues to be embraced by organizations offering benefits to both employees and business owners, the threat of security breaches looms over IT professionals across all industries—including field services. With bring your own device (BYOD) no longer a phenomenon but an assumption, there exists more room for security pitfalls than ever. Sensitive data lives everywhere, increasing the risk of exposure, and with hackers becoming more and more sophisticated, many of today’s security mechanisms no longer offer adequate protection. In this blog, we’ll explore mobility and security in the enterprise and how the future success of an organization will depend on its ability to secure its own data as well as its customers.

Mobile security in the enterprise

It’s rare that there’s a distinction between a work phone and a personal phone these days; most people use one device for all. This results in a lot sensitive data being housed on personal devices that travel anywhere and everywhere outside of the office.

As the enterprise continues to expand its mobile ecosystem, security must be a top priority and not just on devices themselves, but on the applications within them as well. Devices can easily be stolen or lost and if it’s found by the wrong person with the ability to break into the device, what’s to stop them from logging into the device’s applications and retrieving all kinds of valuable enterprise data and secrets. From bank accounts to personal calendars to sensitive work data; once a device is compromised, it’s challenging for IT to regain control.

To save IT from avoidable headaches, apps need to be more tightly integrated into the security features of the device to ensure proper use. There has to be a balance between an app’s usability and the security of service—like those rolled out by the credit card industry.

A smarter approach

Have you ever travelled somewhere and forgotten to notify your credit company or bank of your plans and had your credit card declined? While inconvenient (and embarrassing) in the moment, it’s actually one of the most sound security practices applied to today’s technology. With credit cards, remote teams consistently monitor use so that they have a baseline against which they compare all future activity. When they notice an irregularity in usage (i.e. $1,000 spent in Moscow a day after the consumer was just in Los Angeles), the card is immediately frozen until the customer can confirm that the card is in their hands and hasn’t been compromised.

While this example is not in the enterprise security space, it does exemplify the type of practices that are available. So why haven’t other industries embraced them? Building behavioral security into an application to identify a user’s typical behavior from an aberration can potentially indicate a breach, thus locking the system to protect the enterprise information on that device. These practices would be especially beneficial in the field service management industry, where service professionals have access to streams of sensitive business information. For example, say a field service professional has the ability to point her device at power plant transformer and see inside that transformer to diagnose an issue that will likely cause problems in the near future. Now imagine if that device fell into the hands of a person who wants to take out the power grid for the east coast, they would know exactly how to take out the transformer and what the impact would be. Considering this example, the need for improved security measures when it comes to mobility becomes quite clear.

A look ahead

The growth in mobility over the past two decades signals the adoption of new technologies that are capable of communicating incredible amounts of data to service professionals—and anyone—in real-time. A recent study found that the number of mobile devices in the enterprise increased by 72% between 2014 and 2015. With this number only expected to increase in the coming years, the amount of information that will become available to the wrong people will only increase. The need for constantly evolving security measures for mobile devices and apps we interact with everyday is clear. The future of everything from enterprise organizations to the government to your own bank account depends on what steps are taken to protect them. Enterprise security—whether mobile or across the organization—is an area that needs to be scrutinized, updated, considered and prioritized, every single day. Otherwise your organization will become just another statistic.

Ed Brennan
By Ed Brennan

Ed Brennan is the official cloud evangelist for ClickSoftware, where he works to shape and deliver ClickSoftware’s Cloud strategy, build broad use of cloud technology offerings around public and private cloud, and influence the direction ClickSoftware’s Cloud platform will evolve into. Prior to joining ClickSoftware, Ed was the Vice President and Principal Architect at Cloud Technology Partners. Before that, he was the Senior Director of Engineering for Stratus. He also held multiple positions at EMC, where he launched the company’s first publicly available cloud computing and storage environments. He holds a Bachelor of Science in Business from Saint Joseph’s College.

Share on
5 Field Service Management Software Myths BUSTED

Mobility is the great connector of our time, enabling people to access worlds of information from our devices in a matter of seconds. While the power of mobility continues to be embraced by organizations offering benefits to both employees and busine...

Learn more

Join Our Newsletter

You may also like...

If the Future Is in the Cloud, Why Are Enterprises Still Lagging Behind?

With customer service expectations higher than ever, enterprises delivering field service are faced ...

Learn more
Decoding the Service Chain: What is Service Chain Optimization?

Every customer-centric business is ultimately measured by how it performs on the day of service deli...

Learn more
5 Signs of the Coming Digital Disruption Apocalypse in Field Service Technology

We’ve published many articles on this blog about the future of technology in field service. But th...

Learn more
Visibility: The Key to Managing Your Mobile Third-Party Workforce

Businesses are always looking for ways to grow revenue while shrinking costs. An increasing number o...

Learn more
2020 Field Service Technology Predictions: Drones, Robots, and Self-Driving Cars

If only we could look into a crystal ball to see what the future holds. While that’s not possible,...

Learn more
ClickSoftware Named a Leader in Gartner Magic Quadrant for Field Service Management For Sixth Consecutive Year

ClickSoftware recognized by key industry analysts for completeness of vision and ability to execute ...

Learn more
How the Coming Army of Robots Will Reshape Field Service

In 1984, Arnold Schwarzenegger famously said, “I’ll be back” while playing the lead role in th...

Learn more
Field Service Engagement: Human Interaction is Today’s Digital Differentiator

For the past several decades, service organizations and enterprises have looked to software and tech...

Learn more
Zero-touch Dispatch with Artificial Intelligence

As early as 1968, we’ve been warned of the potential dangers of intelligent computers and artifici...

Learn more
Adventures in Artificial Intelligence Part 5: Personalization on The Horizon

If Moore’s Law holds true, artificial intelligence technology should be on an 18-month cycle of co...

Learn more

Stay In The Loop

Receive industry updates of news, advice and analysis

Subscribe to our Newsletter