Physical Security and Cybersecurity Overview

Everyone knows that physical security and cybersecurity is an issue – businesses, government and individuals who rely on the Internet are constantly exposed to risk from cyber-attack. A recent report by PWC indicates that 81% of CEOs in Canada says cyber threat are their top business concern. Report from: PWc 21st CEO survey 2018: Canadian Insights.

Yet, due to the hostile threat environment, it's only a matter of time before all businesses will one day encounter a information or physical breach. It is no longer an option to only have a good and effective cyber-attack and physical security response plan.

Security breaches of any type and size can result in:

  • substantial financial losses;
  • negative impact on an organisation’s reputation;
  • erode customer brand loyalty; and
  • attract negative press or even threaten large corporate deals and acquisitions.

Every 40 seconds a company gets compromised by an external attack!

PWc 21st CEO survey 2018

Who is
7 Point 8 Sdn. Bhd.

In response to the rapid infiltration of cyber and physical threats and the shortage of experienced resources 7 point 8 Sdn. Bhd. was formed as a specialist cybersecurity and physical security Malaysian company and a partner you can trust. Our cybersecurity and physical security professionals are industry’s best with highly technical skills and are part of the international security community in Malaysia helping clients manage complex security challenges with a business-focused approach.

Our professional team have access to the latest local and global information sources to predict and prevent attacks, as well as understand the cyber and physical attackers, from sophisticated espionage teams, to cyber and physical criminals perpetrating a new fraud, to hacktivists wanting to embarrass organisations.





What do we provide

At 7 Point 8, cyber security is everything we do.
We offer cyber security consultancy, training and services, including but not limited to the following:

Web application pen test and physical crisis management

Our professional team can design an integrated information and physical security ecosystem that optimizes investment while protecting your key assets.

Computer and physical fraud forensics including physical security training.

Managed physical security services and cybersecurity for protective monitoring and analysis, giving you protection via our partner network of Professional Security partners

Risk and vulnerability assessments, security improvement plans, compliance checks, insider physical  threat analysis, threat trends, training services, recovery planning and physical security audits.

Social and physical security service audit and assessment







Physical security addresses the design, implementation, and maintenance of countermeasures that protect the physical resources of an organisation. In the physical environment a potential act of human error or failure can be hazardous and fatal. A compromise to intellectual property can include an employee without an appropriate security clearance copying a classified marketing plan. A deliberate act of espionage or trespass by a competitor sneaking into a facility with a camera is a possibility.

Deliberate acts of sabotage or vandalism can be physical attacks on individuals or property with the intent to sabotage or deface. Examples include employees stealing computer, valuable equipment and items, passwords, and laptops. Acts of God include lightning hitting a building and causing a fire through to taking company VIP as hostages, are all real physical security threats confronting any organisation.


7 POINT 8 Sdn Bhd in partnership with Atlas Solutions Sdn Bhd will be conducting a hands on work shop on Cyber Security Essentials.

 Workshop Details

Location   :  PJ HILTON
Date   : 29th - 30th April 2019
Time  : 9.00am to 5.00pm
Duration  : Total of 2 days session
Fees  : RM3,000 net per person (inclusive of materials, coffee breaks and lunch)

For details and booking please visit website or email .

For more information please call Jeffrey (01126148233), Angeline (0109811595)

Registration Form

Please make cheque payable to 7 Point 8 Sdn Bhd or bank transfer to:-

7 Point 8 Sdh Bhd
CIMB Bank Berhad
Acc.No: 80-0953446-5


Mr. Kenneth Davey

Kenneth has a career spanning more than 40 years in leadership, investigation, risk and crisis management, as well as in strategic roles with the Hong Kong Police, including 5 years as commander of Hong Kong’s maritime port security and policing. He specializes in threat identification and risk analysis; strategic and operational security management: full-cycle security auditing; crisis management; and business continuity planning.

Kenneth has direct corporate experience in developing and implementing Concept Of Operations (CONOPS), security management and contingency planning frame works, as well as in designing and running crisis response and management exercises. He has also planned and managed executive security programs and schedules for VVIP visits to Hong Kong.

Kenneth has extensive experience in developing teams and individuals as an instructor and coach in law, operational procedures, leadership, tactics, incident response, security assessment, and operational planning.

