Juice Technology AG, producer of electric charging stations and software and a specialist in mobile charging stations for electric vehicles, has seen the benefits of the high priority it has reportedly placed on cybersecurity. Official certifying body, ISO has rewarded these efforts with a new certification.
Many companies fail to recognise the threats posed by cyberattacks, according to Juice Technology. “Our robust, systematic software orientation and associated approaches of ‘Software First’ and ‘Security-by-Design’ set us apart from other firms in the industry. The security aspect is an inherent part of our product planning and development,” states Christoph Erni, CEO of Juice Technology AG.
By certifying to the international standard ISO/IEC 27001, the Swiss-based technology company is now also making its security efforts outwardly known. This is of high interest to customers, business partners and investors, who can therefore not only bank on acquiring reliable, compliant and physically secure charging stations, but also have verified proof that the company sets great store in IT security.
Compliance with the international standard ISO/IEC 27001 is considered the most important cybersecurity certification worldwide. It demonstrates that measures for ensuring information security and data protection have been implemented, and are regularly monitored and reviewed.
This proof is of essential importance to businesses involved in high levels of innovation, as their intellectual property is their actual capital. Yet, information security is a matter of concern for the company’s entire network. Ultimately, business partners, customers, investors and, of course, the users of services and charging infrastructure trust that Juice is handling their data securely.
Cybersecurity enhances protection at charging station manufacturers
As the demands placed on information security steadily grow, ISO certification is an essential step for Juice to strengthen protection against risks, and yet it’s just part of a vital strategy that is taking shape because cybersecurity is so highly important to electric mobility in particular.
This is why Thomas R. Kohler entrepreneur, university lecturer, cybersecurity and data protection expert and member of the board of directors of Juice Technology AG points out that, “A lot of vending machines are better protected than charging stations. The possibilities for cyberattack are many and varied, and not very complex, either. An attacker can cull or manipulate data in poorly secured electronics, and thereby take control of the system and misuse it for all kinds of criminal activities.”
The world of electric mobility is booming. Young start-ups or purely hardware manufacturers who’ve never focused that closely on software often underestimate the diverse range of sources of cyber threats that deficient software security can pose.
“The far-reaching consequences of cyber attacks can be devastating: Besides the damage or even loss of data or failure of computers and entire systems, company operational processes are adversely impacted. The resultant loss of productivity can be dramatic not to mention the damage to the company’s image,” explains CEO Erni, the founder of Juice Technology AG. As someone who originated in the IT sector, he’s well familiar with this topic.
E-mobility security – the 3-level concept
Juice approaches electric mobility security with a comprehensive, holistic concept that addresses not only mechanical security, but also application security and data security in equal measure. To underscore the high priority Juice puts on cybersecurity, this innovative company is putting the topic of Cybersecurity and Charging Infrastructure front and centre at its Juice World Charging Day on Monday, 6 September 2021. CEO Christoph Erni and cybersecurity expert Professor Thomas R. Köhler will both speak on this topic. The event can be watched live online via live streaming here starting at 2:50 p.m. Central European Time.
ISO standard 27001
Compliance with the international standard ISO/IEC 27001 is considered the most important cybersecurity certification. One key requirement is documented verification that an information security management system (ISMS for short) is in place. The ISMS includes clearly defined guidelines for planning and implementing, monitoring and continuously improving information security.
Appropriate measures such as technical means and regular, centrally controlled updating aim to ensure protection against external threats. Equally important is company-internal protection, which includes controlled access to the server room, exclusion of administrator rights for staff members, and restricted access to data. Pro-active cooperation by all personnel is also important, for example to defend against phishing mail attacks.
Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow