Fomalhaut Security

Your No.1 Trusted Cyber Security Solutions Provider

22/12/2023

Wishing you a wonderful and joyful Winter Solstice. As this season of reunion unfolds, may you gather with family and friends, sharing happiness!

Wishes from Fomalhaut Security team

29/09/2023

May the full moon of the Mid-Autumn Festival shine bright on our path towards growth and prosperity. Happy Mooncake Festival to everyone!

11/09/2023

🌐 Discover the Latest Phishing Insights!

Phishing attacks surged by 47% in 2022, and the landscape is evolving. Uncover the exclusive Zscaler ThreatLabz 2023 Phishing Report, you will get to know :

1️⃣ Top targets by country and industry in 2022

2️⃣ How to spot common phishing tactics

3️⃣ The power of a zero trust strategy

4️⃣ Predictions for 2023-2024 phishing trends

Stay ahead of cyber threats. Download now!

➡️ https://info.zscaler.com/resources-industry-reports-threatlabz-phishing-report?_bt=670012711893&_bk=cybersecurity%20protection&_bm=p&_bn=g&_bg=149754797742&utm_source=google&utm_medium=cpc&utm_campaign=google-ads-na&gad=1&gclid=Cj0KCQjw0vWnBhC6ARIsAJpJM6dglcYa8lASBkEsr-WiDWC3utoiaClQdL5bOvWNRIg3QWjOMgvy1t0aAjYyEALw_wc



Follow Fomalhaut Security for more security trends and updates!

30/08/2023

Celebrate 66th years 🇲🇾 of independence with pride and unity!

Let’s remember the sacrifices of our freedom fighters and strive for a brighter future together 🥳🎉👏

From all of us at M3 - Microtree, Xaca Asia, Fomalhaut Security. Wishing You a Day of Happiness, Peace, and Harmony as We Honour Our Nation's True Independence. Happy Independence Day to all Malaysians! 🫡

Photos from Fomalhaut Security's post 24/08/2023

Email Authentication & Why it’s Important for Corporate Security

Email authentication is a crucial aspect of corporate security, aimed at verifying the legitimacy of incoming emails and protecting organizations from various cyber threats, such as phishing, spoofing, and business email compromise. It involves implementing mechanisms and protocols to ensure that the sender's identity and the integrity of the email content can be trusted.

WHAT IF YOU IGNORE IT! 🚫
➡️ Increased Phishing and Fraud Risk
➡️ Compromised Data Security
➡️ Brand Reputation Damage
➡️ Loss of Sensitive Information
➡️Slower Incident Response
➡️Regulatory Non-Compliance

Email authentication mechanisms play a vital role in preventing email-related cyber threats. By ensuring that only authorized senders can use a domain's name and that email content remains unchanged during transmission, email authentication helps protect individuals and organizations from falling victim to phishing schemes, business email compromise, and other fraudulent activities.

Click to learn about why email authentication is essential for corporate security 👇

Fomalhaut Security offers services to provide expert 24/7 and proactive defense against cyber threats, ensuring scalable for your business!

Leave us a message 💬 via https://lnkd.in/gxuMhjRR to learn more about how our SOC can help your organization's defenses. Let's work together to build a secure future! From real-time alerts to expert investigations, our SOC has got your back 24/7. Stay one step ahead of cybercriminals and ensure your digital fortress remains impenetrable🚀



Like our post? Follow us now and share it with your network! 💌

Hosting firm says it lost all customer data after ransomware attack 24/08/2023

Ransomware attacks can happen to any business, regardless of its scale or industry. From small startups to global enterprises, the risk is real and should not be underestimated. The sophistication of these attacks highlights the need for robust cybersecurity measures at every level.

This event should serve as a wake-up call for all businesses, prompting us to reevaluate our own security strategies. Cyberattacks like these are not limited to news headlines; they have the potential to cripple operations and risk the livelihood of both companies and individuals.

Have you taken the necessary steps to safeguard your data? What would be your response if faced with a similar ransomware threat?

Let's turn this unfortunate event into an opportunity to strengthen our defenses and protect what matters most.

