<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.powerupconnect.com/blogs/tag/security/feed" rel="self" type="application/rss+xml"/><title>Power Up Connect - Blog #security</title><description>Power Up Connect - Blog #security</description><link>https://www.powerupconnect.com/blogs/tag/security</link><lastBuildDate>Wed, 29 Apr 2026 06:15:26 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Mitigating Cybersecurity Challenges in Mobile BESS]]></title><link>https://www.powerupconnect.com/blogs/post/mitigating-cybersecurity-challenges-in-mobile-bess</link><description><![CDATA[Does mobile BESS present cybersecurity challenges? In this blog post, we explore what threats exist and how to prevent cyber issues so that your energy system stays protected.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_6qjJ8U64S3CiymWIcynFDQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_SXc1wMHUTMyaDA3gz2mz8w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ENcx8Pj2QXeIVhRchC47ZQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_0Zt9Mibz0xHtpIg4-dRPow" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_0Zt9Mibz0xHtpIg4-dRPow"] .zpimage-container figure img { width: 1039px ; height: 692.88px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Power%20Up%20Cybersecurity.jpg" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_JeUVTemDTXWJwGSvHyOIcA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p style="text-align:left;"><span>Our energy infrastructure is evolving. New technology, like </span><a href="https://www.powerupconnect.com/Mobile-Battery-Energy-Storage-System" style="color:rgb(45, 180, 45);">mobile battery energy storage systems</a><span> (BESS) is emerging, bringing renewable energy to more places than ever before.&nbsp;</span></p><div style="text-align:left;"><br/></div><p style="text-align:left;"><span>However, new technology brings new considerations. Does mobile BESS present cybersecurity challenges? In this blog post, we’ll explore what threats exist and how to prevent cyber issues so that your energy system stays protected.</span></p><div style="text-align:left;"><br/></div><p style="text-align:left;"><span style="font-weight:700;">The Growing Prevalence of Mobile BESS</span></p><p style="text-align:left;"><span>Mobile BESS units are chosen for a wide variety of use cases. From event management to disaster relief, these systems streamline energy deployment and bring extra power wherever it’s needed most. Without grid reliance, they’re also more sustainable than legacy energy options like generators.&nbsp;</span></p><div style="text-align:left;"><br/></div><p style="text-align:left;"><span>Because these systems are increasingly common, it’s all the more important to consider potential security risks.&nbsp;</span></p><div style="text-align:left;"><br/></div><p style="text-align:left;"><span style="font-weight:700;">What kinds of cybersecurity issues impact mobile BESS?</span></p><p style="text-align:left;"><span>Individually, mobile BESS is not susceptible to cyber security threats. Potential system disruptions can occur when mobile BESS is integrated with other systems. These issues can impact system performance, interrupt operations, and even lead to data breaches.</span></p><div style="text-align:left;"><br/></div><p style="text-align:left;"><span>For example, connecting mobile BESS with Internet of Things (IoT) infrastructure or smart grids can increase the chance of cyber intrusions from other devices on the IoT network. Linking mobile BESS units with control servers can also expose them to vulnerabilities.&nbsp;</span></p><div style="text-align:left;"><br/></div><p style="text-align:left;"><span style="font-weight:700;">How can we protect mobile BESS from cyber threats?</span></p><p style="text-align:left;"><span>While cyber threats are rare, it’s always better to stay informed and be proactive. To keep your mobile BESS investment protected, you should have a cyber safety plan that will mitigate risk.&nbsp;</span></p><div style="text-align:left;"><br/></div><p style="text-align:left;"><span>When connecting mobile BESS with other systems or servers, check that all components are secure and have up-to-date software. Check if any interconnected devices can be encrypted or password-protected.</span></p><div style="text-align:left;"><br/></div><p style="text-align:left;"><span>The physical mobile BESS unit should be well-maintained and kept free of damage. Following safety and testing protocols when deploying and servicing mobile BESS will keep the system resilient against attacks.</span></p><div style="text-align:left;"><br/></div><p style="text-align:left;"><span>Ensure anyone who is operating the system has been trained in cybersecurity and is aware of potential risks. You should also monitor the system after it has been deployed and regularly check for issues. If you suspect the system has been tampered with or exposed to an attack, contact your mobile BESS provider and explain the situation.</span></p><div style="text-align:left;"><br/></div><p style="text-align:left;"><span style="font-weight:700;">Protecting Our Energy Future, Together</span></p><p style="text-align:left;"><span>By understanding the potential challenges of our mobile technology, we can harness the full potential of renewable energy for a better tomorrow. We’re here to empower you with the information and resources you need to keep your community connected. If you have any questions about mobile BESS security, </span><a href="https://www.powerupconnect.com/Contact-Us" style="color:rgb(45, 180, 45);">contact our team today</a><span>.