UDT Selected as Finalists in 2016 Good to Great Awards Award for Enterprise Excellence

The Greater Miami Chamber of Commerce has selected UDT
Share on facebook
Facebook
Share on google
Google+
Share on twitter
Twitter
Share on linkedin
LinkedIn

[av_heading heading=’UDT Selected as Finalists in 2016 Good to Great Awards Award for Enterprise Excellence’ tag=’h1′ style=’blockquote modern-quote’ size=” subheading_active=” subheading_size=’15’ padding=’10’ color=” custom_font=”][/av_heading]

[av_hr class=’invisible’ height=’40’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’]

[av_one_full first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=”]

[av_textblock size=’14’ font_color=” color=”]
Company Announcement

Date: April 27th, 2016

The Greater Miami Chamber of Commerce has selected UDT (UDT) as a finalist of the 2016 Good to Great Award which showcases businesses throughout the tri-county region that have achieved greatness in their mission and established themselves as industry leaders.

Award finalists are recognized as businesses that show a pattern of transitioning from a solid performance to great performance over a four-year period, while also demonstrating proven leadership and a solid and consistent workforce.

The award will be presented this Thursday, April 28 during the annual Good to Great Awards luncheon hosted by the Chamber.
[/av_textblock]

[/av_one_full]

Focus time, money, and effort on what really matters

Let’s build success together. 

More to explore

Multi-Factor Authentication

Seven Benefits of Multi-Factor Authentication

Hackers are using increasingly sophisticated tactics to gain data access. Email phishing, keylogging, brute force attacks and social engineering are among the variety of ways to gain access credentials.

Just one more step

Please fill out the following form,