💬Share your thoughts below on what steps have you taken to fortify your business against ransomware!

Let's learn from each other and create a resilient community that stands strong against cyber threats. 💪🔐



Follow us now for more tech news and updates!

Hosting firm says it lost all customer data after ransomware attack Danish hosting firms CloudNordic and AzeroCloud have suffered ransomware attacks, causing the loss of the majority of customer data and forcing the hosting providers to shut down all systems, including websites, email, and customer sites.

Photos from Fomalhaut Security's post 23/08/2023

Security Log Best Practices

Security logs, also known as audit logs or event logs, are records generated by computer systems, applications, and network devices to track and document various activities and events related to security. These logs provide a detailed historical record of actions, events, and incidents that occur within an IT environment.

Security logs typically include information about:

➡️Authentication and Authorization: Tracking user logins, access permissions, and privilege changes.

➡️System Events: Recording system startups, shutdowns, software installations, and hardware changes.

➡️Network Activities: Documenting network connections, firewall actions, and unusual traffic.

➡️File and Data Access: Logging who accesses files, folders, and databases, and any modifications made.

➡️Security Policy Violations: Capturing failed access attempts, unauthorized changes, and policy breaches.

➡️Malware Detection: Recording instances of malware detection and removal.

➡️System Errors: Providing information about software crashes, hardware failures, and errors.

➡️User Activities: Tracking user actions within the system, such as application usage and executed commands.

Security logs play a critical role in maintaining a secure IT environment and are crucial for identifying, mitigating, and preventing security breaches and other incidents. These security log best practices should always be considered by an organization, especially monitoring known threats. 💬 Let's further talk via https://www.fomalhaut-security.com/contact-us/



Is our content helpful? Follow us now and share it with your network 💌

23/08/2023

With the rapid advancement of technology, cyber threats have surged in tandem, making the digital world a mixed blessing. This realm offers boundless opportunities, but it’s also riddled with various risks. All businesses with an online presence, regardless of size or type, are exposed to these cyber threats.

Many small businesses incorrectly assume that their size protects them from being targeted. However, cybercriminals view them as soft targets due to their typically weaker security systems compared to larger corporations with dedicated IT security teams.

A single cyberattack can cause chaos, leading to significant financial losses, harm to the business’s reputation, erosion of customer trust, and, in extreme cases, even closure. Thus, the need for practical cybersecurity practices goes beyond mere necessity—it’s a vital requirement for survival and prosperity.

But where should a small business begin? 🤔

🔗Click to read more: https://www.fomalhaut-security.com/cybersecurity-best-practices-for-small-businesses/

Fomalhaut Security offers services to provide expert 24/7 and proactive defense against cyber threats, ensuring scalable for your business!

Leave us a message 💬 via https://lnkd.in/gxuMhjRR to learn more about how our SOC can help your organization's defenses. Let's work together to build a secure future! From real-time alerts to expert investigations, our SOC has got your back 24/7. Stay one step ahead of cybercriminals and ensure your digital fortress remains impenetrable🚀



Enjoyed this blog post? Stay updated with our latest insights and articles by following us now. Get notified about our upcoming posts and don't miss out on valuable content!

Tesla Data Breach - 75,000+ Users Information Details Exposed 23/08/2023

primary focus has been on electric vehicles (EVs), and it played a significant role in popularizing and advancing the adoption of electric cars.

The occurrence of a serves as a compelling reminder of the critical importance of cybersecurity. This incident underscores the need for robust and comprehensive measures to safeguard sensitive information.

The breach highlights the vulnerabilities that can exist within even the most advanced technological systems, emphasizing the necessity of proactive approaches to prevent such breaches from happening in the first place. In an increasingly interconnected and digital world, prioritizing cybersecurity is paramount to ensuring the trust, privacy, and security of individuals personal data.



Follow us now for more tech news and updates!

Tesla Data Breach - 75,000+ Users Information Details Exposed Recently, Tesla reported a data breach that exposed more than 75,000 users' information. It's the result of an "insider wrongdoing."

