Access Control at Objectways
- Biometric access control for secure entry and exit to sensitive areas.
- Continuous CCTV surveillance at both entry and exit points for enhanced monitoring.
- Logs of successful and failed attempts at both badge checkpoints and biometric scan checkpoints to ensure robust tracking.

Hardening Controls and Malware Protection
- Strong hardening controls implemented on all laptops and workstations to protect against vulnerabilities.
- Regular malware scans scheduled to identify and eliminate potential threats.
- Strict quarantine policies deployed to isolate and mitigate risks from compromised devices.
- Critical security patches are applied within 48 hours.

Ensuring Security with Background Checks and NDAs
- Employees onboarded post-NDA and thorough background checks to establish trustworthiness.
- Confidentiality agreements executed with all clients to protect sensitive information.
- Our team is trained in HIPAA compliance and the proper handling of PII/ PHI to meet regulatory requirements.

Comprehensive Employee Training
- Regular security awareness training programs are held to educate employees on best practices.
- Classroom and intranet sessions are provided to reinforce security protocols and procedures.
- Comprehensive emergency action plans are in place, with basic training on how to respond in case of a fire or smoke alarm.

Preventing Data Leaks
- Domain policies are enforced to prevent unauthorized data extraction from employee machines.
- Policies are in place to block screenshot capture and copy/paste actions for sensitive data.
- Software downloads and installations are restricted to authorized applications only.

Advanced Network Security
- A dedicated sandbox network is in place to isolate and protect critical systems.
- Firewalls control incoming and outgoing traffic based on predefined security rules.
- Zero trust network access (ZTNA), also known as software-defined perimeter (SDP), enables granular access to applications for authorized users only.

Restricted Email Access and Secure Internet Use
- Email access is restricted to our network to prevent unauthorized access.
- Internet access is limited to approved domains and sites for enhanced security.
- Web traffic is continuously monitored, and protocols are used to detect and prevent potential threats.
