The Sneaky Threat of ‘Internet of Things’ Devices

Many Americans have begun purchasing and installing smart devices in their homes. Unfortunately, these devices have brought about more security issues for the people whom have purchased them and society as a whole. The issue stems from the quickly increasing number of sensors and remote monitors it uses to manage overhead lights in corporate offices as well as the detailed manufacturing processes in factories. Even governments are getting on board as cities, especially, seek new ways to improve energy efficiency, lower traffic build up and improve water quality.

Can you believe there are tens of billions of these ‘internet of things’ now? They create an interconnected world with the intention of making people’s lives more efficient, secure and enjoyable. However, these same devices aren’t all fun and games. Many of them have no real security protection and are becoming what are referred to as ‘botnets’, large networks of small computers that are vulnerable to breaches by hackers.

These botnets have caused a vast amount of issues, from sending large amounts of spam mail to disrupting websites all around the world. Before, these botnets were mostly laptop and desktop computers, however, now with the growth of unsecured devices such as webcams, smart home devices, etc. their disruptive capabilities are increasing.

Most of the companies that are producing products that are the ‘internet of things’ are small and not well known (if at all) with no popular brands or public reputations to preserve. The goals of these companies are to produce vast amounts of products as cheaply as possible, so the customer’s cybersecurity isn’t of much concern for them.

Since these devices are used for a large array of things, it also means there are many vulnerabilities. Examples include weak passwords, unencrypted communications and insecure web interfaces. With hundreds of thousands of identical insecure devices worldwide, there are many targets for the hackers to attack.

Let’s say a manufacturer has set an unchangeable administrative password. A hacker can run a program that searches the internet for those devices and can take control, installing their own malicious software, which makes the device join the botnet community. The thing is, you might not even know it’s happening as the device runs normally until the hacker gives instructions. Then, they can do just about anything a computer might do, such as sending meaningless internet traffic to clog up data connections.

That type of attack, when emanating from thousands of devices at once (called a ‘distributed denial of service’) can shut down companies’ servers or even block wide swaths of the internet from being accessible publicly.

Here’s an example: A major DDoS attack back in 2016 messed with connections to Amazon, Netflix and Paypal for people east coast of the U.S…. and those are some pretty big companies! Can you believe that the attack linked to a botnet-control program created by three teenagers? These individuals were seeking to use more than 100,000 hijacked webcams and other devices around the world to gain an advantage over other players in the video game, ‘Minecraft’. Talk about serious gamers!

The size, scale and broad range of devices make this issue both an individual and public problem. Hackers can interfere with all activity if they flood the internet, or even sections of it, with meaningless content. Traffic would be standstill across towns, countries, and even police offers would have communication issues while trying to resolve the problem. Even the small devices in large numbers can work together to have huge repercussions both online and in the physical world.

7 Warning Signs of an Insider Threat

Internal threats are employees that conduct cyber-attacks on their own organization, which can cause the majority of a companies’ data loss. However, there are plenty of red flags revealed ahead of time if you know what to look for.

According to CA Technologies, over 50% of organizations suffered an insider threat-based attack in 2018, while 25% say they suffered more attacks than in the previous year… 90% of those organizations admitted to feeling vulnerable to insider threats.

Internal threats can be accidental, such as an employee mistakenly leaking information, an outsider imitating an insider with stolen credentials, or an insider seeking revenge or money. Sometimes spotting internal threats can be difficult, but there are warning signs that can help to alert the company of a potential incident before it ensues.

These attacks can be very costly. According to Ponemon, a successful internal attack costs $600,000 on average. Talk about pricey!

Insider Threat Examples

One of the most well-known insider attacks was done by Edward Snowden, the contractor that leaked thousands of documents that revealed how the National Security Agency (NSA) and other intelligence agencies operate. Chelsea Manning is another example. She leaked a large cache of military documents to WikiLeaks.

Another case of an insider: Anthony Levandowske, whom is the Otto Motors’ founder. He reportedly stole 14,000 files from Google’s Waymo autonomous car project just to start his own company. This hurt the company’s finances so much that they ended up giving a stake in its business to Google.

Let’s look at some of the warning signs of an insider threat:

1. Major changes at the organization

There are usually some obvious physical signs before the digital red flags become apparent when it comes to insider attacks.  Dr. Jamie Graves, VP of product management and security analytics at ZoneFox -a behavioral analytics company (later acquired by Fortinet) says, “Usually, there is some sort of organizational change or event that precedes an attack. The most common are if, as an organization, you go through great change- you’re going to be acquired or you’re going through redundancies.”

