Physical Security and Cybersecurity Overview

Everyone knows that physical security and cybersecurity are dangerous issues for any organisations – businesses, government and individuals who have physical assets and rely on the Internet are constantly exposed to terrorist and cyber-attack. A recent report by PWC indicates that 81% of CEOs in Canada says cyber threat are their top business concern. Report from: PWc 21st CEO survey 2018: Canadian Insights.
Yet, due to the hostile threat environment, it's only a matter of time before all businesses will one day encounter a physical compromise or information breach. It is no longer an option to only have a good and effective physical security compromise or a cyber-attack response plan.
Security breaches of any type and size can result in:
- substantial financial losses;
- negative impact on an organisation’s reputation;
- erode customer brand loyalty; and
- attract negative press or even threaten large corporate deals and acquisitions.
Every 40 seconds a company gets compromised by an external attack!
Who is
7 Point 8 Sdn. Bhd.
In response to the rapid infiltration of physical and cyber threats and today's shortage of experienced security resources, 7 point 8 Sdn. Bhd. was formed as a One Stop Shop physical and cybersecurity partner you can trust. Our physical and cybersecurity security professionals are industry’s best with highly technical skills and are part of the international security community in Malaysia helping clients manage complex security challenges with a business-focused approach.
Our professional team have access to the latest local and global information sources to predict and prevent attacks, as well as understand the physical and cyber attackers, from sophisticated industrial espionage teams, hacktivist and criminals perpetrating a new fraud, to terrorist wanting to embarrass or hijack organisations with extreme demands both for financial and political motives
KNOW MORE ABOUT OUR SERVICES
What do we provide
7 Point 8 is a One Stop Shop offering PHYSICAL & CYBER SECURITY products and services. SECURITY is everything we do.
We offer physical and cyber security consultancy, training and services, including but not limited to the following:

CYBER SECURITY
Web application pen test
Server hardening management consulting
Malware & reverse engineering training
Systems hardening & forensics foot print/auditing

PHYSICAL BARRIER SECURITY (SMART PARKING SYSTEMS)
Our professional team can design an integrated information and physical security ecosystem that optimizes investment while protecting your key assets.
Multi level Intelligent Barrier Systems
( RFID & LPR - Licence Plate Recognition System )

COUNTER TERRORISM TRAINING, CLOSE PROTECTION/SELF DEFENSE
Physical Safety including industrial espionage & corporate terrorism
Close protection and self defense, including drone attacks in sensitive and life threatening locations

CCTV 24/7 MONITORING SERVICES
Managed physical security services and cybersecurity for protective monitoring/analysis,
Comprehensive 7/24 protection via our network of Professional Security and international partners
Smart Face Recognition CCTV systems including Smart Security Access Cards

COMPLIANCE, SECURITY, SAFETY AUDIT & ASSESSMENT
Risk and vulnerability assessments, security improvements, compliance checks, insider threats, system recovery planning, business continuity plans including market intelligence survey and management reports.

SOCIAL MEDIA SECURITY / PREVENTIVE PHISING SECURITY INTRUSION
Social media security service audit including external and competitors threat assessments
Website defacement and phising
Corporate website loickdown and ransom threats & privacy settings
Preventive email spamming including DOS, trojan & malwares
Training
NEXT SECURITY TRAINING WILL BE ANNOUNCE SHORTLY
NEXT SECURITY COURSE WILL BE ANNOUNCED SHORTLY
Background
TBA.
COURSE OVERVIEW
TBA
Location | : | TBA |
Date | : | TBA |
: | TBA | |
Duration | : | TBA |
Fees | : | TBA |
For details and booking please visit website www.7point8.com.my or email jeff@7point8.com.my aongkunik@7point8.com.my .
For more information please call Jeffrey (01126148233), Angeline (0109811595)
COURSE DIRECTOR
Daniel is a current team leader in the Australian Army whose responsibilities include training, intelligence gathering and operations. His specialisation is integration as part of a skilled team and leading them to deliver the desired results. He is also a versatile and experienced security and risk management professional.
Having instructed a number of courses in both the corporate in military world, Daniel’s forte is merging military discipline into corporate structure through the delivery of robust courses relevant to the corporate sector.
He holds a Bachelor’s Degree in Business, and multiple certifications in the security industry including the UK Government’s SIA Level 3 Close Protection Qualification, Cert III Security Operations (Australian government), Cert IV Project Management Practice, Cert IV Security and Risk Management, Cert IV Frontline Management.
Next Security Course Will Be Announce Shortly
By the end of the training session, participants will be aware and have a better understanding of the following:XXXXXXX
Next Security Course Will Be Announce Shortly
By the end of the training session, participants will be aware and have a better understanding of the following:XXXXXXX
Common myths and perceptions
about physical security and cybersecurity
My computer/server have the best antivirus installed
Cybersecurity : Although there are not many news of malware infection on Linux or Macs as in Windows, it does not mean it is safe. Malware coders just prefer and more interested to disrupt and attack Windows based workstations. Your antivirus is as good as the last update and there are no signatures for all the malicious codes in the world known to the majority.
Physical Security : Having security guards at the door/gates is not sufficient, security guards at best is a deterrent against entering the office premise and perform data/information theft and physical damage
Only large corporations are more vulnerable to cyber attacks
Cybersecurity : While this is true, it is a known fact that the best method to access smaller enterprises is through their IT contractors and service providers because they have easy access to their computer network.
Physical Security : Visitors and Contractors who register their details before entry is only as good as a name database and will not be able to ascertain their ulterior motives - if any
My password has far too many permutations to guess
Cybersecurity : There are no passwords that is too difficult to crack.
Physical Security : Internal staff are honest and loyal to the company, therefore there is no need to have doubts on staff
My network monitoring system will alert me of every problem
Cyber Security : Not quite! The most common form of cyber attacks is via email “phishing attack”. Attackers uses the application layer to gain access to the network .This is only one of several reasons that trusting only on the network monitoring system isn’t enough to protect it. You need to have protocols in place to protect the access to the network. It starts with the simplest one, physical access.
Physical Security : Disgruntled staff are any organisations beggest physical threats as they have access to many confisential information specifically passwords and big data configuration & setups
Cyber attacks and physical/terrorism attacks are always from the outside. All internal staff inside the company can be trusted.
Cybersecurity : Most emails received by internal staff have either an attachment or an external link to the outside network already exposing an entry into the company’s workstation
Physical Security : Disgruntled staff and contractors are known to be one of the weakness in any organisation to not be wary about within the organisation.
My PCs and servers are encrypted
Cybersecurity : 90% of small companies usually share same account with super administrative privileges which leads to weak protection. This results in creating a backdoor for social engineering and accessing those systems without too much effort. Disgruntled employees are normally perfect candidates.
Physical Security : Competitors may have relatives or friends who may undertake commercial espionage activities within the organisation passing valuable strategic business plans and activities
GET IN TOUCH
011-2614 8233 / 010-981 1595
enquiry@7point8.com.my
No. 79A & 79B. 1st & 2nd floor, Jalan SS21/37, Damansara Utama,
47400 Petaling Jaya, Selangor