In 2018 Q1, two Milwaukee-area Technology Startups raised a total of $3,253,734. Congratulations to basic-code and GenoPalate, both of Brookfield, WI.
Also in 2018 Q1, three Madison-area Technology Startups raised a total of $1,425,007. Congratulations to VIP Crowd, GymDandy, and EnsoData.
Together, Milwaukee-area and Madison-area Technology Startups raised a total of $4,678,741!
As always, the following caveats apply to the above graph and findings:
- All information is from FormDs.Com.
- To be included as a Madison-area or Milwaukee-Area Technology Startup Funding event on this report, the business must be located in the Madison-area or Milwaukee-area as defined by FormDs.Com; the business must be in the Technology Industry Group (which includes Computers, Telecommunications, and Other Technology); and the business must not be publicly traded.
- I’m not a startup funding professional or an accountant. If there’s something wrong with this report, be nice, tell me directly or LEAVE A COMMENT, and I’ll do my best to correct it.
One of my younger readers, Ally, is a Girl Scout working toward her Financial Literacy badges. She and her mother wrote to to thank me for one of the articles on this blog. In addition, Ally recommended that I add the following site to my list of resources:
i checked it out and it is indeed a useful page for those interested in being an entrepreneur! Great suggestion, Ally!
Yesterday afternoon I gave a brief talk at the ISSA Milwaukee Chapter on Security Tools for 2013. You can find a copy of my slides on my Presentations Page.
Recently, I helped a client recover the password to a Microsoft Excel spreadsheet. In doing so, I came up with a few best practices for password recovery services:
- Prior to starting any work on a password recovery project, the service provider should require the client to sign an agreement where by the client:
- Attests to ownership of the system or file and their right to engage the service provider to recover the password;
- Gives permission to the service provider to recover the password to the system or file; and
- Gives permission to the service provider to access the system or file for the purpose of confirming that the password recovery was successful.
- Best practices for the communication and storage of passwords should be applied to recovered passwords. For example:
- Don’t communicate passwords in clear text;
- Don’t store passwords in clear text; and
- Change passwords if there’s any chance they’ve been compromised.
- The provider and the client should have a reciprocal non-disclosure agreements in place.
Do you have any additional ideas for best practices for how password recovery service providers and clients should work together? If so, leave a comment!
I’ve added several new organizations to my ‘Milwaukee-area Information Security Resources‘ page.