During the last 3 years in the Police as a chief superintendent, he served as change management and service improvement consultant to the Hong Kong Police Force, and as service development adviser to the Commissioner of Police and Senior Directorate Group. Directly in this role Kenneth was responsible for performance review, strategy development, inspections and research; with specific portfolios on strategic direction, service development, enterprise and policy risk, community and social media engagement, and culture change.

Following his retirement from the Hong Kong Police Force, Kenneth has undertaken a number of security and risk mitigation projects as an independent consultant, including a 2-year assignment providing corporate security advice and security development for the Secretariat of the Hong Kong Legislative Council; conducting a full-cycle security audit and threat identification study for the Hong Kong Baptist University; as well as a 2-year secondment, during his Police service, providing law enforcement advice and strategic security management services for the Hong Kong International Airport security operator.

Whilst serving in the Hong Kong Police Kenneth was awarded the Hong Kong Police Medal for Meritorious Service by the Hong Kong SAR, for his devotion to duty, and Hong Kong Police Long Service Medal (3rd Clasp) for distinguished service.

Kenneth has undertaken a wide range of risk management training courses, including Strategic Aviation Security Management (AVSECO HK), United Kingdom Department for Transport Level 3 Aviation Security Management, Strategic Planning, TQM and Risk Management (Senior Command Course, Royal Malaysian Police), Crisis and Critical Issues Management (Hong Kong Government) Project Development, Planning and Management (PRINCE) (Hong Kong Government), Risk Management (United Kingdom Institution of Occupational Safety & Health) and Health & Safety Risk Assessment (OS&H Council, Hong Kong). He has studied Terrorism Studies with the University of St Andrews (United Kingdom).

Kenneth speaks and writes English and speaks Cantonese

Mr Robert Youill

This Is A Specially Designed Practical Workshop For Malaysian Physical Security Professionals

By the end of the workshop/training session, participants will be aware of:

  • Various type of threats
  • Office security and crime prevention
  • In house & external criminals and terrorist threats
  • How to improve team capability and plan mitigate risks
  • Principles of investigation
  • Outline limitations of private sector investigations
  • Key competence areas required for practioners in private/corporate investigations

Common myths and perceptions
about physical security and cybersecurity

My computer/server have the best antivirus installed

Cybersecurity: Although there are not many news of malware infection on Linux or Macs as in Windows, it does not mean it is safe. Malware coders just prefer and more interested to disrupt and attack Windows based workstations. Your antivirus is as good as the last update and there are no signatures for all the malicious codes in the world known to the majority.

Physical Security :  Having security guards at the door/gates is not sufficient,  security guards at best is a deterrent against entering the office premise and perform data/information theft and physical damage 

Only large corporations are more vulnerable to cyber attacks

Cybersecurity : While this is true, it is a known fact that the best method to access smaller enterprises is through their IT contractors and service providers because they have easy access to their computer network.

Physical Security : Visitors and Contractors who register their details before entry is only as good as a name database and will not be able to ascertain their ulterior motives  - if any

My password has far too many permutations to guess

Cybersecurity : There are no passwords that is too difficult to crack.

Physical Security: Internal staff are honest and loyal to the company, therefore there is no need to have doubts on staff

My network monitoring system will alert me of every problem

Not quite! The most common form of cyber attacks is via email “phishing attack”. Attackers uses the application layer to gain access to the network .This is only one of several reasons that trusting only on the network monitoring system isn’t enough to protect it. You need to have protocols in place to protect the access to the network. It starts with the simplest one, physical access.

Cyber attacks are always from the outside. All internal staff inside the company can be trusted.

Cybersecurity : Most emails received by internal staff have either an attachment or an external link to the outside network already exposing an entry into the company’s workstation

Physical Security : Disgruntled staff and contractors are known to be one of the weakness in any organisation to not be wary about within the organisation

My PCs and servers are encrypted

Cybersecurity : 90% of small companies usually share same account with super administrative privileges which leads to weak protection. This results in creating a backdoor for social engineering and accessing those systems without too much effort. Disgruntled employees are normally perfect candidates.

Physical Security : Competitors may have relatives or friends who may undertake commercial espionage activities within the organisation passing valuable strategic business plans and activities 


011-2614 8233 / 010-981 1595

No. 79A & 79B. 1st & 2nd floor, Jalan SS21/37, Damansara Utama,
47400 Petaling Jaya, Selangor



Sorry. No right click!