Physical Security and Cybersecurity Overview

Everyone knows that physical security and cybersecurity are dangerous issues for any organisations – businesses, government and individuals who have physical assets and rely on the Internet are constantly exposed to terrorist and cyber-attack. A recent report by PWC indicates that 81% of CEOs in Canada says cyber threat are their top business concern. Report from: PWc 21st CEO survey 2018: Canadian Insights.

Yet, due to the hostile threat environment, it's only a matter of time before all businesses will one day encounter a physical compromise or information breach. It is no longer an option to only have a good and effective physical security compromise or a cyber-attack response plan.

Security breaches of any type and size can result in:

  • substantial financial losses;
  • negative impact on an organisation’s reputation;
  • erode customer brand loyalty; and
  • attract negative press or even threaten large corporate deals and acquisitions.

Every 40 seconds a company gets compromised by an external attack!

PWc 21st CEO survey 2018

Who is
7 Point 8 Sdn. Bhd.

In response to the rapid infiltration of physical and cyber threats and today's shortage of experienced  security resources, 7 point 8 Sdn. Bhd. was formed as a One Stop Shop physical and cybersecurity partner you can trust. Our physical and cybersecurity security professionals are industry’s best with highly technical skills and are part of the international security community in Malaysia helping clients manage complex security challenges with a business-focused approach.

Our professional team have access to the latest local and global information sources to predict and prevent attacks, as well as understand the physical and cyber attackers, from sophisticated industrial espionage teams, hacktivist and criminals perpetrating a new fraud, to terrorist wanting to embarrass or hijack organisations with extreme demands both for financial and political motives

 

 

 

KNOW MORE ABOUT OUR SERVICES

What do we provide

7 Point 8 is a One Stop Shop offering PHYSICAL & CYBER SECURITY products and services. SECURITY is everything we do.
We offer physical and cyber security consultancy, training and services, including but not limited to the following:

CYBER SECURITY

Web application pen test

Server hardening management consulting

Malware & reverse engineering training

Systems hardening & forensics foot print/auditing 

PHYSICAL BARRIER SECURITY (SMART PARKING SYSTEMS)

Our professional team can design an integrated information and physical security ecosystem that optimizes investment while protecting your key assets.

Multi level Intelligent Barrier Systems

( RFID & LPR - Licence Plate Recognition System )

COUNTER TERRORISM TRAINING, CLOSE PROTECTION/SELF DEFENSE

Physical Safety including  industrial espionage & corporate terrorism 

Close protection and self defense, including drone attacks in sensitive and life threatening locations

CCTV 24/7 MONITORING SERVICES

Managed physical security services and cybersecurity for protective monitoring/analysis,

Comprehensive 7/24 protection via our network of Professional Security and international partners

Smart Face Recognition CCTV systems including Smart Security Access Cards

COMPLIANCE, SECURITY, SAFETY AUDIT & ASSESSMENT

Risk and vulnerability assessments, security improvements, compliance checks, insider threats, system recovery planning, business continuity plans including market intelligence survey and management reports. 

SOCIAL MEDIA SECURITY / PREVENTIVE PHISING SECURITY INTRUSION

Social media security service audit including external and competitors threat assessments

Website defacement and phising

Corporate website loickdown and ransom threats & privacy settings

Preventive email spamming including DOS, trojan & malwares

Training

logo   

NEXT SECURITY TRAINING WILL BE ANNOUNCE SHORTLY

NEXT SECURITY COURSE WILL BE ANNOUNCED SHORTLY 

Background

TBA.

COURSE OVERVIEW

TBA

  

Location   :  TBA
Date   : TBA
   : TBA
Duration  : TBA
Fees  : TBA                                                                                     

For details and booking please visit website www.7point8.com.my or email jeff@7point8.com.my aongkunik@7point8.com.my .

For more information please call Jeffrey (01126148233), Angeline (0109811595)

Registration Form

Please make cheque payable to 7 Point 8 Sdn Bhd or bank transfer to:-

7 Point 8 Sdh Bhd
CIMB Bank Berhad
Acc.No: 80-0953446-5

COURSE DIRECTOR

Mr. XX

Daniel is a current team leader in the Australian Army whose responsibilities include training, intelligence gathering and operations. His specialisation is integration as part of a skilled team and leading them to deliver the desired results. He is also a versatile and experienced security and risk management professional.

Having instructed a number of courses in both the corporate in military world, Daniel’s forte is merging military discipline into corporate structure through the delivery of robust courses relevant to the corporate sector.

He holds a Bachelor’s Degree in Business, and multiple certifications in the security industry including the UK Government’s SIA Level 3 Close Protection Qualification, Cert III Security Operations (Australian government), Cert IV Project Management Practice, Cert IV Security and Risk Management, Cert IV Frontline Management.

Mr. XX

Next Security Course Will Be Announce Shortly

 

By the end of the training session, participants will be aware and have a better understanding of the    following:XXXXXXX

Next Security Course Will Be Announce Shortly

 

By the end of the training session, participants will be aware and have a better understanding of the    following:XXXXXXX

Common myths and perceptions
about physical security and cybersecurity

My computer/server have the best antivirus installed

Cybersecurity : Although there are not many news of malware infection on Linux or Macs as in Windows, it does not mean it is safe. Malware coders just prefer and more interested to disrupt and attack Windows based workstations. Your antivirus is as good as the last update and there are no signatures for all the malicious codes in the world known to the majority.

Physical Security :  Having security guards at the door/gates is not sufficient,  security guards at best is a deterrent against entering the office premise and perform data/information theft and physical damage 

Only large corporations are more vulnerable to cyber attacks

Cybersecurity : While this is true, it is a known fact that the best method to access smaller enterprises is through their IT contractors and service providers because they have easy access to their computer network.

Physical Security : Visitors and Contractors who register their details before entry is only as good as a name database and will not be able to ascertain their ulterior motives  - if any

My password has far too many permutations to guess

Cybersecurity : There are no passwords that is too difficult to crack.

Physical Security : Internal staff are honest and loyal to the company, therefore there is no need to have doubts on staff

My network monitoring system will alert me of every problem

Cyber Security : Not quite! The most common form of cyber attacks is via email “phishing attack”. Attackers uses the application layer to gain access to the network .This is only one of several reasons that trusting only on the network monitoring system isn’t enough to protect it. You need to have protocols in place to protect the access to the network. It starts with the simplest one, physical access.

Physical Security : Disgruntled staff are any organisations beggest physical threats as they have access to many confisential information specifically passwords and big data configuration & setups

Cyber attacks and physical/terrorism attacks are always from the outside. All internal staff inside the company can be trusted.

Cybersecurity : Most emails received by internal staff have either an attachment or an external link to the outside network already exposing an entry into the company’s workstation

Physical Security : Disgruntled staff and contractors are known to be one of the weakness in any organisation to not be wary about within the organisation.

My PCs and servers are encrypted

Cybersecurity : 90% of small companies usually share same account with super administrative privileges which leads to weak protection. This results in creating a backdoor for social engineering and accessing those systems without too much effort. Disgruntled employees are normally perfect candidates.

Physical Security : Competitors may have relatives or friends who may undertake commercial espionage activities within the organisation passing valuable strategic business plans and activities 

GET IN TOUCH

011-2614 8233 / 010-981 1595

enquiry@7point8.com.my

No. 79A & 79B. 1st & 2nd floor, Jalan SS21/37, Damansara Utama,
47400 Petaling Jaya, Selangor

X

Message

Sorry. No right click!