Photos from Fomalhaut Security's post 22/08/2023

Data Loss versus Data Leak: What's the Difference?

Ever wondered about the difference between data loss and data leaks? 🤔

🔍 Data Loss: Imagine accidentally deleting your important files. That's data loss! It's like losing the key to your digital treasure chest. 😱

🚫 Data Leak: Ever sent an email to the wrong person? That's a data leak! It's like accidentally sharing your secrets with the world. 😬

Understanding these differences helps us guard against unexpected mishaps and unauthorized peeks into our digital lives. Keep your data safe! 🔒

Stay secure and let's fortify Fomalhaut Security cyber defenses together. Feel free to reach out for tailored solutions at https://lnkd.in/gxuMhjRR 📩



Like our post? Click a like and Follow Fomalhaut Security now for more cyber security trends and updates! 💌

Photos from Fomalhaut Security's post 21/08/2023

Why Matters? 😕🔐

In today's interconnected world, every business, big or small, is susceptible to cyber threats. Here's why cybersecurity is crucial for small businesses and the potential consequences of neglecting it👇

Why Small Businesses Need Cybersecurity:
🔐Vulnerable Targets: Small businesses are often seen as easier targets by cybercriminals due to potentially weaker security measures.
🔐 Data Value: Customer information, financial records, and proprietary data are valuable to hackers, making small businesses attractive targets.
🔐 Reputation at Stake: A breach can damage trust and reputation, leading to customer loss and a tarnished brand image.
🔐 Legal and Regulatory Compliance: Many industries require adherence to cybersecurity regulations. Non-compliance can result in fines or legal actions.

Consequences of Neglecting Cybersecurity:
➡️Data Breaches: Without proper security, sensitive data can be stolen, causing financial losses and legal liabilities.
➡️Operational Disruption: Cyberattacks can disrupt business operations, causing downtime and financial setbacks.
➡️Financial Loss: Recovering from a cyber incident can be expensive, involving IT repairs, legal costs, and potential compensation to affected parties.
➡️Loss of Trust: Customers and partners may lose confidence if their data is compromised, leading to decreased business and growth opportunities.
➡️Regulatory Penalties: Non-compliance with cybersecurity regulations can result in fines and penalties.

Investing in cybersecurity is an investment in the long-term success and sustainability of your small business. By safeguarding your digital assets, you protect your business, customers, and future growth. Don't wait—start building your cyber defense by 💬 contacting us via https://lnkd.in/gxuMhjRR today!



Like our post? Click a like and Follow Fomalhaut Security now for more cyber security trends and updates! 💌

18/08/2023

⚠️Digital Banking Cyber Dangers⚠️

in digital banking can bring various types of risks and attacks that can compromise the security of online banking services and customer data. Here's what you need to know:

💡Unencrypted Data
When data is unencrypted, it's like sending a postcard through the mail without an envelope. Anyone who intercepts it can read the contents. In digital banking, sensitive information such as passwords, account numbers, and personal details should be encrypted to prevent unauthorized access.

💡Malware
Short for "malicious software", malware is harmful software that attackers use to infect computers or devices. It can steal information, disrupt operations, or even take control of a device. In digital banking, malware can target both customers and the bank's systems, aiming to steal login credentials or perform fraudulent transactions.

💡Third-Party Services
Digital banks often use third-party companies for various services, such as payment processing or customer support. However, if these third parties have weak security measures, they could become an entry point for cybercriminals to access the bank's systems or customer data.

💡Spoofing
Spoofing is when cybercriminals impersonate someone, or something trusted to deceive victims. In digital banking, this might involve creating fake websites that look like the bank's official site to trick users into entering their login details or other sensitive information.

💡Phishing
Phishing is a type of cyber attack where attackers send deceptive emails or messages that appear to be from a legitimate source, like a bank. These messages often ask recipients to provide sensitive information, click on malicious links, or download harmful attachments. Phishing attacks aim to steal login credentials, and financial details, or infect devices with malware.

