Physical Security and Cybersecurity Overview

Everyone knows that physical security and cybersecurity are dangerous issues for any organisations – businesses, government and individuals who have physical assets and rely on the Internet are constantly exposed to terrorist and cyber-attack. A recent report by PWC indicates that 81% of CEOs in Canada says cyber threat are their top business concern. Report from: PWc 21st CEO survey 2018: Canadian Insights.

Yet, due to the hostile threat environment, it's only a matter of time before all businesses will one day encounter a physical compromise or information breach. It is no longer an option to only have a good and effective physical security compromise or a cyber-attack response plan.

Security breaches of any type and size can result in:

  • substantial financial losses;
  • negative impact on an organisation’s reputation;
  • erode customer brand loyalty; and
  • attract negative press or even threaten large corporate deals and acquisitions.

Every 40 seconds a company gets compromised by an external attack!

PWc 21st CEO survey 2018

Who is
7 Point 8 Sdn. Bhd.

In response to the rapid infiltration of physical and cyber threats and today's shortage of experienced  security resources, 7 point 8 Sdn. Bhd. was formed as a One Stop Shop physical and cybersecurity partner you can trust. Our physical and cybersecurity security professionals are industry’s best with highly technical skills and are part of the international security community in Malaysia helping clients manage complex security challenges with a business-focused approach.

Our professional team have access to the latest local and global information sources to predict and prevent attacks, as well as understand the physical and cyber attackers, from sophisticated industrial espionage teams, hacktivist and criminals perpetrating a new fraud, to terrorist wanting to embarrass or hijack organisations with extreme demands both for financial and political motives





What do we provide

7 Point 8 is a One Stop Shop offering PHYSICAL & CYBER SECURITY products and services. SECURITY is everything we do.
We offer physical and cyber security consultancy, training and services, including but not limited to the following:


Web application pen test

Server hardening management consulting

Malware & reverse engineering training

Systems hardening & forensics foot print/auditing 


Our professional team can design an integrated information and physical security ecosystem that optimizes investment while protecting your key assets and management of entry barrier gate systems.  Perimeter fence deterrent systems

Multi level Intelligent Barrier Systems

( RFID & LPR - Licence Plate Recognition System )


Physical Safety including  industrial espionage & corporate terrorism 

Close protection and self defense, including drone attacks in sensitive and life threatening locations


Managed physical security services,security glass tinting for protective monitoring of potential intruders. Comprehensive 7/24 protection via our network of Professional Security and international partners

Smart Face Recognition, Supply , install and maintenance of CCTV systems (All brands) including Smart Security Access Cards, barrier gate turnstile management systems.  We also have qualified professionals experienced in strucrured cabling management systems  


Risk and vulnerability assessments, security improvements, compliance checks, insider threats, system recovery planning, business continuity plans including market intelligence survey and management reports. 


Social media security service audit including external and competitors threat assessments

Website defacement and phising

Corporate website lockdown and ransom threats & privacy settings

Preventive email spamming including DOS, trojan & malwares

Reverse malware engineering

Fraud forensics










Location   :  TBA
Date   : TBA
   : TBA
Duration  : TBA
Fees  : TBA                                                                                     

For details and booking please visit website or email .

For more information please call Jeffrey (01126148233), Angeline (0109811595)

Registration Form

Please make cheque payable to 7 Point 8 Sdn Bhd or bank transfer to:-

7 Point 8 Sdh Bhd
CIMB Bank Berhad
Acc.No: 80-0953446-5


Mr. XX

Daniel is a current team leader in the Australian Army whose responsibilities include training, intelligence gathering and operations. His specialisation is integration as part of a skilled team and leading them to deliver the desired results. He is also a versatile and experienced security and risk management professional.

Having instructed a number of courses in both the corporate in military world, Daniel’s forte is merging military discipline into corporate structure through the delivery of robust courses relevant to the corporate sector.

He holds a Bachelor’s Degree in Business, and multiple certifications in the security industry including the UK Government’s SIA Level 3 Close Protection Qualification, Cert III Security Operations (Australian government), Cert IV Project Management Practice, Cert IV Security and Risk Management, Cert IV Frontline Management.

Mr. XX

Next Security Course Will Be Announce Shortly


By the end of the training session, participants will be aware and have a better understanding of the    following:XXXXXXX

Next Security Course Will Be Announce Shortly


By the end of the training session, participants will be aware and have a better understanding of the    following:XXXXXXX

Common myths and perceptions
about physical security and cybersecurity

My computer/server have the best antivirus installed and impossible to be stolen

Physical Security :  Having security guards at the door/gates is not sufficient,  security guards at best is a deterrent against entering the office premise and perform data/information theft and physical damage

Cybersecurity : Although there are not many news of malware infection on Linux or Macs as in Windows, it does not mean it is safe. Malware coders just prefer and more interested to disrupt and attack Windows based workstations. Your antivirus is as good as the last update and there are no signatures for all the malicious codes in the world known to the majority.

Only large corporations are more vulnerable to physical attacks and cyber intrusions

Physical Security : Large or small companies have visitors from customers and vendors.  It is only for security purpose that cisitors and contractors must register their details before entry and is only as good as a name database and will not be able to ascertain their ulterior motives  - if any

Cybersecurity : While this is true, it is a known fact that the best method to access smaller enterprises is through their IT contractors and service providers because they have easy access to their computer network.

My password has far too many permutations to guess

Physical Security : Internal staff are honest and loyal to the company, therefore there is no need to have doubts on staff - FALSE,  90% of all security compromise are from disgruntled staff and diemissed staff. Staff personal records need to be regularly updated by HR department to monitor integrity and honesty.

Cybersecurity : There are no passwords that is too difficult to crack.

My physical network monitoring system will alert me of every problem

Physical Security : Disgruntled staff are any organisations biggest physical threats as they have access to many confidential information specifically passwords and big data configuration & setups

Cyber Security : Not quite! The most common form of cyber attacks is via email “phishing attack”. Attackers uses the application layer to gain access to the network .This is only one of several reasons that trusting only on the network monitoring system isn’t enough to protect it. You need to have protocols in place to protect the access to the network. It starts with the simplest one, physical access.

Physical/terrorist and cyber attacks are always from the outside. All internal staff inside the company can be trusted.

Physical Security : FALSE: Disgruntled staff and contractors (even friendly ones, industrial espionage do happen) are known to be one of the weakness in any organisation to not be wary about within the organisation.

Cybersecurity : Most emails received by internal staff have either an attachment or an external link to the outside network already exposing an entry into the company’s workstation

My PCs and servers are encrypted and physically impossible to be removed

Physical Security : Competitors may have relatives or friends who may undertake commercial espionage activities within the organisation passing valuable strategic business plans, IP, trade secrets, marketing information and important business program and strategies

Cybersecurity : 90% of small companies usually share same account with super administrative privileges which leads to weak protection. This results in creating a backdoor for social engineering and accessing those systems without too much effort. Disgruntled employees are normally perfect candidates.


011-2614 8233 / 010-981 1595

No. 79A & 79B. 1st & 2nd floor, Jalan SS21/37, Damansara Utama,
47400 Petaling Jaya, Selangor



Sorry. No right click!