He goes on to say, “If you dig into it, there’ll be a reason why in there. There could be an indicating factor, and then when you talk to people in your organization they say, ‘Oh yes, Bob, he’s coming up for redundancy, or he’s failed a review, etc.’ You need to have your ducks in a row when it comes to monitoring for that sort of [malicious] behavior.”

2. Personality and behavioral changes

Personality and behavioral changes will be the  first sign of a potential insider threat. The individual could be very clearly and vocally unhappy or seeming to lack motivation. They could be talking about money troubles, working long hours, over the weekend, or spending a higher number of work hours from their home would also be indicators.

Speaking poorly on the company or discussing looking for new jobs should be taken as warning signs. Tom Huckle, lead cyber security consultant and head of training and development at Crucial Academy, a cyber-security training firm, touches on this subject. He says, “If you use LinkedIn Recruiter, you can see if your employees are searching for new roles when they opt in to the option of ‘Looking for New Opportunities. If you do not have access to this, other telltale signs could include them engaging with suspicious parties [on social media] through likes and comments.

3. Employees leaving the company

It is often likely that those leaving the company, whether by their own volition or not, are considering taking data with them. Most IP theft by insiders occurs within 30 days of an employee leaving a company. Those who have a past of ignoring safety protocol should be monitored closely. A Deloitte study showed that 50% of employees known to have been involved in insider attacks had past history of breaking IT security protocols.

4. Insiders accessing large amounts of data

If the behavioral red flags are overlooked, there will be digital warning signs that someone is actively conducting or considering an insider attack. Tom Tahany, intelligence analyst at Blackstone Consultancy, says, “Insiders no longer have to photocopy, photograph, or remove large swaths of physical documents from an office space. Rather, the downloading of several terabytes of data from an online reservoir can be done within minutes from a remote location and distributed rapidly.” The accessing and downloading of large amounts of data is a very strong indication that you have an insider threat.

5. Unauthorized insider attempts to access servers and data

Many insiders go through a reconnaissance stage, where they look into what data and/or systems they have access to. Carolyn Crandall, chief deception officer at Attivo Networks says, “ Warning sings include attempts by authorized users to access servers or data they shouldn’t be, authorized users accessing or requesting access to information that is unrelated to their roles or job duties, and theft of authorized user credentials. Whether the activity is from an authorized employee just poking around where they shouldn’t be out of curiosity, an authorized employee with malicious intentions accessing servers or data to cause damage or steal information, or an external attacker that has obtained valid credentials of an authorized user, if any of these activities are detected it is cause for alarm.”

6. Authorized but unusual insider access to servers and data

Individuals accessing areas of the database they have permission to, but would rarely/never need to access during their day-to-day operations, adjusting many files in a short amount of time, staying late/arriving earlier than usual, or repeatedly trying (and failing) to access areas they don’t have permission for are all clues that an internal attacker may be present.

7. Attempts to move data offsite

The last stage is individual(s) trying to withdrawing data. Examples of this are large downloads to external storage (USB ports, for example), big uploads to personal cloud apps (Dropbox, for example) when your organization doesn’t use that application, or large amounts of emails sent outside of the company that have many attachments.

USBs are still a functional way to remove large amounts of data with less of a footprint, remote late night downloads are also very common. Cisco’s cloud data exfiltration study discovered 62% of questionable downloads happened outside of regular business-working hours, 40% actually took place on the weekends. It is important to keep in mind that even small amounts of data can contain sensitive information that the internal attacker might want.

Jeff Williams, CTO and co-founder at Contrast Security stated, “A credit card is 12 digits from 0 to 9, easily stored in 6 bytes. That means 100,000 credit cards fits into 60KB, a million is only .6 megabytes. You could easily hide that data in a picture or document and nobody would ever detect it.”

Maintaining Employee Trust

One red flag doesn’t always mean that someone is guilty of the crime. There should be an amount of trust between employers and employees. That being said, these are the warning signs to look out for. Prevention is better than the cure. Cooperation, collaboration, and communication between departments is one step to take to create an effective insider threat management program.

27% of Healthcare Organizations Have Had a Ransomware attack in the Past Year

The Kaspersky Lab reported that 27% of healthcare employees said their organization had at least one ransomware attack in the past year. 33% of those individuals said their organization experienced multiple breaches.

