With the ISO27001 certification, Juice Technology AG receives proof of information security and data protection

Juice Technology AG, a manufacturer of charging stations and software and a leader in mobile charging stations for electric vehicles, has always attached great importance to cybersecurity. Now its efforts have been officially confirmed.

The dangers posed by cyber attacks are misunderstood by many companies - but not by Juice Technology. "We differentiate ourselves from other companies in the industry through our consistent software orientation and the associated 'Software First' and 'Security by Design' approaches. The security aspect is an integral part of our product planning and development," says Christoph Erni, CEO of Juice Technology AG.

With certification according to the leading international standard ISO/IEC 27001, the technology company is now making its security efforts visible to the outside world. This is of great importance to customers, business partners and investors. They can be confident that they are not only purchasing a flawless, physically secure charging station, but also have proof that IT security is very important to the company.

The international standard ISO/IEC 27001 is considered the most important cyber security certification in the world. It shows that measures have been taken to ensure information security and protect data and that these are regularly checked. This proof is essential for companies with a high degree of innovation, as the intellectual product is their real capital. However, information security affects the entire company network. After all, partners, customers, investors and of course users of services and charging infrastructure trust that their data is safe with Juice.

Cybersecurity provides more protection for charging station manufacturers

Because the requirements for information security are constantly increasing, ISO certification is an important step for Juice towards greater protection against risks, but only part of an important strategy that is currently being developed. Cyber ​​security is particularly important for e-mobility. Thomas R. Köhler, entrepreneur, lecturer and expert in cyber security and data protection as well as a member of the board of directors of Juice Technology AG, therefore raises concerns: "Many vending machines are better protected than charging stations. The attack options are diverse and not even particularly complex. An attacker can read or manipulate data in poorly secured electronics, gain control of the system and use it for all kinds of criminal activities."

Electromobility is experiencing a boom. The diverse sources of danger posed by inadequate software security are often underestimated by young companies or pure hardware manufacturers who have previously had little focus on software. "The effects of a cyber incident are far-reaching: Aside from the damage or loss of data or the failure of computers and systems, operational processes are also affected. The resulting loss of productivity can be dramatic - not to mention the damage to the company's image," says Christoph Erni, founder and CEO of Juice Technology AG. As someone who comes from the IT industry, he is very familiar with this topic.

E-Mobility Security – the 3-Level Concept

Juice views the security of electromobility as a holistic concept that includes not only mechanical security but also application security and data security. To underline the high importance that Juice attaches to cybersecurity, the innovative company is focusing on the topic of cybersecurity and charging infrastructure on Juice World Charging Day on Monday, September 6, 2021. In addition to CEO Christoph Erni, cybersecurity expert Prof. Thomas R. Köhler will also speak on this topic. The event can be followed from 2:50 p.m. via the live stream on www.juice-world.com/jwcd .


ISO standard 27001:

The international standard ISO/IEC 27001 is considered the most important cyber security certification. As a central measure, it provides documented evidence of an information security management system (ISMS for short). This contains clear guidelines for the planning and implementation, monitoring and continuous improvement of information security. Protection against external threats should be ensured through suitable measures, for example technical means such as regular, centrally controlled updates. Internal protection is just as important, which includes regulated access to the server room, the exclusion of administrator rights for employees or access restrictions to data. But the active participation of all employees is also part of it, for example in fending off phishing emails.