Using mobile devices in factory workshops has many potential benefits, but due to potential risks such as data security and cybersecurity, the right approach must be taken.
Mobility is a game-changer in the industrial sector. Mobile devices (phones) have far surpassed tablets and desktops in usage, becoming one of the preferred computing platforms today. The young workforce expects to utilize their mobile devices not only in their personal lives but also at work. Many industrial companies are experimenting with Bring Your Own Device (BYOD) work models. This model can increase the visibility of industrial applications and offer exciting new features. However, adopting mobile devices also carries risks. It is important to understand these risks and how to mitigate them through proven safety practices.
Mobile devices and web browsers are mature enough for use in the industrial sector. They possess sensors and capabilities that can utilize technologies such as GPS, accelerometers, cameras, and Bluetooth. Adopting these capabilities will offer exciting opportunities for the industrial field.
End users can use GPS to automatically navigate to specific areas of a Supervisory Control and Data Acquisition (SCADA) system. They can mark locations when changing settings, moving materials in a warehouse, or entering data. For security reasons, companies sometimes also use it to locate personnel.
Many mobile devices are equipped with cameras to take pictures or scan barcodes. End users can print barcodes and place them on each machine to display machine manuals, service orders, and procedures when scanned. They can also track inventory movement via barcode scanning. If a problem exists in the workshop, end users can use pictures to document the issue for reference or for remote troubleshooting.
Although tablets still play an important role, smartphones and other mobile devices have surpassed tablets in factory workshops.
Reduce the risk of mobility
Mobile devices make data more accessible and provide remote access for enterprise applications. Mobile devices are changing how we acquire, view, store, analyze, and act on data and information. Suppliers and end-users must adapt to this evolving landscape.
First, end users need to utilize Wi-Fi to take advantage of mobility. For various reasons, many users have been reluctant to use Wi-Fi, with security being a top priority. The following suggestions will help alleviate concerns about adopting wireless methods.
01
Use encrypted communication.
02
Ensure that each operator has a unique login name.
03
Use strong passwords and change them frequently. Nowadays, federated identity providers offer password management through two-factor authentication and single sign-on.
04
Enable auditing to track all changes.
05
Use role-based and region-based security to lock down application-based user identities and locations to avoid the risks associated with accidental remote computer operations.
Operational technology (OT) and information technology (IT) need to work together to provide a high level of security. OT needs to fully utilize the technology and conduct operational activities, while IT can serve as an asset with management, maintenance, security, and backup capabilities.
Despite the potential safety risks, the benefits of using mobile devices in factory workshops far outweigh the risks.
Industrial software vendors, especially SCADA software vendors, must also adapt to the trend of mobility. The biggest problem currently is that most platforms in the industrial sector are not suitable for use with mobile devices. Many software packages can only run on specific operating systems and cannot run on Apple's iOS or Google's Android devices.
Through technological transformation and enhancement, many software packages have gained mobile support. For example, desktop application frameworks can run on servers in headless mode (typically referring to system configurations lacking a display, keyboard, or mouse) when delivering images to mobile devices.
End users can view and interact with the data, but there are some trade-offs. It's crucial that the platform provides native support for web and mobile devices via native applications. This forces software vendors to adapt to changing times and ensure that SCADA software packages provide native support for this technology so that users can take advantage of this opportunity and avoid using piecework software.
Protect factory data security
Another issue with mobility is that sensitive information leaves the factory with the device. Understanding how mobile applications work is important. In most cases, information doesn't necessarily have to leave the factory. Operators can remotely access the application and information, but that information doesn't necessarily need to reside on the device itself. Typically, these systems rely on a connection to a server within the factory. If the user is remote, the device will also rely on a Virtual Private Network (VPN) connection to the factory. Without a connection to the factory server, the mobile device will not function. Data is stored on the server or in an on-site Structured Query Language (SQL) database.
If the mobile device is lost, it is crucial to wipe the industrial applications and immediately terminate factory access.
The biggest challenge for suppliers is that most platforms in the industrial sector are not suitable for use with mobile devices.
Even so, if some data can be exported or stored on mobile devices, it may still leave the factory. Mobile devices may also contain sensitive information, such as VPN connection information, cached credentials, two-factor authentication applications, etc. If a device is lost, it is crucial to erase industrial applications and terminate factory access. Fortunately, this is standard practice today. For example, Apple devices have mobile device management features, allowing businesses to remotely erase phones or tablets if lost or stolen. Furthermore, VPN access and user credentials can be disabled, preventing external access to the factory. OT and IT can work together to identify risks and develop action plans. This is already standard practice in the IT field and needs to be adopted in the industrial sector.
Disclaimer: This article is a reprint. If it involves copyright issues, please contact us promptly for deletion (QQ: 2737591964). We apologize for any inconvenience.