In the report, Cyber Pulse: The State of Cybersecurity in Healthcare, the lab explained that in 2018, the U.S. Department of Health and Human Services’ Office for Civil Rights was notified of more than 110 hacking/IT-related data breaches that have affected more than 500 people. That’s a lot of money, not to mention how breaches can permanently damage a company’s reputation and potential harm to patients.

To investigate cybersecurity in health care, the lab used Opinion Matters, a market research firm, to do a survey of healthcare employees in the US and Canada. 1,758 were surveyed to look into the perception of these employees regarding cybersecurity in their company.

81% of small healthcare companies (1-49 employees), 83% of medium-sized healthcare companies (50-249), and 81% of large healthcare organizations (250+ employees) reported experiencing between 1 and 4 attacks.

According to the Penemon Institute/IBM Security’s 2018 Cost of a Data Breach Report, the average cost of a data breach has risen to $3.86 million. Kaspersky Lab’s 2018 Cost of a Data Breach Report reports the average cost at $1.23 million for enterprises and $120,000 for SMBs.

Of course, cybersecurity is important to prevent healthcare companies’ financial loss, but 71% said it was important to protect patients. 60% said it was important to protect the people and companies they work with.

Even though a lot of healthcare companies have a form of cybersecurity in place, many employees don’t have confidence in their organization’s strategy. As a matter of face, only 50% of healthcare IT workers were confident in their cybersecurity strategy, that fell to 29% of management and doctors, 21% of nurses, 23% of finance employees, and 13% of the HR department.

A lot of healthcare employees seem to have a false sense of security. Data breaches are being reported daily, but only 21% of respondents had total faith their organization’s ability to prevent cyber attacks and didn’t think they would suffer a single data breach in the upcoming year. Say what??

Even though 73% of employees said they’d let the security team know if they got an email from an unknown individual asking for PHI or login info, 17% said they’d do nothing. 17% of employees also confessed to having received an email request from an outside vendor for Ephi and gave them the info they requested!

Healthcare companies have become a major target for hackers because of the success they’ve had in the past. IT personnel, management, and all employees have to work together in order to accomplish the balance of training, education, and security solutions that will prevent breaches.

10 Reasons Why Security Awareness Training is a MUST


It’s smart to provide security awareness training for your employees. Why? Even with top security services, hackers keep coming up with trickier ways to fool their victims. You can’t 100% guarantee that your clients will stay safe.

Just one breach can cause tons of hours of operation to be lost, damage to the trust you’ve built with clients, and financial loss.

Here are 10 reasons why security awareness training is a MUST:

Think about it… why do you floss and brush your teeth? So that you don’t have to pay to get a cavity filled. How is your network any different? Preventative measures are cheaper than trying to fix a problem. Don’t leave the future of your business in untrained hands. Educate them!

1.Weakest Link

  • In 2016, phishing attacks were behind 90% of security breaches. Phishing attacks like these contribute to over 93% of ransomware attacks (1). So let’s be honest, users are the weakest link in the cyber security chain.

2. First and Last Line of Defense

  • Users are usually the easiest target for attackers. They can be easily fooled into opening suspicious emails, downloading bad attachments, and visiting malicious URLs. If trained properly, users will learn how to spot potential threats and can become the first line of defense.

3. Wise Investment

  • The Ponemon Institute studied phishing awareness training programs. Even the least affective progam still resulted in a 7-fold ROI(2).

4. Breaking Bad Habits

  • Investing in security awareness can help break users’ bad habits by teaching them about how important the role they play is to keeping their organization safe. Companies that provide cybersecurity awareness training see failure rates go down from as much as 25%-5% in just one year (3).

5. No Target Too Small

  • Small businesses have the same risk as large companies. Not only do they handle the data that hackers want, but they’re also less likely to have the resources to get strong security programs that the large businesses can afford.

6. High Stakes

  • An attack on a client is also an attack on your company as it can create financial and legal blows, damage customer loyalty and trust, and even threaten the survival of a business.

7. Threats Aplenty

  • There are so many different forms of threats that users won’t be able to keep up with the defense line without proper education. Just a few examples of threats are phishing, drive-by downloads, malvertising, ransomware, social engineering, code injection, and many more.

