Matrix-NDI Technology Blog


What is Ransomware and what does it do?

Defending against ransomware requires IT planning, certified technologists, and involvement from everyone at your company to be truly successful. To...


Why Disaster Recovery Planning is Important

Disaster recovery planning is crucial to safe business operations. A disaster recovery plan is the steps taken before, during, and after a disaster

IT Infrastructure

What is Structured Cabling?

Structured Cabling is building telecommunications cabling infrastructure - it is the backbone technology required for your front end computers and...

Wireless Connectivity

Wired vs. Wireless Network: Which is Better?

Wired and wireless networks require robust structured cabling. The difference is where the cables are located in your space, and how your devices...

IT Infrastructure

7 Ways to prevent a ransomware attack - Part 2

IT network diagrams &device audits from an IT Network Assessment help chose IT network defensive technologies to prevent against a ransomware attack.

Wireless Connectivity

Wi-Fi 6 Explained

Wi-Fi 6 is the latest generation of wireless internet bringing performance improvements aimed at reducing limitations from its predecessors.

IT Infrastructure

7 Ways to prevent a ransomware attack - Part 1

Ransomware, esp. for Enterprise IT, is a data hostage situation. Hackers lock your data, request ransom & return your data when paid in...

Structure Cabling Solutions

How Does Fiber-Optic Cabling Work?

Fiber-optic cabling is comprised of strands of glass or plastic that transmits data by pulses of light. Fiber-Optic cabling is faster than copper...

IT Infrastructure

The Industrial IT Revolution

We are experiencing an industrial IT revolution. The manufacturing industry is adopting new IT Infrastructure technology


Cyber Intrusion Detection Systems

An intrusion detection system (IDS) is a software that works with your network keeping it secure from someone trying to break into your system.


The NIST Cybersecurity Framework

The Cybersecurity Framework was created by the National Institute of Standards and Technology (NIST) for reducing cybersecurity risk.


The Beginner's Guide: Facial Recognition

Facial recognition is a system that uses biometrics to map out distinct features from a photo or video of a person’s face. Here we will discus the...


Visitor Management Systems

Visitor Management is a system that allows you to track every person who enters your building or space. This includes badges, movement tracking, and...

Cloud-Based Communication

Contact Center as a Service (aka CCaaS)

Simply put, a contact center is who your customers reach out to when they need to speak with a customer service representative.

Structure Cabling Solutions

Fiber Optic Cable 101

Fiber optics are a buzzword we hear quite frequently in the telecommunications world. Here we will go into what fiber optic cabling is and its...

Wireless Connectivity

5G Explained

nless you lived completely off the grid for the past 2 years, you have undoubtedly heard the term 5G. 5G stands for fifth-generation cellular...

Cloud-Based Communication

UCaaS - The Breakdown of Cloud Communication

We are all tired of acronyms and buzzwords, so here is a simple breakdown of cloud communications and UCaaS. What is it? Why do I need it? It's...

Technician Spotlight

Q1 Technician Spotlight: Don Tinsley

Our 2020 first quarter tech spotlight is Don Tinsley! We are excited to share some fun facts about him and are so grateful to have him on our team.