
IT Security Essentials for Business Owners and Individuals With Arash Shokouh
Arash Shokouh is the Founder and Managing Principal of Ophtek LLC, a company specializing in cybersecurity, managed IT security and support for small- and medium-sized businesses. With over 18 years of experience in computer technology, his background includes roles at several startups and a tenure at IBM, where he contributed to developing some of the world's fastest computer processors and holds patents in computer architecture. Beyond his professional endeavors, Arash has served as a small business development commissioner for the City of San Jose and teaches computer engineering at his alma mater, San Jose State University.
Here’s a glimpse of what you’ll learn:
- [2:27] Arash Shokouh uncovers cybersecurity gaps in government communications
- [3:58] Arash's surprising recruitment by the CIA
- [12:12] Understanding global cybersecurity threats and protecting yourself
- [20:21] The Zero Trust mindset and its importance in personal and business cybersecurity
- [26:22] How to simplify your tech with top tools for cybersecurity
- [29:00] Useful websites for checking your data's safety
- [26:39] What should you consider when hiring a managed IT security provider?
- [30:49] Expert advice on choosing the best password manager
- [32:48] Arash predicts the future of cybersecurity and emerging threats
In this episode…
Cyberattacks are no longer just a risk for large corporations — they’re an everyday threat to individuals and small businesses alike. With phishing emails, AI-powered scams, and persistent system intrusions growing more sophisticated, what can the average person do to protect our data and avoid becoming the next target?
Cybersecurity expert and IT professional Arash Shokouh outlines the essentials for fortifying digital systems, drawing from over two decades of experience. Arash emphasizes adopting a Zero Trust mindset, which means verifying every request — even those from familiar contacts — and avoiding convenience at the cost of security.
With riveting anecdotes, including his recruitment by the CIA, he demonstrates the increasingly sophisticated nature of cyber adversaries and why individuals should migrate to secure platforms like Gmail and install trusted tools such as Malwarebytes. For businesses, he advocates consolidating services under platforms like Google Workspace or Microsoft 365 and hiring professionals to strengthen account security, monitor systems, and ensure compliance with best practices.
In this episode of the Pillar6 Podcast, Roman Polnar interviews Arash Shokouh, Founder and Managing Principal of Ophtek, on IT security essentials for businesses and individuals. Arash shares insights into persistent cybersecurity threats, the critical shift toward Zero Trust, practical steps to secure communications, and how to vet managed service providers.
Resources mentioned in this episode:
- Roman M. Polnar on LinkedIn
- Pillar6 Advisors
- Arash Shokouh: LinkedIn | Email | Phone no.: (650) 731-7154
- Ophtek: Website | Blog | LinkedIn
- Malwarebytes
- Check if Your Email Was Part of a Breach: Have I Been Pwned?
- 1Password
- The Power of Habit: Why We Do What We Do in Life and Business by Charles Duhigg
Quotable Moments
- “Convenience is what you're sacrificing for cybersecurity. If you want security, you have to sacrifice convenience.”
- “You've got to get in the habit of verifying. Verify, verify, verify. Things become a lot more secure.”
- “Up to 90% of these breaches come through phishing emails. It's very easy to pretend to be someone else.”
- “We weren't designed to absorb this much information this fast at such high speeds of just constant negativity.”
- “The best thing you can do is to put everything under the Google or under the Microsoft umbrella.”
Action Steps
- Adopt a Zero Trust mindset: Always verify requests from any source to reduce the risk of phishing and cyberattacks.
- Consolidate digital services under one platform: Using a single ecosystem like Google Workspace or Microsoft 365 simplifies security management and reduces vulnerabilities.
- Use a secure email provider like Gmail: Platforms with built-in security filters can detect and block suspicious emails before they reach your inbox.
- Install endpoint protection software like Malwarebytes: Multilayered defense tools protect your devices from ransomware, exploits, and malicious web content.
- Perform regular security audits: Frequent assessments help identify system weaknesses, ensuring your digital environment stays protected against evolving threats.
Sponsor for this episode
This episode is brought to you by Pillar6. Pillar6 is a wealth advisory firm for successful individuals and families with active lifestyles.
Our clients appreciate having clarity and control over their finances and the peace of mind in knowing that their financial decisions are aligned with their core values, goals, and priorities. We provide financial planning services and wealth management services.
Schedule your complimentary discovery call to talk to us.
To learn more, go to www.pillar6.com or you can email us at hello@pillar6.com.