8. Work in Progress

  • Cybersecurity threats are always evolving and changing, which makes user education an ongoing necessity. Research shows that providing continuous security education for employees can reduce the risk of a cybersecurity breach by an average of 50% (4). Wow!

9. Assured Compliance

  • Different industries, such as financial services, healthcare, and energy, may face some pretty pricey fines for neglecting to provide training.

10. The Trifecta

  • Security awareness training is a win-win-win scenario. The user becomes more aware and secure, the company reduces its risks and compliance records remain in good standing, and finally the managed service provider minimizes its remediation time and costs.

Think about it… why do you floss and brush your teeth? So that you don’t have to pay to get a cavity filled. How is your network any different? Preventative measures are cheaper than trying to fix a problem. Don’t leave the future of your business in untrained hands. Educate them!


  1. “2017 Data Breach Investigations Report.” (April 2017)
  2. Ponemon Institute. “The Cost of Phishing & Value of Employee Training.” (August 2015)
  3. com. “Does Security Awareness Training Even Work?” (September 2015)
  4. Aberdeen Group. “Security Awareness Training: Small Investment, Large Reduction in Risk.” (July 2017)





The Truth About Cyber-Crime

If you own a phone, you’ve likely gotten a call with a robotic voice notifying you about something such as the IRS wanting your money or that your personal information has been stolen. If you have an email address, you have probably gotten more than a handful of spam email on any given day. While these are common occurrences, at what point are these scammers a real danger to you and your company? Let’s start with the facts.



  • 76% of websites contain vulnerabilities
  • 496,657 web attacks blocked per day
  • 1 in 965 emails is a phishing attack
  • 317M new malware variants yearly
  • 28% of malware is virtual-machine aware
  • 9M malicious web robots


Hackers tend to target the small and medium businesses because they have fewer resources, minimal security expertise, and inferior (or freeware) anti-viruses. Additionally, these companies tend to have less advanced security layers, are prone to bank online, and are less stringent on security policies.


It is important to familiarize yourself with some common suspicious qualities in emails. Here are some tips for noticing these red flags:


  • Don’t just look at the senders name, but also look at the email address it came from
  • If prompted to download files, hover your mouse over the link (do not click it) and look at the bottom left-hand corner of your window. Here, you will see the exact site that the link would direct you to. If it is a scam, there will likely be random content in the URL and the hacker link will be obvious


As cybercrime becomes more and more of an ongoing issue, the most important thing is to raise awareness within your office. With this information and these helpful tips, you will be better equipped to protect your employees and your company as a whole.

Five Online Scams to Watch for in 2018

scam alert

Online scammers never rest. They always find new ways to trick people. You must be vigilant. If you are active online, it is important to stay educated about the scammer’s methods. Here are five scams to watch out for in 2018.

Netflix Phishing Scam: Netflix has a customer base of over 100 million users. That makes it a frequent target of scammers. Some users have received an email asking them to update their billing information before their membership is suspended. If you receive such a message, be cautious. It is always risky to follow links in an email. Before updating your information with Netflix, go directly to the official website and log in from there.

Google Chrome Browser Freeze: Google Chrome is the most widely used browser, which makes it a frequent target of scammers. Upon visiting certain infected websites, Google Chrome will begin to download thousands of files. Soon after, your Chrome browser is likely to become unresponsive. Next, you receive a pop-up with a toll-free number to a fake technical support line.

This malware spreads through the use of infected ads on reputable websites, so using an ad blocker will prevent most attacks. Make sure that your computer’s virus protection is up-to-date. If your browser freezes, you can still close Chrome through the task manager by selecting Control-Alt-Delete on your keyboard.

New 2018 Microsoft Phishing Scam: Many Microsoft Hotmail, Live, and Outlook users have received fraudulent emails claiming that their account will be frozen if they don’t update to 2018 Microsoft. If you follow the link in the email, you are asked to enter your username and passwords. If you do as the scammers request, they will have access to your login information and can take control of your Microsoft-related accounts.

If you receive this message, go to Hotmail, Live, or Outlook directly. After you log in to your account, you will receive instructions if there are indeed any problems. Remember: don’t ever follow a link in a suspicious email.

FedEx Parcel Scam: Many FedEx users have received phishing emails with a subject line stating “FedEx: Delivery Problems Notification”. The scammers have created an email template almost identical to FedEx’s official email template, so beware. If the email asks for information about credit cards, invoices, or account numbers, it is not a genuine email from FedEx. If you have any questions about your FedEx account, go directly to the FedEx website and log in from there.

