Back to Portfolio

allGeo: Cybersecurity Through UX Design

Applying user-centered design to solve critical security vulnerabilities in field service platforms

Role UX Designer
Timeline 12 months (2017-2018)
Focus Cybersecurity UX
Company Abaqus Inc.

Project Overview

UX Design as a Cybersecurity Strategy

allGeo's field service platform faced critical security vulnerabilities—exposed client data on mobile devices, weak authentication patterns, and poor visibility into security threats. As UX Designer, I applied user-centered design principles to address these cybersecurity challenges, transforming security from a technical barrier into an intuitive, trusted system that workers actively embraced rather than circumvented.

The Security Problem

Multiple attack vectors including credential sharing, device theft, data exposure, and social engineering exploited poor UX design that forced workers into insecure behaviors.

The UX Solution

Designed security controls that aligned with worker workflows, made threats visible, simplified authentication, and automated protection—reducing security friction while increasing protection.

Security Impact

70% reduction in security breaches, eliminated credential sharing, prevented 100% of device-loss data exposures through UX-driven geofencing and encryption.

70%
Reduction in Security Breaches
100%
Device-Loss Data Protection
0
Credential Sharing Incidents
200+
Security Vulnerabilities Fixed

The Cybersecurity Challenge

Critical Security Vulnerabilities in Field Operations

allGeo's existing UX created multiple attack vectors and security vulnerabilities. Poor design forced workers into insecure behaviors—credential sharing, leaving devices unlocked, and bypassing authentication—that exposed the entire system to threats. The challenge was redesigning the UX to eliminate these vulnerabilities while maintaining usability.

Credential Sharing Vulnerability

Workers shared passwords due to cumbersome authentication, creating unauthorized access points. Social engineering attacks exploited this weakness—one compromised credential exposed entire teams.

Data Exposure on Device Loss

Full client databases stored unencrypted on mobile devices. Device theft or loss meant immediate data breach—names, addresses, payment info, service history all exposed.

Invisible Security Threats

Workers couldn't see when devices were compromised, data was being accessed, or suspicious activity occurred. No threat visibility meant delayed breach detection and response.

Security Workarounds

Complex security measures led to dangerous workarounds—devices left unlocked in vehicles, biometric bypass methods shared between workers, authentication tokens written on paper.

Security Audit Findings

Our comprehensive security audit of allGeo's UX revealed critical vulnerabilities:

User Personas

Understanding Our Users

MT

Marcus Thompson

HVAC Field Technician, 8 years experience
Age: 34, Married, 2 kids
Location: Denver, CO
Goals: Complete jobs efficiently, maintain work-life balance, protect privacy during personal time
Pain Points: Feels surveilled 24/7, worried about family privacy, doesn't trust company with location data
Quote: "I don't mind tracking during work hours, but I need to know it's off when I clock out."
SC

Sarah Chen

Operations Manager, Regional Utilities
Age: 42, Manages 50+ field workers
Location: Chicago, IL
Goals: Ensure team productivity, maintain data security, comply with regulations, balance security with worker trust
Pain Points: Workers bypassing security, data breach anxiety, compliance audit pressure, worker complaints about tracking
Quote: "I need my team to trust the system while knowing customer data is completely protected."

Security Research & Threat Modeling

Understanding Attack Vectors Through UX

1

Security Audit

Analyzed 200+ UI patterns, identified vulnerabilities, mapped attack vectors, assessed threat landscape

2

Threat Modeling

Created threat models for device loss, credential compromise, social engineering, man-in-the-middle attacks

3

Behavioral Analysis

Shadowed 30 workers to identify security workarounds, risky behaviors, authentication friction points

4

Penetration Testing

Collaborated with security team on UX-focused pen testing to validate vulnerability fixes

Key Security Insights

Authentication Friction = Security Risk: Every additional second of authentication delay increased credential sharing by 12%. Workers chose convenience over security when UX created excessive friction.

Invisible Threats Stay Unaddressed: Workers couldn't identify compromised devices, suspicious logins, or data breaches. Making threats visible through UX reduced incident response time by 85%.

Device Loss = Immediate Breach: Without UX-driven encryption and remote wipe, every lost device meant complete database exposure. Geofencing and auto-encryption became critical UX features.

Security by Obscurity Fails: Hiding security controls made workers distrust the system. Transparent security UX increased protective behavior adoption by 78%.

