Ed Brennan

By Ed Brennan

October 6, 2016


Mobility is the great connector of our time, enabling people to access worlds of information from our devices in a matter of seconds. While the power of mobility continues to be embraced by organizations offering benefits to both employees and business owners, the threat of security breaches looms over IT professionals across all industries—including field services. With bring your own device (BYOD) no longer a phenomenon but an assumption, there exists more room for security pitfalls than ever. Sensitive data lives everywhere, increasing the risk of exposure, and with hackers becoming more and more sophisticated, many of today’s security mechanisms no longer offer adequate protection. In this blog, we’ll explore mobility and security in the enterprise and how the future success of an organization will depend on its ability to secure its own data as well as its customers.

Mobile security in the enterprise

It’s rare that there’s a distinction between a work phone and a personal phone these days; most people use one device for all. This results in a lot sensitive data being housed on personal devices that travel anywhere and everywhere outside of the office.

As the enterprise continues to expand its mobile ecosystem, security must be a top priority and not just on devices themselves, but on the applications within them as well. Devices can easily be stolen or lost and if it’s found by the wrong person with the ability to break into the device, what’s to stop them from logging into the device’s applications and retrieving all kinds of valuable enterprise data and secrets. From bank accounts to personal calendars to sensitive work data; once a device is compromised, it’s challenging for IT to regain control.

To save IT from avoidable headaches, apps need to be more tightly integrated into the security features of the device to ensure proper use. There has to be a balance between an app’s usability and the security of service—like those rolled out by the credit card industry.

A smarter approach

Have you ever travelled somewhere and forgotten to notify your credit company or bank of your plans and had your credit card declined? While inconvenient (and embarrassing) in the moment, it’s actually one of the most sound security practices applied to today’s technology. With credit cards, remote teams consistently monitor use so that they have a baseline against which they compare all future activity. When they notice an irregularity in usage (i.e. $1,000 spent in Moscow a day after the consumer was just in Los Angeles), the card is immediately frozen until the customer can confirm that the card is in their hands and hasn’t been compromised.

While this example is not in the enterprise security space, it does exemplify the type of practices that are available. So why haven’t other industries embraced them? Building behavioral security into an application to identify a user’s typical behavior from an aberration can potentially indicate a breach, thus locking the system to protect the enterprise information on that device. These practices would be especially beneficial in the field service management industry, where service professionals have access to streams of sensitive business information. For example, say a field service professional has the ability to point her device at power plant transformer and see inside that transformer to diagnose an issue that will likely cause problems in the near future. Now imagine if that device fell into the hands of a person who wants to take out the power grid for the east coast, they would know exactly how to take out the transformer and what the impact would be. Considering this example, the need for improved security measures when it comes to mobility becomes quite clear.

A look ahead

The growth in mobility over the past two decades signals the adoption of new technologies that are capable of communicating incredible amounts of data to service professionals—and anyone—in real-time. A recent study found that the number of mobile devices in the enterprise increased by 72% between 2014 and 2015. With this number only expected to increase in the coming years, the amount of information that will become available to the wrong people will only increase. The need for constantly evolving security measures for mobile devices and apps we interact with everyday is clear. The future of everything from enterprise organizations to the government to your own bank account depends on what steps are taken to protect them. Enterprise security—whether mobile or across the organization—is an area that needs to be scrutinized, updated, considered and prioritized, every single day. Otherwise your organization will become just another statistic.

Ed Brennan
By Ed Brennan

Ed Brennan is the official cloud evangelist for ClickSoftware, where he works to shape and deliver ClickSoftware’s Cloud strategy, build broad use of cloud technology offerings around public and private cloud, and influence the direction ClickSoftware’s Cloud platform will evolve into. Prior to joining ClickSoftware, Ed was the Vice President and Principal Architect at Cloud Technology Partners. Before that, he was the Senior Director of Engineering for Stratus. He also held multiple positions at EMC, where he launched the company’s first publicly available cloud computing and storage environments. He holds a Bachelor of Science in Business from Saint Joseph’s College.

Share on
5 Field Service Management Software Myths BUSTED

Mobility is the great connector of our time, enabling people to access worlds of information from our devices in a matter of seconds. While the power of mobility continues to be embraced by organizations offering benefits to both employees and busine...

Learn more

Join Our Newsletter

You may also like...

ClickSoftware Enables Predictive Field Service, Increases Intelligence of Cloud-Based Field Service Management

Latest release leverages machine learning and offers analytics to drive deeper insights for service ...

Learn more
6 Ways to Start Measuring Customer Experience without NPS

The field service organization is often a customer’s only means of direct interaction with your bu...

Learn more
SGN Selects ClickSoftware to Provide Cloud-Based Mobile Workforce Optimization

ClickSoftware helps company fully mobilize and automate scheduling in emergency response situations...

Learn more
Empower Field Service Decisions with Machine Learning

How many times have your dispatchers spent hours trying to create the perfect schedule only to have ...

Learn more
Decoding the Service Chain: 5 Steps to Achieving Optimization

Service chain optimization begins with careful planning and forecasting, but doesn’t stop there. D...

Learn more
10 Reasons Why FSM is the Real Secret to Santa’s Success 

Do you ever wonder how Santa delivers billions of gifts to children all over the world in a single d...

Learn more
Decoding the Service Chain: Dissecting the Links

In a world full of on-demand services, customer expectations are at an all-time high. Regardless of ...

Learn more
If the Future Is in the Cloud, Why Are Enterprises Still Lagging Behind?

With customer service expectations higher than ever, enterprises delivering field service are faced ...

Learn more
Decoding the Service Chain: What is Service Chain Optimization?

Every customer-centric business is ultimately measured by how it performs on the day of service deli...

Learn more
5 Signs of the Coming Digital Disruption Apocalypse in Field Service Technology

We’ve published many articles on this blog about the future of technology in field service. But th...

Learn more

Stay In The Loop

Receive industry updates of news, advice and analysis

Subscribe to our Newsletter