$1,000 Amazon Gift Card scam: This scam has been around for years, and is still a problem in 2018. Infected ads at reputable websites install adware that shows pop-ups. Once infected with the adware, you will receive a message claiming you have won a $1,000 Amazon gift card. If you click the pop-up, it takes you to a short survey. After you complete the survey, you are asked to provide personal information, such as banking details and contact information.

Never click any pop-ups that claim you have won an Amazon gift card.

Online scammers are very creative, continually developing new tools and methods. But the criminal’s best weapon always remains the same: exploiting user complacency. Even if you know the site is reputable, be suspicious when you receive emails and pop-ups. If you have a question about one of your accounts, go directly to the website and log in. Don’t ever follow a link in an email unless you are 100% certain it is authentic. Keep up-to-date on the latest scams. Be smart and stay safe.  Contact Elevated Tech today for user awareness training!

Elevated Technologies Ranked Among Top 100 Cloud Services Providers

cloud services providers top 100 list

7th Annual Talkin’ Cloud 100 Report Identifies Top Cloud Services Providers

December 5, 2017: Elevated Technologies ranks among the world’s Top 100 cloud services providers (CSPs), according to Channel Futures seventh-annual Talkin’ Cloud (TC) 100 report.

The full report is available now by visiting

Based on data from Channel Futures’ online survey, conducted between August to October 2017, the TC 100 list recognizes top cloud services providers (CSPs), including MSPs, hosting companies, cloud consultants and more. Rankings are based on annual cloud services revenue growth, and input from Channel Futures editors.

“This is a great honor and very humbling to be mentioned alongside other great CSPs around the globe,” said Jason Rorie, Founder, Elevated Technologies. “We are dedicated to providing the best solutions for our clients.  Leveraging our CSP and MSP practices, allows us to do just that – be the best IT partner possible.”

“On behalf of Channel Futures, I would like to congratulate Elevated Technologies for its recognition as a Talkin’ Cloud 100 honoree,” said Nicole Henderson, a contributing editor at Channel Futures who oversees the TC 100 project. “The organizations on this year’s list demonstrate everything from technological prowess to thought leadership to business excellence across a number of functional disciplines. If you want to understand where the market is heading, watch these companies in 2018.”

About Elevated Technologies

If you want more from your IT support company and are in need of a robust system to solve even your most challenging technology problems, your solution starts with Elevated Technologies. With Houston’s most advanced team of IT support experts and one-of-a-kind IT solutions, even your most challenging technology problems are no match for Elevated Tech. Our team of IT support experts implement advanced technology strategies, leveraging IT as a competitive advantage. Our mission is to create a personal, trusting relationship with every client in order to serve each business to the fullest.

About Informa

The Channel Futures brand is part of Informa which operates at the heart of the Knowledge and Information Economy. It is a leading business intelligence, academic publishing, knowledge and events business. With more than 7,500 employees globally, it has a presence in all major geographies, including North America, South America, Asia, Europe, the Middle East and Africa.  For additional information on Informa, visit and for information on Channel Futures, visit


Elevated Technologies:

Elevated Technologies Marketing

Channel Futures:

Nicole Henderson, Content Director, Channel Futures and ITPro

Improving and Optimizing Your Windows 10 Experience

improving and optimizing windows 10

The improvement features introduced in Windows 10 make it one of Microsoft’s most successful operating systems. However, poor PC management practices can still detract from the user experience. Here are several ways to improve these practices and ensure a high quality operating system.

Windows 10 has advanced security features, but it can still experience issues when you are not up-to-date on the latest protection and practices. Many forms of malware or viruses can enter this operating system, so consider doing a thorough scanning of your PC at weekly or bi-monthly intervals. If you make a habit of scanning your PC and updating antivirus programs, you can improve your chances of staying virus-free. Please contact us at Elevated Technologies with any questions or concerns about malware or viruses.

Another measure of PC performance is the amount of RAM space you have. Having more RAM equates to a faster PC. Consider adding at least 4 gigabytes of RAM for a 32-bit PC, or 8 gigabytes for a 64-bit system. You can look into adding more if you plan on using your PC for design, video-editing, gaming, or other intensive processes. You can also monitor the bandwidth MHz rating of your PC’s memory. The higher the MHz rating is, the better your PC will perform.

