UDT’s Mariana Lugaro Appointed to the Florida Advisory Council on Small and Minority Business Development

(UDT), a leading national provider of technology solutions and managed services in the United States
Share on facebook
Facebook
Share on google
Google+
Share on twitter
Twitter
Share on linkedin
LinkedIn

Doral, Florida — UDT, Inc. (UDT), a leading national provider of technology solutions and managed services in the United States, today announced that its Director of Sales Enablement, Mariana Lugaro has been appointed to the Florida Advisory Council on Small and Minority Business Development. The advisory council, whose mission is to provide insight and expertise to the state to further development and economic opportunities for small and minority businesses, is part of The Department of Management Services (DMS), the business arm of Florida government.

“The members of the Florida Advisory Council are instrumental in providing critical knowledge regarding the unique challenges small and minority businesses encounter,”

said Secretary Poppell who appointed UDT’s Lugaro along with other members from various small businesses and government entities that focus on diversity and equity.

“I’m honored to be appointed to this advisory council and for the opportunity to improve engagement and support of Florida’s woman-, veteran- and minority-owned small businesses,” said Lugaro.  For more information about the council, please visit the DMS website.

Focus time, money, and effort on what really matters

Let’s build success together. 

More to explore

SOC Solutions

The 9 Main Benefits of SOC Solutions

The Security and Operations Center (SOC) is where the cybersecurity strategy of a business is coordinated and implemented. It is composed of the three building blocks of people, processes and technology that go hand in hand to manage and enhance the organization’s security posture.

Multi-Factor Authentication

Seven Benefits of Multi-Factor Authentication

Hackers are using increasingly sophisticated tactics to gain data access. Email phishing, keylogging, brute force attacks and social engineering are among the variety of ways to gain access credentials.

Just one more step

Please fill out the following form,