&nbsp;</span></p><p></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 20 Mar 2025 01:38:16 +0000</pubDate></item><item><title><![CDATA[Keeping Your Devices Safe: The Latest on Juice Jacking]]></title><link>https://www.powerupconnect.com/blogs/post/keeping-your-devices-safe-the-latest-on-juice-jacking</link><description><![CDATA[Over the past few months, news outlets have been spreading warnings about juice jacking, sparking distrust in public charging stations. But, the reality is that these claims were not backed up by substantial evidence.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_eRbQMESBRIyit5RrEIHseg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_mlMgXVRrRBmlhFkAmduLlA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_o3aCiIILQPqoS1Gv_qyhTg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_A5glwRtjDB_08kjSEHDZCQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_A5glwRtjDB_08kjSEHDZCQ"] .zpimage-container figure img { width: 962px ; height: 487.61px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_A5glwRtjDB_08kjSEHDZCQ"] .zpimage-container figure img { width:723px ; height:366.47px ; } } @media (max-width: 767px) { [data-element-id="elm_A5glwRtjDB_08kjSEHDZCQ"] .zpimage-container figure img { width:415px ; height:210.35px ; } } [data-element-id="elm_A5glwRtjDB_08kjSEHDZCQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/pu_juice_jacking%20-1-.png" width="415" height="210.35" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_gHskdjrJS0WLC7E3Hh-Rqg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gHskdjrJS0WLC7E3Hh-Rqg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><span style="font-size:11pt;">Last month, we discussed device security, including a recently popularized scam known as </span><a href="https://www.powerupconnect.com/blogs/post/secure-reliable-device-charging-solutions-prevent-juice-jacking"><span style="font-size:11pt;color:rgb(45, 180, 45);">juice jacking</span></a><span style="font-size:11pt;">. If you’re not familiar with the term, it’s a form of cyber hacking that’s said to occur when devices are plugged into a public charging station, such as those found in airports and hotels.</span></p><p style="text-align:left;"><span style="color:inherit;"><span><br></span></span></p><p style="text-align:left;"><span style="font-size:11pt;">While it's always important to protect yourself and your devices, you do not need to be concerned about juice jacking when using Power Up products.&nbsp;</span></p><p style="text-align:left;"><span style="color:inherit;"><span><br></span></span></p><p style="text-align:left;"><span style="font-size:11pt;font-weight:700;">Juice Jacking: Fact or Myth?</span></p><p style="text-align:left;"><span style="font-size:11pt;">Over the past few months, news outlets have been spreading warnings about juice jacking, sparking distrust in public charging stations. But, the reality is that these claims were not backed up by substantial evidence.&nbsp;</span></p><p style="text-align:left;"><span style="color:inherit;"><span><br></span></span></p><p style="text-align:left;"><span style="font-size:11pt;">In fact, it’s possible that there have not been any cases of juice jacking on a personal device at all. </span><a href="https://arstechnica.com/information-technology/2023/05/fearmongering-over-public-charging-stations-needs-to-stop-heres-why/"><span style="font-size:11pt;color:rgb(45, 180, 45);">Some sources cite</span></a><span style="font-size:11pt;"> that these types of attacks only occur in specific, targeted scenarios, such as government devices. This means that your personal cell phone or laptop is more than likely not a target for juice jacking.&nbsp;</span></p><p style="text-align:left;"><span style="color:inherit;"><span><br></span></span></p><p style="text-align:left;"><span style="font-size:11pt;font-weight:700;">Security At Power Up</span></p><p style="text-align:left;"><span style="font-size:11pt;">Remember, Power Up products are not at risk for juice jacking or any related security concern. All Power Up charging equipment uses power-only cords, so juice jacking or data transfers cannot occur.&nbsp;</span></p><p style="text-align:left;"><span style="color:inherit;"><span><br></span></span></p><p style="text-align:left;"><span style="font-size:11pt;">If you're using a charging station with standard power wires, your devices shouldn't be at risk. The cables that connect a device and any standard power station are designed to only pass power – not data. That means that data cannot be sent from the charging station onto your phone or vice versa. Plus, if your phone is plugged into standard cables, it will give a notice asking whether you “trust” the device, just like when you plug your phone into a computer.</span></p><p style="text-align:left;"><span style="color:inherit;"><span><br></span></span></p><p style="text-align:left;"><span style="font-size:11pt;font-weight:700;">Connect With Us</span></p><p style="text-align:left;"><span style="font-size:11pt;">It’s our goal to share the latest industry news with our customers so that you can stay aware and informed. If you have any questions about device security or our products, please feel free to contact us. Our knowledgeable team is here to help keep your devices safe and keep you connected.</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 23 May 2023 00:44:06 +0000</pubDate></item></channel></rss>