If you have not installed Windows 10 yet, then this next step can apply to you. Before installing the operating system, determine whether you have a hard disk drive (HDD), or solid state drive (SSD). Generally, Windows 10 performs at a more optimized level on an SSD over an HDD.

Keeping drivers for your devices and motherboard updated is also essential for an optimized PC. You can find updated drivers by simply going to your device manufacturer’s website. Each driver update can help keep your PC components running efficiently. Before downloading a driver update, look into whether it is compatible for a 32-bit or 64-bit Windows operating system.

Many internet service providers (ISPs) promote fast bandwidth, but they can also overwhelm your system. When this happens, the loading speeds of programs can be affected. To prevent this, use a faster DNS server such as Google Public DNS. Once you have found the one you want to run with, set it as your primary DNS server in your TCP/IP settings.  Questions about your IT network configuration can be solved by Elevated Technologies’ Managed IT Services

Lastly, one of the most important factors to maintaining a perfectly running PC is to ensure the operating system itself is updated. These updates are critical since they can fix bugs and patch up security vulnerabilities. Windows 10 updates are generally available on the second Tuesday of every month, but other updates can be released as a response to security threats. Be sure to make the time to install these updates, as they can extend the life of your operating system. Once you have developed a habit of making regular security updates and upgrading to the most compatible hardware, you can ensure the best Windows 10 experience.

Elevated Tech Named to 2017 CRN Next-Gen 250 List

Elevated Technologies Recognized on 2017 CRN Next-Gen 250 List

Annual List Features Trailblazing Solution Providers Transforming Business with Emerging Technologies

Houston, TX, November 8, 2017 – Elevated Technologies, announced today that CRN®, a brand of The Channel Company, has named Elevated Technologies to its 2017 Next-Gen 250 list. The annual list recognizes standout IT solution providers who have successfully transformed their businesses to meet the demands of emerging technologies such as cloud computing, IoT, virtualization, mobility, business analytics and business intelligence. These solution providers, all in business for fewer than 20 years, have adapted to an evolving marketplace with a notable penchant for bringing key technologies to their clients before they become mainstream.

Elevated Technologies has provided Houston businesses with innovative IT support and technology solutions since 2006. Our IT leadership team strives to offer our high-end technology services at a price point that fits seamlessly into your’ business initiatives.  We believe in providing the most powerful IT support systems with delivery that focuses on providing distinct solutions to meet the unique IT needs of each individual client.

“We are honored and humbled to be part of this list,” said Jason Rorie, Founder of Elevated Technologies.  “We strive to say on the cutting edge of technology to best serve our clients.”

“This group of solution providers is leading the way when it comes to emerging technologies, bravely stepping into the uncharted territory of next-generation IT solutions ahead of their peers,” said Robert Faletra, CEO of The Channel Company. “Our 2017 Next-Gen 250 list is comprised of relatively new companies as well as established ones, all sharing the common thread of successful, trailblazing solutions designed to meet an unprecedented set of customer needs. We congratulate each team on its vision and contribution to the overall advancement of the IT channel.”

A sampling of the Next-Gen 250 list will be featured in the December issue of CRN. The complete list will be available online at

 Tweet This:

@TheChannelCo recognizes @elevatedtech in 2017 @CRN #CRNNextGen250

About the Channel Company

The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers and end users. Backed by more than 30 years of unequaled channel experience, we draw from our deep knowledge to envision innovative new solutions for ever-evolving challenges in the technology marketplace.

Follow The Channel Company: Twitter, LinkedIn and Facebook

Melanie Turpin

The Channel Company

(508) 416-1195

Elevated Technologies Launches New Website and Branding Initiative.

Elevated Technologies Launches New Website & Branding

Elevated Technologies, a company that provides Managed IT and Cloud Services, announces today the launch of its new website and branding initiatives. This newly redesigned website offers quick and easy access to essential information and features that offers a more comprehensive understanding of the company’s core services.

The new site has a clean uncluttered design, improved functionality and enhanced rich content focused on the company’s mission to provide word class IT services to the Houston market. The new website goes live today, November 1, 2017 and is located at the same address:

We are excited about our new website launch and new branding.  We feel this website conveys the message we want to stress to our clients and future potential clients.  Elevated Technologies is all about the relationship, correct level of service and understanding budgets.

Elevated Tech’s new website will be updated on a regular basis with news of product launches, business activity, corporate milestones and events. Visitors are encouraged to explore the website and sign up for direct emails from the company HERE.