These cyber-threats pose serious risks to the security of digital banking. Banks and customers need to be aware of these threats and take steps to protect themselves, such as using strong and unique passwords, keeping software up to date, and being cautious about clicking on links or sharing personal information online.

Stay secure and let's fortify Fomalhaut Security cyber defenses together. Feel free to reach out for tailored solutions at https://lnkd.in/gxuMhjRR 📩

Like our post? Click a like and Follow Fomalhaut Security now for more cyber security trends and updates! 💌

Cyber Criminals Attacking Web Services to Breach Organisations 18/08/2023

Web servers was hackers prime target as most probably they can store important information, cause problems for many users with attacks, take advantage of software weaknesses, create groups of infected computers, install ransom software, secretly access the server, and be used for spying...

Web servers are chosen as they are important for websites and apps, which makes them easy targets for hackers who want money, attention, or an advantage.

⚠️ What will happen if you ignore it⚠️
✅Data Breaches
✅Financial Loss
✅Legal and Regulatory Issues
✅Reputation Damage

Ignoring cybersecurity can have severe consequences, making it imperative to prioritize and invest in safeguarding your online presence.

💡To keep web servers safe, it's important to use strong security methods like keeping things updated, controlling who can access the server, using protective barriers, and teaching employees about cyber risks. This helps stop the dangers of cyberattacks that keep changing and causing trouble.


Follow us now for more tech news and updates!

Cyber Criminals Attacking Web Services to Breach Organisations Web servers are actively targeted by threat actors due to their volatility and open nature. While the web servers remain open since they provide several web services to users.

Photos from Fomalhaut Security's post 17/08/2023

Ever Encountered Suspicious Links? Spotting Phishing Emails Made Easy!

The online world is full of traps, and one common danger is phishing emails. These tricky messages, despite more awareness, still fool people and businesses, causing real harm. Phishing emails pretend to be real messages, tricking people into sharing important info or putting harmful stuff on their devices. Spotting these fake emails is your main way to stay safe online.

Phishing tricks are getting smarter, but even the smart ones have signs that give them away.

Learn some good ways to spot phishing emails. If you know more about this stuff, you can stop bad guys from winning. 🛡️📧

Follow Fomalhaut Security now and stay one step ahead of cybercriminals 🔏🚫 Contact us today at https://lnkd.in/gxuMhjRR to strengthen your defenses and let's fight together! 🤝



Like our post? Remember to share it with your connect! 💌

17/08/2023

, trusty digital bodyguard, keeping you and your computer safe online! 🔐💻

What Does a Firewall Do?
A firewall keeps an eye on all the data coming in and going out of your computer or network. It's like a filter that checks if the data is safe or not. If it's safe, it's allowed to enter or leave. If it's not safe, the firewall blocks it, just like a security guard stopping someone with a fake ID.

Why Do You Need It?
Think of the internet as a place with both good and bad characters. A firewall helps keep the bad guys out. It stops viruses, hackers, and other sneaky things from getting into your computer and causing trouble. It's like having a shield that protects your digital stuff, like your photos, documents, and personal information.

Cyber attacks are a real and evolving threat. Stay informed, take proactive measures, and prioritize cybersecurity to protect yourself and your digital assets. 💬 Contact us via https://lnkd.in/gxuMhjRR for more information about cybersecurity 📩🤝



Follow Fomalhaut Security now for more tech news and updates!
🔗: https://www.simplilearn.com/tutorials/cyber-security-tutorial/what-is-firewall

Photos from Fomalhaut Security's post 15/08/2023

🤔 Ever Wondered About the Differences between and ? 🕵️‍♂️

Ransomware is like a sneaky burglar that locks up your data and demands a ransom. On the other hand, DDoS attacks are like a massive digital traffic jam that crashes websites until a payment is made. 🚫🔐🚧

💡 Here's the scoop:
➡️ Ransomware holds your data hostage, demanding a key to unlock it.
️➡️ DDoS attacks overload websites, demanding a toll to clear the traffic.

🔒 Defensive Strategies:
✅To outsmart Ransomware, back up your data and shore up your defenses.
✅To prevent DDoS attacks, bolster your network security and have a traffic-cop plan.

