Reducing Risk with Data Minimization

Published on  February 28, 2020  

Putting your company on a data diet that reduces the amount of the sensitive data you store or use is a smart way to achieve compliance with GDPR and CCPA. This recent article that was published in Dark Reading discusses the importance of reducing risk through data minimization and provides several useful steps to minimize the sensitive data that is stored or used throughout an organization. 

CISOs and CMOs - Joined at the Hip

Published on  October 29, 2019  

In our latest blog post, Senior Security and Controls Advisor, Joe Gates explains why it's so important for the CISO and CMO of an organization to work together and some tips to ensure that their relationship is successful. ISACA published this recent entry which can be found here. 

Who Should the CISO Report To?

Published on  September 30, 2019  

Senior Information Technology Auditor, Bethany Deeds takes readers through some important items to consider when determining who the CISO  should report to. It definitely brings some challenges and isn't a one size fits all position. Her recent blog post was picked up by ISACA and can be read here!

How To Properly Review A SOC Report

Published on  June 24, 2019  

As a follow up to one of our most downloaded whitepapers, How To Properly Review and Act Upon SOC Reports, our Security and Controls Manager Brooke Gardner digs a little deeper into what you should be reviewing when you receive your vendors’ SOC 1, SOC 2, or SOC 3 reports. This recent blog post was published by ISACA and can be found by clicking on the link below.

11 Tips For Boosting Cybersecurity When You Have Remote Workers

Published on  June 3, 2019  

These days it's very common for companies to have employees who work remotely. With today's technology it's easy to share information and work together from places all over the world. But despite the many benefits that come with remote work forces there are also concerns. The lack of control over everyone's devices opens you up to security threats. Several experts within the industry, including our CEO, offer some advice to ensure that your company is doing everything it can to stay secure.

Controls in the Cloud - Moving Over Isn't As Easy As Flipping a Switch

Published on  May 20, 2019  

Our Chief Audit Executive recently wrote a blog post on controls in the cloud. In this piece he provides some useful tips to readers in regards to cloud migrations. Many think it's as easy as flipping a switch. However, it is important that when doing so, the proper controls are used and companies understand each control and how they change in a cloud environment. Click below to read the entire piece which was recently featured on ISACA.

12 Industry Pros Share Their Top-Recommended Tech Podcasts

Published on  May 2, 2019  

Forbes shares 12 recommended tech podcasts in one quick article! Included in the list is a fantastic podcast about cybersecurity which was recommended by our very own David Lefever. 

11 Challenges Facing Tech Execs In 2019 And Their Plans To Overcome Them

Published on  April 4, 2019  

Members of the Forbes Technology Council share details about the challenges facing tech industry leaders in 2019 and some best practices to try to overcome them. Click here for the full article.

Building an Effective Cybersecurity Program

Published on  April 4, 2019  |  Author David Lefever - CEO

Building an effective cybersecurity program presents challenges to businesses of all sizes. It doesn’t matter if you are a 25-employee manufacturer or a Fortune 50 global business, the concepts of cybersecurity do not change. In this piece from Forbes, CEO David Lefever uses relatable, real-world examples to demonstrate the proper way to build an effective cybersecurity program. 

13 Tech Experts Share What Facebook Should Do Post-Data Breach

Published on November 13, 2018 

Facebook's recent security breach affected 50 million user accounts. A breach this size can be a big challenge for companies to try to fix and regain customer trust. David Lefever weighs in, with several other members of the Forbes Technology Council, to share his opinion on what Facebook could do to increase its security posture following this breach.

An Agile Approach to Internal Auditing

Published on April 17, 2018  |  Author Meredith Yonker – Audit and Risk Manager

As internal auditors, we've seen an uptick in usage of the term "Agile" in reference to how more and more companies are developing software. This article, which was recently featured on the ISACA blog, helps to demonstrate how to create an Agile control environment and simplify your audit process. We hope you find it useful.

13 Key Traits Experts Look For When Sorting Resumes

Published on November 9, 2017  |  Author David Lefever - CEO

Looking for a job can be brutal and standing out among hundreds of other candidates can be even harder! Experts of the Forbes Technology Council, including our CEO, David Lefever, share some advice on what they look for when reviewing resumes. Who knows, maybe one of these tips will be the ticket to separate you from the pack during your next job hunt.

16 Ways To Keep Your Tech Team Happy And Motivated

Published on December 4, 2017  |  Author David Lefever - CEO

Keeping our employees happy is a major priority for us here at The Mako Group. Working in a remote environment causes some challenges, but our CEO seems to have a good handle on what it takes to make things work. See what he has to say in the article below featured in Forbes.

