Terra Labz
Back to Insights
CybersecurityMalaysia

Cybersecurity in Malaysia: Protecting Businesses in a Rapidly Digitizing Economy

As Malaysia digitizes rapidly, cybersecurity threats are increasing. Here is how businesses can protect themselves.

Terra Labz SecurityFebruary 21, 202613 min readMalaysia

Malaysia's rapid digitization has dramatically expanded the attack surface for cybercriminals. CyberSecurity Malaysia — the national cybersecurity specialist agency under MOSTI — handled over 5,000 reported incidents in 2024, with fraud, intrusion, and malicious code as the top categories. The actual number of incidents is far higher because most go unreported. Financial losses from cybercrime in Malaysia are estimated at over 1 billion MYR annually, and the trend is accelerating as more businesses move online.

The problem is structural. Malaysia's digital economy is growing at 20 percent annually, but cybersecurity investment is not keeping pace. SMEs, which make up 97 percent of Malaysian businesses, are particularly vulnerable — they are digitizing rapidly under government programs like SME Digital, but most lack dedicated security staff, formal security policies, or incident response capabilities. They are soft targets, and cybercriminals know it.

The Malaysian Threat Landscape

The threats facing Malaysian businesses have specific characteristics shaped by the local context.

Phishing attacks are the most common entry point, and they are becoming increasingly sophisticated. Attackers craft phishing emails in Bahasa Malay targeting local businesses, mimicking communications from Bank Negara Malaysia, LHDN (the tax authority), or KWSP (the national pension fund). These emails use correct local terminology, reference actual Malaysian institutions, and exploit the cultural tendency toward respect for authority. Business Email Compromise — where attackers impersonate senior management to authorize fraudulent transfers — has been particularly effective in Malaysian companies where hierarchical culture makes employees reluctant to question instructions from superiors.

Ransomware attacks on SMEs have surged since 2023. Groups targeting Malaysian businesses include both global operators and regional threat actors based in Southeast Asia. The ransom demands are calibrated for the Malaysian market — typically 50,000 to 500,000 MYR, amounts that are devastating for SMEs but small enough that payment seems the fastest path to recovery. We have seen multiple cases where businesses paid the ransom but never received functioning decryption keys.

Supply chain compromises through vulnerable third-party vendors are increasing as Malaysian businesses integrate with more digital services. A compromised accounting software update, a breached payroll provider, or a vulnerable e-commerce plugin can give attackers access to dozens of downstream businesses. The SolarWinds-style supply chain attack model is being replicated at smaller scale across Southeast Asia.

Online fraud targeting Malaysian consumers and businesses includes fake e-commerce sites, investment scams using social media advertising, and Macau scam operations — large-scale phone and online fraud syndicates that have become a major law enforcement concern in the region. Businesses that fail to protect their customers from fraud on their platforms face reputational damage and potential regulatory consequences.

Regulatory Framework: What Malaysian Law Requires

Malaysia's cybersecurity regulatory landscape includes several laws and frameworks that businesses must understand.

The Personal Data Protection Act 2010 — PDPA — governs the processing of personal data in commercial transactions. The PDPA requires organizations to implement security measures proportional to the harm that could result from unauthorized access, destruction, or loss. While the PDPA does not specify particular technologies, the Personal Data Protection Commissioner has published guidance on encryption, access controls, and regular security assessments. Amendments proposed in 2024 would introduce mandatory data breach notification — a requirement that does not currently exist in the PDPA.

Bank Negara Malaysia's Risk Management in Technology framework — RMiT — applies to all financial institutions and is one of the most comprehensive banking cybersecurity frameworks in the region. RMiT covers technology governance, risk assessment, cybersecurity operations, data management, and outsourcing risk. Compliance requires documented security policies, regular penetration testing, 24/7 security monitoring, and incident response capabilities. Financial institutions that fail to comply face regulatory action.

The Malaysia Cyber Security Strategy 2020-2024 and its successor set national priorities including critical infrastructure protection, capacity building, and public-private collaboration. While these strategies do not create direct legal obligations, they shape the regulatory environment and indicate where enforcement is heading.

Recommended Protections: Practical Steps

Based on the Malaysian threat landscape and regulatory requirements, here are our recommendations organized by priority.

Multi-factor authentication across all systems is the single highest-impact security measure. MFA stops the vast majority of credential-based attacks. For Malaysian businesses, we recommend app-based TOTP — Google Authenticator or Microsoft Authenticator — as the default, with hardware security keys for administrative access. SMS-based OTP is common in Malaysia but vulnerable to SIM-swapping attacks that are becoming more prevalent in the region.

Regular penetration testing — at minimum annually, quarterly for financial services — identifies vulnerabilities before attackers do. The testing should cover external network perimeter, web applications, mobile applications, and social engineering. We recommend using testers certified under CREST or equivalent frameworks. CyberSecurity Malaysia operates the CyberSAFE program that provides resources for security testing.

Endpoint detection and response on all devices provides visibility into potential compromises. Traditional antivirus is insufficient against modern threats. EDR solutions like CrowdStrike, SentinelOne, or Microsoft Defender for Endpoint detect behavioral anomalies, provide forensic data for incident investigation, and enable rapid response. For SMEs with limited budget, Microsoft Defender for Endpoint P1 provides basic EDR at a fraction of the cost of enterprise solutions.

Email security with DMARC, DKIM, and SPF prevents domain spoofing — attackers impersonating your domain to send phishing emails to your customers or partners. Implementing DMARC at enforcement level protects your brand and reduces the effectiveness of phishing campaigns that use your company's identity. This is a configuration change, not a product purchase, and provides significant security improvement at zero cost.

Employee cybersecurity awareness training with content in Bahasa Malay and English addresses the human factor. Training must cover phishing recognition, password hygiene, device security, and reporting procedures. The training should use real examples from the Malaysian context — phishing emails mimicking local institutions, scam scenarios common in the region. Training conducted only in English misses a significant portion of the Malaysian workforce.

Incident response planning ensures that when a breach occurs — and eventually it will — the response is organized rather than chaotic. The plan should cover detection, containment, investigation, communication, and recovery. It should designate roles, provide contact lists, and include templates for regulatory notification. The plan must be tested through tabletop exercises at least annually.

Cloud Security in the Malaysian Context

As Malaysian businesses migrate to cloud infrastructure, cloud security configuration becomes critical. The most common cloud security failures we see in Malaysian organizations include overly permissive IAM policies that give too many users administrative access, unencrypted data storage in S3 or Azure Blob with public access enabled, security groups that allow inbound traffic from anywhere on management ports, and unused resources left running with default configurations that attackers scan for.

For businesses handling Malaysian personal data under the PDPA, cloud deployment in Malaysian or Singapore regions provides data residency assurance. AWS and Azure both have regions in these locations. The shared responsibility model means that the cloud provider secures the infrastructure, but you are responsible for configuring it correctly — and misconfiguration is the most common cause of cloud security breaches.

Our Security Services

We provide cybersecurity services for Malaysian businesses including penetration testing, security architecture review, cloud security assessment, and ongoing monitoring. Our team understands the specific threat landscape in Southeast Asia, the regulatory requirements under the PDPA and RMiT, and the practical constraints of Malaysian SMEs. Whether you need a one-time security assessment or ongoing security partnership, we help Malaysian businesses build resilient security postures that match the threats they actually face.

Want to discuss this topic?

Our team is ready to help you implement the ideas from this article.