Alerts, Breaches, News & Articles

July 2, 2020

Our Director of Security Services, Brandyn Fisher, was recently featured on the Defenders of Business Value Podcast. See the link below for a quick listen on all things cybersecurity and compliance. Brandyn also speaks about several of our friends in the industry such as Censys and Privva. Definitely worth a listen.

Click he...

June 22, 2020

The Mako Group has announced the addition of five uniquely skilled team members. They include; Amber Coleman, Senior IT Auditor; Nate Enos, Penetration Tester; Kaitlyn Johnson, Senior IT Auditor; Joshua Marzic, Cyber Risk Advisor; and Jonathan Schillinger, Cyber Risk Advisor. These new hires are a result of continued growth...

June 11, 2020

The Mako Group, a leading provider of cyber risk management consulting, today announced that it has been designated as a HITRUST Authorized External Assessor by HITRUST. With this achievement, The Mako Group is now approved to provide services using the HITRUST CSF, a comprehensive security framework that addresses the mult...

May 26, 2020

The Mako Group has promoted Brandyn Fisher to the position of Director of Security Services. In this position, he will lead the team assisting clients with identifying security vulnerabilities within their external and internal networks, web applications, and other network attack vectors. These responsibilities include usin...

Many organizations have proactively begun scanning and monitoring for network-based vulnerabilities as part of an ongoing vulnerability management program. Dozens of commercial vulnerability scanning engines exist. The Mako Group relies heavily on Tenable’s Nessus Professional vulnerability scanner for network vulnerability...

Many laws and requirements affect businesses today and the topic of privacy is receiving extra attention from auditors and regulators. However, it is not just about laws and compliance. There are many motivators driving businesses to be more responsible with a consumer’s personal data such as:

  • Enhance the company brand


Something I have learned in over 20+ years of experience in the IT audit realm is simply that “a widget by another name is just a widget and the same or similar controls and security measures need to be applied to these as has been done during past IT security and control type reviews/projects/audits”.  In this case we are...

Please reload


Please reload


Want to keep reading? Browse our white papers.



Finance and Insurance



State and Federal