Zenov BPO

Earn commissions by joining our referral program and introducing us to new customers!

Processing ISO 27001 Certification

We are on the process of achieving ISO 27001 Certification

ISO 27001 provides an international benchmark for implementing, managing, and maintaining information security within a company.

Becoming ISO 27001 certified demonstrates conformity of your Information Security Management System (ISMS) with the documented standards and provides your customers with assurance regarding the security of your system.

Zenov Cyber Security

1. Network Security
  • Private Internet Service: Zenov uses dedicated Virtual Private Network (VPN) connections to secure internal traffic and prevent unauthorized access.
  • Firewalls: Next-generation firewalls (NGFWs) to monitor and filter incoming/outgoing network traffic.
  • Network Segmentation: Isolating different departments (e.g., HR, Finance, Operations) to limit access to data only where necessary.
  • Encrypted Wi-Fi: Secure, enterprise-grade Wi-Fi with WPA3 encryption and hidden SSIDs.
  • Enterprise-Managed Laptops: Devices configured with pre-installed security tools and remote monitoring.
  • Antivirus & Microsoft Defender ATP: Detect malware and phishing threats.
    Restricted USB Ports: Prevent unauthorized data transfers by disabling or restricting USB access.
  • Laptops are locked in the office and only taken out of office in case of emergency. Passwords are reset
    every 30 days for password protected data.
  • Access Control Policies: Role-based access control (RBAC) limits who can access certain data.
  • Multi-Factor Authentication (MFA): Mandatory MFA for all logins.
  • Cloud Security & Data Loss Prevention (DLP)
  • Gated Premises & Visitor Logs: The Premises are gated with security guards and all external visitors must
    sign-in before accessing the premises.
  • Biometric & Key Card Access: Only authorized employees can enter workplace with Fingerprint Access
  • Security Cameras (CCTV): Continuous monitoring with footage retention for within the office and in each
    room – Internal compliance.
  • Locked Server Rooms & Dedicated Rooms: All Teams have dedicated rooms and are not allowed to work
    in other rooms or cross functionally.
  • NID & Passport: National I.D. & Passport Verified when hiring.
    Mandatory
  • Police Clearance: Police clearance and verification necessary to accept offer letter.
  • Reference Check + Documentation Verification: Mentioned references are contacted, home address,
    utility bills, and bank details are cross-checked and verified.
  • Cyber Security Training: Cyber Security Training provided to employees twice every year.
  • Phishing Training: Phishing training provided to employees twice every year.
  • Regular Security Audits: Internal and Third party audits are conducted yearly.