Dear Customers,

Due to recent events, we would like to specifically draw your attention to important security aspects when operating your Solar-Log™ data logger.

This notice refers exclusively to the Solar-Log™ data logger itself, meaning the physical device in your system, including the firmware installed on it. Internet portals, cloud services, or web applications are not included.

In recent months, security-related incidents in the energy and IT infrastructure have clearly shown that connected devices are increasingly becoming the focus of targeted attacks. One key takeaway is that a high level of security is not achieved by the device technology alone, but above all through proper configuration and correct use during operation. For more information, please refer to the links below*.

At Solar-Log™, we deliberately design our data loggers to be secure, reliable, and suitable for professional use. Our approach to device security, protection mechanisms, and operational responsibilities is also described in detail in our white paper “Cyber Security at Solar-Log™.”

👉Download Cyber Security at Solar-Log™ 

At the same time, we would like to remind you of the measures on the user side that are essential to maintaining this high level of security over time.

Cyber threats from state actors and organized groups are increasingly targeting decentralized energy systems – including in Germany. Local devices are particularly vulnerable when:

  • no password or an insecure password is used, or
  • dthe data logger is directly accessible from the internet (e.g., port forwarding*).

This document informs you about the key risks and outlines specific measures you can take to effectively protect your Solar-Log™ data logger.

________________________________________

The Solar-Log™ Data Logger: Secure by Design, Responsibly Operated

The Solar-Log™ data logger is technically designed to be secure and is intended for professional use in PV systems. However, maintaining a consistently high level of security requires correct configuration during operation.

When used properly—especially with:

  • active password protection,
  • up-to-date firmware installed 👉Download Firmware
  • no direct internet accessibility (port forwarding*),
  • and a secured local network,the Solar-Log™data logger can be operated reliably and with a high level of security.

________________________________________

Especially Important: A Secure Password for the Data Logger

Every connected logger should be protected with a strong, individual password. The password secures direct access to the device within your local network.

Our recommendation for a secure password:

  • at least 12 characters,
  • a combination of uppercase and lowercase letters,
  • numbers and special characters,
  • no default, repeated, or easily guessable passwords.

Please check existing passwords regularly and change them if necessary.

________________________________________

No Direct Internet Access for the Solar-Log™ Data Logger

Please ensure that your Solar-Log™data logger is not directly accessible from the internet.

*What does port forwarding mean?

Port forwarding is a setting in your internet router that forwards requests from the internet to a device in your local network—for example, the Solar-Log™ data logger. This makes the device publicly accessible.

Even though this configuration is technically possible, it significantly increases the risk of unauthorized access and does not comply with our security recommendations.

________________________________________

Your Contribution Makes the Difference

With just a few clear measures, you can make a crucial contribution to protecting your Solar-Log™ data logger and your system. At the same time, you help establish a high level of security for decentralized energy systems as a whole—especially in times of increasing digital threats.If you are a private or municipal system operator, your system installer is the right contact for further questions or support.

Further information about our security measures as well as specific recommendations can be found at:

👉 security.solar-log.com

Thank you for your attention and for your continued partnership.

Your Solar-Log™ Team

https://www.verfassungsschutz.de/SharedDocs/publikationen/DE/cyberabwehr/2026-02-cyberangriffe.html

https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a

https://cert.pl/en/posts/2026/01/incident-report-energy-sector-2025/

https://www.bsi.bund.de/DE/Service-Navi/Presse/Pressemitteilungen/Presse2025/251111_BSI-Jahresbericht_2025.html

https://www.verfassungsschutz.de/SharedDocs/publikationen/DE/praevention_wirtschafts-und_wissenschaftsschutz/2026-01-sicherheitshinweis-fuer-die-wirtschaft.html