Click for more details about the differences between and attack!

Ransomware and DDoS extortion attacks can target any business. A robust security solution is vital to prevent these threats. Let's chat here via https://lnkd.in/gxuMhjRR about these nuances and keep our online safe and sound! 💪🛡️



Share this post to spread awareness and let's dive into the world of cyber villains together! 🌐🕵️‍♀️

Photos from Fomalhaut Security's post 14/08/2023

Have you ever wondered why attacks keep working in ? 😫😱

Phishing is a type of online scam where bad actors pretend to be trustworthy sources, like companies or friends, to trick people into revealing sensitive information, such as passwords, credit card numbers, or personal details.

They do this by sending fake messages or emails that contain harmful links or attachments, aiming to steal your private data or infect your computer with malicious software.

Want to learn more about the simple reasons behind their success? Click to read the post! 👉

Follow Fomalhaut Security now and stay one step ahead of cybercriminals 🔏🚫 Contact us today at https://lnkd.in/gxuMhjRR to strengthen your defenses and let's fight together! 🛡️



Like our post? Share it and Follow Fomalhaut Security for more tech news and updates! 💌

Researchers Uncover Series of Ransomware Attacks that Follow Same Pattern 14/08/2023

Be aware of the recent Attacks!



Follow Fomalhaut Security now for more updates!

Researchers Uncover Series of Ransomware Attacks that Follow Same Pattern Ransomware groups often recycle tools, techniques, and procedures. Even some of them also provide playbooks for affiliates as well.

Photos from Fomalhaut Security's post 11/08/2023

Feeling unsure about security?🤨 No worries! We've gathered simple yet powerful Microsoft 365 tips to make your data super safe🔐

These tricks help build strong defenses for your business info. Dive in to learn these cool Microsoft 365 tips that will make security stress a thing of the past. Check it out for the tips now! ✅👇

In this dynamic environment, let's fortify Fomalhaut Security cyber defenses together. Feel free to reach out for tailored solutions at https://lnkd.in/gxuMhjRR 📩



Stay secure and stay confident! Follow us now for more updates! 💼🔐

Hackers Released New Black Hat AI Tool Evil-GPT as a Replacement for Worm GPT 11/08/2023

– it's like a replacement for a not-so-friendly program called . Bad actors are using it to do sneaky and harmful stuff online...

This thing can cause trouble if we're not careful😱 It's like a super powerful tool, but in the wrong hands, it can create problems for all of us.

We can't afford to underestimate the consequences of ignoring security. It's time to unite and take a stand for a safer digital future. Let's advocate for robust cybersecurity measures, responsible AI development, and informed decision-making. Let's talk at https://lnkd.in/gxuMhjRR now 💬



💪🏼 Follow us now and spread the word about "Evil-GPT" and make sure your friends know about it too!

Hackers Released New Black Hat AI Tool Evil-GPT as a Replacement for Worm GPT Hackers advertising a harmful generative AI chatbot called "Evil-GPT" in forums. This chatbot is being promoted as a replacement for Worm GPT. The sale of such malicious AI tools is a cause for concern in the cybersecurity community.

10/08/2023

Did you know that is among the top ten countries for receiving emails?

With Malaysia holding the tenth spot globally in spam email targeting, protecting your digital life becomes a vital mission. Enforcing robust security measures acts as a powerful defense against cyber threats! 🛡️💻

💡 Why Security Matters:
✅Data Protection: Security measures keep your sensitive information safe from prying eyes, ensuring your personal and financial data stays secure.
✅ Business Continuity: For businesses, robust security practices defend against disruptions, maintaining smooth operations and customer trust.
✅ Online Transactions: Secure practices safeguard your online transactions, preventing unauthorized access and financial losses.
✅ Privacy Assurance: Protect your personal privacy by thwarting potential breaches that could expose your confidential information.

With Fomalhaut Security, our expertise extends to networking solutions and robust network security measures, including cyber-security services, Security Operations Center (SOC), and Network Operations Center (NOC) capabilities. Our solutions include robust security measures to safeguard your data and operations, ensuring business continuity even in the face of cyber threats or unexpected events. We use tools like firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs) to safeguard your data and systems. 💬 Let's further talk here https://lnkd.in/gxuMhjRR 📩



Follow us now for more tech news and updates!
🔗: https://lnkd.in/gsKTYvbs

Top 5 Security Vulnerabilities of 2023: Apache and OpenSSH Are The Most Vulnerable 10/08/2023

are constantly devising new ways to exploit weaknesses in systems and applications.

Some tips to protect yourselves⬇️
✅Keep your software, apps, and devices up to date. Updates often include vital security patches that shield against known vulnerabilities.
✅Create unique, complex passwords for each account. Consider using a reputable password manager to keep track of them securely.
✅Be cautious of suspicious emails, links, and attachments. Verify the sender's authenticity before clicking or sharing any sensitive information.
✅Enable 2FA whenever possible. It adds an extra layer of protection to your accounts.
✅Stay informed about the latest online scams and tactics used by cybercriminals. Knowledge is your best defense.

By staying updated on the latest security vulnerabilities, you empower yourself to take proactive measures and safeguard your online presence. Let's make 2023 a year of enhanced cybersecurity awareness and proactive protection!



Follow us now for more tech news and updates!

Top 5 Security Vulnerabilities of 2023: Apache and OpenSSH Are The Most Vulnerable The top 5 security vulnerabilities for 2023 have been revealed by a recent study, with Apache and OpenSSH services being the most vulnerable.

Photos from Fomalhaut Security's post 09/08/2023

The trend is a hit! Using your own gadgets for work? Awesome, right? It's like having your office in your pocket, it's super convenient and efficient. And guess what? Companies love it too! It can help in saving money!

Yet, data security is crucial due to potential breaches. To ensure the integrity and confidentiality of corporate data in a BYOD environment, it is essential to implement the following best practices: ⬇️Click to read more!

By adhering to these practices, a safe BYOD space is forged, enabling businesses to reap the benefits of this contemporary approach without compromising security.

At Fomalhaut Security, we understand the evolving BYOD security landscape. Elevate your BYOD security with purpose-built solutions and best practices. Contact us to learn more via https://lnkd.in/gxuMhjRR 💬



Follow us now for more tech news and updates!

Cyber security in Malaysia: A hacker's delight? 09/08/2023

In the dynamic landscape of digital transformation, faces challenges in its efforts. Recent incidents include a affecting Unifi customers and a high volume of daily cyberattacks. Upcoming legislation aims to bolster the country's cybersecurity framework, emphasizing the ongoing need for robust protection in its expansive digital realm.

The escalating emphasize the urgency of fortified defenses. To tackle these challenges head-on, consider these strategies:

🛡 Embrace AI-Powered : Leverage AI and automation for rapid threat detection and response.

🛡Holistic Approach: Bolster your security posture with comprehensive training, tech solutions, and incident protocols.

🛡Collaborative Efforts: Forge public-private for sharing and collective defense.

In this dynamic environment, let's fortify Fomalhaut Security's cyber defenses together. Feel free to reach out for tailored solutions at https://www.fomalhaut-security.com/contact-us/



https://techwireasia.com/2023/07/whats-going-on-with-cyber-security-in-malaysia-in-2023-so-far/

Cyber security in Malaysia: A hacker's delight? Despite progress in digital transformation, the cyber security incident response in Malaysia needs improvement.

Photos from Fomalhaut Security's post 08/08/2023

Curious about the contrasts between and ? 🤔

Click to compare and see if you can spot the differences.

Explore the key differences and discover which one suits your digital defense needs better now! 🤩

Endpoint protection prevents hostile actors and campaigns from exploiting endpoints or entry points of end-user devices such as PCs, laptops, and mobile devices. At Fomalhaut Security, our endpoint security solutions defend endpoints on a network or in the cloud against cyberattacks.

What do we provide? 🤝

✅Threat Hunting
Detect threats to your business with proactive 24/7 hunting by our elite team of threat analysts.
✅Rapid Incident Response
Initiates actions to neutralize threats and stop even the most sophisticated threats.
✅Future Facilitations
Get actionable advice to address the root cause of recurring incidents to stop them for good.

Let's further discuss here via https://lnkd.in/gxuMhjRR 📩



Follow us now and share your thoughts in the comments and let your network benefit too. Let's stay informed and secure together! 👥💬

Want your business to be the top-listed Computer & Electronics Service in Puchong?
Click here to claim your Sponsored Listing.

Videos (show all)

Celebrate 66th years 🇲🇾 of independence with pride and unity!  Let’s remember the sacrifices of our freedom fighters and...
Understanding the differences between #Phishing and #SpearPhishing 🎯The threat of phishing and spear phishing attacks ar...
Selamat Awal Muharam
HARI RAYA
Are you considering modernizing your organization through secure digital transformation? Discover how a zero-trust archi...
Best Practices for Removable
Happy Deepavali to our friends and family! #deepavali2022
Gartner Cyber Security Predictions for 2023-2025

Telephone

Address

11-13 & 11-13A, 2 Rio Tower, Persiaran RIO Bandar Puteri, 4/100 Puchong Darul Ehsan
Puchong
47100

Opening Hours

09:00 - 18:00

Other Information Technology Companies in Puchong (show all)
Fortesys Sdn Bhd Fortesys Sdn Bhd
26-1, Jalan Puteri 5/5, Bandar Puteri
Puchong, 47100

Fortesys is a value-added distributor that specializes in ICT network infrastructure and security.

Southpaw Sdn. Bhd. Southpaw Sdn. Bhd.
SetiaWalk Mall
Puchong, 47160

Southpaw is a team of creators & UI architects focused in multitouch & interactive solutions. Connect to your audience with the best interactive experience

Jiingga Jiingga
Puchong

Helping companies and individuals use data to accelerate growth and transform successfully.

Enzo Plus Sdn Bhd Enzo Plus Sdn Bhd
Block C-10-03, Setia Walk, Persiaran Wawasan, Pusat Bandar Puchong
Puchong, 47160

Asia’s No.1 fastest growing distributor for Cybersecurity, Networking, Data Center and Cloud.

Matrix Xtreme Solution Matrix Xtreme Solution
Puchong

Matrix Xtreme Solution is a Total support related Computerized Hardware & Software Internet Solution Company specializes in providing a comprehensive array of onsite with outstandi...

Idea & Design Idea & Design
Puchong, 47100

We are provide all kind of E&E services such as design and create from start to complete with end product. If you have any idea and looking for someone to help you create, we can ...

XACA Asia XACA Asia
11-13 & 11-13A, 2 Rio Tower, Persiaran RIO Bandar Puteri, Puchong D
Puchong, 47100

We are a team of Digital Innovation People tend to build the Eco-system in this challenging digital w

ARTAT Design & Communication ARTAT Design & Communication
1st Floor, 23A, Jalan Kenari 4
Puchong, 47100

Creativity + Design = Impact!

Falah Digital Solution - Website Design & Digital Marketing Falah Digital Solution - Website Design & Digital Marketing
Puchong, 15200

Falah Digital Solution merupakan perunding dan pembangun laman web perniagaan khusus untuk syarikat

Aldan Technology Aldan Technology
2-16, 2nd Floor, Staircase 4, KLH Business Centre, Menara KLH, Bandar Puchong Jaya
Puchong, 47170

Aldan Technology Sdn Bhd(612902-W).Malaysia Leading Kiosk Specialist in Self-Service Kiosk Solutions.

OTOT Connect OTOT Connect
Bandar Kinrara
Puchong, 47180

OTOT Connect is a freelance software development company based in Malaysia. OTOT stands for "One Touch One Technology". We develop tailored-made software based on our client's need...

Exasoft Technologies Exasoft Technologies
Taman Kinrara, Batu 7, Jalan Puchong
Puchong, 47180

Exasoft is an 'Information Technology (IT)' company providing software and hardware services. Exaso