What Can 3-D Augmented Reality Do For You?

Published on November 8, 2017  |  Author David Lefever - CEO

The use of augmented reality provides many new avenues for marketers, allowing them to create awareness easily without becoming too intrusive. As with all new things, there are a lot of unknowns for new users. David Lefever, along with other members of the Forbes Technology Council provide some advice to help you get started.

Cybersecurity is Not A Device

Published on October 2, 2017  |  Author David Lefever - CEO

Devices like Firewalls are important, but they are only part of what is required for a strong Cybersecurity program. Learn about why a Holistic Cybersecurity process is critical and understand what good Cybersecurity should look like with this article that was published on Forbes.

Turn Off The USB Port

Published on September 29, 2017  |  Matt Kipp – Director of Risk

Matt Kipp, Director of Risk, shares with ISACA readers why disabling USB drives is an important step in keeping your company secure.

Still Relying On Flash Player? Nine Ways The Adobe Phase-Out Will Impact You

Published on September 25, 2017

Adobe’s recent announcement of the end of updates to its Flash Player has left very few companies still using the technology, fearing potential security threats. In this article, several members of the Forbes Tech Council, including David Lefever, discuss how the lack of updates to Flash will impact those companies still choosing to rely on the technology.

15 Things Every Business Should Consider Before Buying Enterprise Software

Published on September 25, 2017

Members of the Forbes Tech Council offer advice on what entrepreneurs should do before closing a software purchase agreement. Read the full article to see what advice David Lefever has regarding running vendors through your third party risk management process.

Experts Weigh in On What Facebook’s Change to Their Messenger App Means for You!

Published on June 26, 2017

Facebook most recently announced changes to their Messenger app, transforming it into a 'social living room' David Lefever shares his insights on what this change means for users. Read the full article to see what he and other executives of the Forbes Technology Council have to say on the subject in this article from Forbes. 

How to Properly Review and Act Upon SOC Reports

Published on June 12, 2017

Shane O'Donnell, Chief Audit Executive, shares with ISACA readers tips on what to do once you've obtained the proper SOC report. Properly reviewing these reports should be taken seriously and is an important part of successful vendor management and risk management. Read the full article to learn all about what you should be doing

What Everyday Consumers Can Do To Keep Their Personal Information Safe

Published on May 30, 2017

Internet service providers are now able to sell customer data which makes protecting your personal data secure. Click below for some suggestions from David Lefever and other members of the Forbes Tech Council on how you can keep your information safe.

Nine Tips To Protect Your Company From Intellectual Property Theft

Published on May 22, 2017

Business are constantly looking for ways to successfully protect their intellectual property from ending up in the wrong hands. This Forbes article includes tips from Forbes Technology Council executives, including David Lefever, that touch on various ways companies can keep their ideas safe from former employees and the competition.

10 Effective Ways To Increase Productivity Using Technology

Published on May 16, 2017

Many think that technology can sometimes be a distraction, but when it comes down to it there are many useful programs, tools and methods out there that can help boost productivity. Several members of the Forbes Technology Council, including The Mako Group CEO, David Lefever, explain how modern devices and applications can help everyday consumers work more efficiently to help achieve business goals. 

Eight Surprising Things You Didn't Know About Your Smartphone

Published on May 3, 2017

The Mako Group's CEO, David Lefever takes part in providing some useful information about Smartphones that Forbes readers may not have known about before. Be sure to check out what he has to share on page two of this latest article from Forbes.

Weakening Net Neutrality: What It Will Mean

Published on April 25, 2017

Forbes discusses weakening net neutrality and the consequences of doing so. The Mako Group's CEO, David Lefever weighs in on the subject. See what he has to say in the article.

Why Vulnerability Management?

Published on April 18, 2017  |  Author David Lefever – CEO

A robust security program, particularly one focused on vulnerability management, doesn't have to be a daunting proposition. We'll tell you more about this important security program in this article posted to 

Incident Response – Being Prepared for the Worst-Case Scenario

Published on March 6, 2017  |  Author Joe Gates, Senior Security & Controls Advisor

Joe Gates gives ISACA readers some advice on Incident Response and how to be prepared for the worst-case scenario. 

Business Leaders in the News

Published on January 22, 2017  |  The Detroit Free Press

The Detroit Free Press announced our recent new hire of Jeff Foor. Click below to read the article from the Business Leaders in the News section of the Sunday paper. See our very own David Lefever and Shane O'Donnell in the picture above the announcement!




Finance and Insurance



State and Federal