E-mobility security firm Juice Technology gains ISO 27001 certification for cybersecurity

Juice Technology AG, producer of electric charging stations and software and a specialist in mobile charging stations for electric vehicles, has seen the benefits of the high priority it has reportedly placed on cybersecurity. Official certifying body, ISO has rewarded these efforts with a new certification.

Many companies fail to recognise the threats posed by cyberattacks, according to Juice Technology. “Our robust, systematic software orientation and associated approaches of ‘Software First’ and ‘Security-by-Design’ set us apart from other firms in the industry. The security aspect is an inherent part of our product planning and development,” states Christoph Erni, CEO of Juice Technology AG.

By certifying to the international standard ISO/IEC 27001, the Swiss-based technology company is now also making its security efforts outwardly known. This is of high interest to customers, business partners and investors, who can therefore not only bank on acquiring reliable, compliant and physically secure charging stations, but also have verified proof that the company sets great store in IT security.

Compliance with the international standard ISO/IEC 27001 is considered the most important cybersecurity certification worldwide. It demonstrates that measures for ensuring information security and data protection have been implemented, and are regularly monitored and reviewed.

This proof is of essential importance to businesses involved in high levels of innovation, as their intellectual property is their actual capital. Yet, information security is a matter of concern for the company’s entire network. Ultimately, business partners, customers, investors and, of course, the users of services and charging infrastructure trust that Juice is handling their data securely.

Cybersecurity enhances protection at charging station manufacturers

As the demands placed on information security steadily grow, ISO certification is an essential step for Juice to strengthen protection against risks, and yet it’s just part of a vital strategy that is taking shape because cybersecurity is so highly important to electric mobility in particular.

This is why Thomas R. Kohler entrepreneur, university lecturer, cybersecurity and data protection expert and member of the board of directors of Juice Technology AG points out that, “A lot of vending machines are better protected than charging stations. The possibilities for cyberattack are many and varied, and not very complex, either. An attacker can cull or manipulate data in poorly secured electronics, and thereby take control of the system and misuse it for all kinds of criminal activities.”

The world of electric mobility is booming. Young start-ups or purely hardware manufacturers who’ve never focused that closely on software often underestimate the diverse range of sources of cyber threats that deficient software security can pose.

“The far-reaching consequences of cyber attacks can be devastating: Besides the damage or even loss of data or failure of computers and entire systems, company operational processes are adversely impacted. The resultant loss of productivity can be dramatic not to mention the damage to the company’s image,” explains CEO Erni, the founder of Juice Technology AG. As someone who originated in the IT sector, he’s well familiar with this topic.

E-mobility security – the 3-level concept

Juice approaches electric mobility security with a comprehensive, holistic concept that addresses not only mechanical security, but also application security and data security in equal measure. To underscore the high priority Juice puts on cybersecurity, this innovative company is putting the topic of Cybersecurity and Charging Infrastructure front and centre at its Juice World Charging Day on Monday, 6 September 2021. CEO Christoph Erni and cybersecurity expert Professor Thomas R. Köhler will both speak on this topic. The event can be watched live online via live streaming here starting at 2:50 p.m. Central European Time.

ISO standard 27001

Compliance with the international standard ISO/IEC 27001 is considered the most important cybersecurity certification. One key requirement is documented verification that an information security management system (ISMS for short) is in place. The ISMS includes clearly defined guidelines for planning and implementing, monitoring and continuously improving information security.

Appropriate measures such as technical means and regular, centrally controlled updating aim to ensure protection against external threats. Equally important is company-internal protection, which includes controlled access to the server room, exclusion of administrator rights for staff members, and restricted access to data. Pro-active cooperation by all personnel is also important, for example to defend against phishing mail attacks.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

RECENT ARTICLES

Workz debuts unrestricted IoT device management

Posted on: May 3, 2024

Workz, a cloud-based eSIM vendor, has launched its new remote device management solution designed for the Internet of Things (IoT) industry. The platform eliminates the restrictions associated with traditional technologies

Read more

Itron improves Temetra platform for water utilities in Australia and New Zealand

Posted on: May 2, 2024

Itron expands the capabilities of its Temetra platform in Australia and New Zealand to include NB-IoT communications, enabling digital transformation for water utilities. Temetra’s comprehensive offering includes metre data processing,

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into

Read more