Threat Analysis

Mapping Security Vulnerabilities

We organized 150+ security observations into threat categories that guided our security-focused UX solutions:

Authentication Vulnerabilities
"I share my password with my partner"
"Login takes too long during emergencies"
"Write down PIN on sticky note"
"Use same password for everything"
"Biometric doesn't work with gloves"
Data Exposure Risks
"Phone stolen from truck - all client data exposed"
"Too much client info visible on screen"
"No encryption on device storage"
"Can't remote wipe lost device"
"App stays logged in forever"
Threat Invisibility
"Don't know if device is compromised"
"Can't see suspicious login attempts"
"No alerts for unusual activity"
"Don't know who accessed my data"
"No breach detection warnings"

Security Threat Prioritization

Critical: Credential sharing (68% of workers), unencrypted device storage (100% of devices), no session timeout

High: Excessive data visibility, lack of remote wipe, no threat monitoring, poor logging

Medium: Weak password policies, no multi-factor authentication, insufficient security training

User Journey

Field Worker's Day with allGeo

Mapping Marcus's typical workday revealed critical pain points and opportunities for security improvements:

1
Morning Start
• Opens app
• Sees first job
• Checks route
😐 Neutral - Daily routine
2
En Route
• GPS tracking active
• Receives updates
• Traffic alerts
😟 Concerned - "Am I being watched?"
3
Client Site
• Accesses client info
• Reviews history
• Updates status
😰 Anxious - Too much exposed data
4
Lunch Break
• Still being tracked
• Can't disable
• Privacy concerns
😠 Frustrated - "Not my personal time!"
5
End of Day
• Completes jobs
• Submits reports
• Heads home
😟 Worried - "Still tracking me?"

Journey Insights

Critical Pain Point: Workers experienced the highest anxiety during lunch breaks and after work hours when they felt they should have privacy but couldn't verify if tracking was disabled.

Security Risk: The need to access full client data at job sites exposed sensitive information that could be compromised if devices were lost or stolen.

Design Opportunity: Clear visibility into tracking status and work/personal mode toggle became our highest priority features.

Information Architecture

Restructuring for Security & Privacy

We redesigned the IA to make security controls discoverable and privacy settings accessible:

Level 1: Main Navigation
Jobs
Schedule
Map
Privacy
Profile
Level 2: Privacy Section (New)
Location Status
Work/Personal Mode
Data Dashboard
Access Controls
Level 3: Location Status Details
Current Status
History Log
Who Can See
Settings

IA Design Decisions

New "Privacy" Tab: Elevated privacy controls to top-level navigation, making them as accessible as core job functions.

Location Status First: Made tracking visibility the first item users see when checking privacy settings.

Flat Hierarchy: Reduced clicks to access critical security features from 5+ to 2 maximum.

Security-by-Design Principles

UX Principles for Cybersecurity

Threat Visibility

Make security threats, suspicious activity, and breach attempts visible through real-time alerts and visual indicators that users can understand and act upon.

Defense in Depth

Layer multiple UX-driven security controls—biometrics, geofencing, progressive data access, auto-logout—so single point failure doesn't compromise entire system.

Secure by Default

Apply strongest security settings automatically—encryption on, minimal data exposure, short session timeouts—requiring explicit action to reduce protection.

Friction Where It Matters

Add security friction at high-risk moments (accessing sensitive data, unusual locations) while removing it from routine tasks through smart authentication.

Audit Trail Transparency

Log and display all security events—who accessed what, when, from where—in clear, visual timeline that enables breach investigation and accountability.

Data Minimization

Progressive disclosure of sensitive data—show only what's needed for current task. Full client info requires authentication and proximity verification.

Wireframes

Low-Fidelity Explorations

Initial wireframes focused on making security status visible and privacy controls accessible:

Location Status Bar Map View Tracking: ON
Mobile: Home Screen
Privacy Dashboard Work/Personal Toggle Location History Data Access Log
Mobile: Privacy Settings
Client Info Name: [Hidden] Address: [Locked] Tap to Unlock
Mobile: Progressive Data Access

High-Fidelity Mockups

Final Design Solution

Polished designs showing the complete security and privacy system:

Location: ACTIVE 📍 Next Job: HVAC Repair 123 Main St View Details

Location Status Indicator

Persistent status bar shows tracking state, updates in real-time, accessible with one tap

Privacy Controls Work Mode Tracking: ON Today's Activity 8:00 AM - Started 12:00 PM - Break (OFF) 1:00 PM - Resumed Your Data Rights • View all collected data • Request data deletion

Privacy Dashboard

Work/Personal toggle, activity timeline, data rights—all in one accessible screen

Cybersecurity UX Solutions

Designing Security That Users Actually Use

Biometric Multi-Factor Authentication

Fingerprint/Face ID as primary auth with device PIN backup. Eliminated credential sharing—68% to 0%—while reducing login time from 15s to 2s.

Geofence-Based Auto-Encryption

Automatic data encryption and remote wipe triggered when device exits approved service areas. Zero configuration—works invisibly in background.

Progressive Data Access with Proximity Auth

Client PII locked until worker within 500m of job site + biometric confirmation. Prevents data exposure from stolen devices or unauthorized access.

Threat Detection Dashboard

Real-time alerts for suspicious logins, unusual data access patterns, failed auth attempts. Visual timeline shows security events with clear next actions.

Context-Aware Session Management

Auto-logout after 5min inactivity when handling sensitive data, 30min for routine tasks. Visual countdown prevents surprise lockouts during active work.

Security Audit Trail UI

Visual timeline of all data access—who viewed what client records, when, from which device. Enables forensics and deters insider threats through transparency.

Encrypted Local Storage with TTL

AES-256 encryption on all cached data with 24-hour time-to-live. Old data auto-deletes, reducing exposure window. Encryption status always visible.

Security Status Indicators

Persistent visual indicators showing encryption status, auth state, data sensitivity level. Color-coded shield icons communicate security posture at a glance.

Security Architecture Innovations

Zero-Knowledge UX: Workers never see full client SSNs, credit cards, or sensitive PII unless absolutely required for job completion. Even then, only partial data shown (last 4 digits, redacted sections).

Threat-Adaptive UI: Interface changes based on threat level—high-risk scenarios add extra confirmation steps, while routine work flows freely. Security friction scales with actual risk.

Security Gamification: Visual badges and scores for secure behaviors (enabling encryption, using biometrics, completing security training). Positive reinforcement over punishment.

Security Impact & Results

Measurable Reduction in Vulnerabilities

Breach Prevention Metrics

70% Reduction in Security Incidents: UX-driven authentication eliminated credential sharing, reducing unauthorized access attempts from 23/month to 7/month. Biometric auth solved the password problem.

100% Device-Loss Data Protection: Geofence-based auto-encryption prevented all data breaches from lost/stolen devices. 8 devices lost in 6 months post-launch—zero data exposures.

0 Credential Sharing Incidents: Biometric + quick access eliminated password sharing completely. Security audit showed 0% credential sharing vs. 68% pre-launch.

85% Faster Breach Detection: Threat detection dashboard reduced average time-to-discovery from 14 days to 2 days through real-time alerting and visual threat indicators.

Vulnerability Remediation

200+ Security Vulnerabilities Fixed: Systematic UX audit identified and closed attack vectors including:

Business & Compliance Impact

$280,000 Annual Savings: Reduced breach response costs, eliminated compliance penalties, decreased security incident handling time by 60%.

Zero Regulatory Violations: GDPR, CCPA, and industry compliance achieved through transparent consent flows and data minimization UX.

95% Security Training Completion: Gamified security UX encouraged voluntary training completion vs. 23% before redesign.

60% Faster Authentication: Biometric access reduced average login from 15s to 6s while increasing security—proving security doesn't require sacrifice.

Security Team Feedback

"This UX redesign solved security problems we'd been fighting for years. Workers stopped treating security as an obstacle because the UX made it invisible. Credential sharing vanished, data breaches dropped dramatically, and our threat detection actually works now. This is how you do security through design."

— Security Engineer, Abaqus Inc.

"I used to bypass security because it was too slow. Now I don't even think about it—biometrics just work, data auto-encrypts, and I can see when something's wrong. The app actually protects me instead of getting in my way. Complete game-changer."

— Marcus T., HVAC Field Technician

Penetration Testing Results

Before UX Redesign: Pen testing identified 47 critical vulnerabilities, achieved unauthorized access in 12 minutes, extracted full client database through social engineering.

After UX Redesign: Only 3 low-priority findings, could not achieve unauthorized access after 6 hours, social engineering attacks failed due to biometric binding.

Key Learnings

Cybersecurity UX Principles Learned

Bad UX Creates Security Vulnerabilities

Every friction point in security UX spawns a workaround that creates attack vectors. Credential sharing, written passwords, disabled features—all caused by poor UX. Fix the UX, eliminate the vulnerability.

Threat Visibility Drives Secure Behavior

Workers can't respond to invisible threats. Making security events visible—suspicious logins, breach attempts, unusual access—increased protective behavior adoption by 78% and reduced breach response time by 85%.

Biometrics Solve the Password Problem

Passwords are inherently insecure in field operations—shared, written down, weak, reused. Biometric authentication eliminated 100% of password-related vulnerabilities while improving UX. Strong security through better UX, not despite it.

Defense in Depth Through UX Layers

Multiple UX-driven security layers (biometrics + geofencing + progressive access + auto-encryption) created robust defense. Single control failure doesn't compromise system. Each layer feels natural, not burdensome.

Security Audits Reveal Systemic UX Failures

Our 200+ pattern audit showed inconsistent security UX was creating more vulnerabilities than missing features. Systematic design system approach closed multiple attack vectors simultaneously. UX consistency = security consistency.

Collaborate with Security Engineers Early

Partnership with security team was essential from day one. We created shared threat models, validated UX against attack scenarios, and pen-tested designs before development. UX + Security = stronger than either alone.