Cybersecurity Expert Evgeniy Kharam Shares Insights on Protecting Your Business

Cybersecurity Tips

In this exclusive interview, cybersecurity expert Evgeniy Kharam shares valuable insights on protecting businesses from cyber threats. From his experience in the Israeli Navy to founding EK Cyber and Media Consulting, Kharam offers practical advice on implementing effective security measures, understanding common vulnerabilities, and staying ahead of evolving threats in the digital landscape.

Listen And Share This Software Spotlight Podcast

Watch And Share This Software Spotlight Podcast

Protecting Your Business

Cybersecurity tips from expert Evgeniy Kharam discusses business protection from cyber threats on Software Spotlight podcast.
Listen to the Software Spotlight podcast for expert advice on cybersecurity for businesses.

In today's digital age, cybersecurity is a critical concern for businesses of all sizes. To gain valuable insights on this topic, Software Spotlight podcast host Michael Bernzweig recently interviewed Evgeniy Kharam, a renowned cybersecurity expert with over two decades of experience in the field. From his beginnings in the Israeli Navy to founding EK Cyber and Media Consulting, Kharam has accumulated a wealth of knowledge on protecting organizations from cyber threats.

The Journey to Cybersecurity Expertise

Evgeniy Kharam's path to becoming a cybersecurity expert was unique. He began his career in the Israeli Navy, working with electronics and networking. After leaving the military, Kharam joined Checkpoint, a leading cybersecurity vendor, as a QA analyst. This experience allowed him to dive deep into cybersecurity protocols and firewall technology.

“I dove heads into cybersecurity as a QA person,” Kharam recalls. “For two years, I was learning protocols and checking firewalls on how they're supposed to work. It was very, very interesting because I went very, very deep, very, very fast.”

Understanding the Cybersecurity Tips And Landscape

Common Types of Exploits

When asked about the most common types of exploits targeting organizations, Kharam highlighted several key areas:

  1. Vulnerable software
  2. Email-based attacks
  3. Cloud environment takeovers

Kharam emphasizes the importance of a layered approach to security, often referred to as “defense in depth.” He explains, “We call it defense in depth. The same idea as we had in the medieval age, we had a castle, and we had different levels of the castle.”

The Human Factor in Cybersecurity

While technology plays a crucial role in cybersecurity, Kharam stresses the importance of addressing the human element. He notes that even cybersecurity professionals can fall victim to clever phishing attempts.

“I click on the link as well,” Kharam admits. “I maybe woke up in the morning and my mind was somewhere else, and I didn't sleep well. And I saw a link that looked like it came from Robert Horserick to ask you to buy gift cards.”

To mitigate this risk, Kharam recommends a combination of user education and robust security controls. He compares it to fire safety training, where people are educated but not expected to be fire marshals.

Practical Cybersecurity Strategies for Businesses

Asset Management: The Foundation of Security

One of the most overlooked aspects of cybersecurity, according to Kharam, is asset management. He emphasizes, “We cannot protect what we don't know.” This includes keeping track of laptops, software, servers, and other digital assets.

Tailoring Security to Your Business

Kharam advises against a one-size-fits-all approach to cybersecurity. Instead, he recommends understanding your organization's specific “crown jewels” – the most critical assets that need protection.

“You need to understand what are the company's crown jewels, what is the most important part for the company, and from there figure out how you're going to secure it,” Kharam explains. “And every company is going to be different.”

Starting with the Basics

For small and medium-sized businesses (SMBs), Kharam suggests focusing on fundamental security measures before implementing complex solutions. He recommends starting with:

  1. Antivirus software
  2. Firewalls
  3. Multi-factor authentication
  4. Secure document-sharing practices
  5. Email security

“Do you have an anti-virus? Do you have a firewall if you're actually in the office? Do you have a way to understand how you authenticate and can it be done in multi-factor authentication?” Kharam advises. “Just very, very simple, less than five things that I'll start to understand before we're trying to build an Empire State server.”

The Future of Cybersecurity for SMBs

Looking ahead, Kharam predicts several trends that will shape cybersecurity for small businesses:

  1. Shift towards cloud and SaaS solutions
  2. Integrated security platforms
  3. Increased adoption of cyber insurance
  4. AI-powered security tools

Kharam believes that these trends will make advanced security more accessible and affordable for SMBs. “We were going away from kind of on-prem appliances and on-prem infrastructure maybe beside a firewall or like a switch and we're moving all the logic and all the brains to a cloud and SaaS,” he predicts.


As cyber threats continue to evolve, businesses must stay vigilant and proactive in their security efforts. By following the advice of experts like Evgeniy Kharam and implementing a layered, tailored approach to cybersecurity, organizations can better protect themselves against potential attacks and data breaches.

Remember, cybersecurity is an ongoing process, not a one-time fix. Stay informed, educate your team, and regularly review and update your security measures to keep your business safe in the digital world.


What are the most common types of cyber exploits targeting businesses?

The most common types include vulnerable software exploits, email-based attacks, and cloud environment takeovers.

How important is user education in cybersecurity?

User education is crucial but should be combined with robust security controls to effectively protect against cyber threats.

What basic cybersecurity measures should small businesses implement?

Small businesses should start with antivirus software, firewalls, multi-factor authentication, secure document sharing, and email security.

Why is asset management important in cybersecurity?

Asset management is crucial because you can't protect what you don't know about. It helps track all digital assets that need protection.

What future trends will shape cybersecurity for small businesses?

Future trends include a shift to cloud and SaaS solutions, integrated security platforms, increased cyber insurance adoption, and AI-powered security tools.

Similar Posts