Get Started Today!   California: (208) 329-6792   Idaho: (208) 329-6792

The Boise, Twin Falls, Jerome, Magic Valley | Inland Empire and Los Angeles IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Marin Technologies, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

If you have questions about whether or not our IT services platform is right for your business, simply complete and submit this form and one of our trusted IT professionals will promptly respond to your query!

What Our Clients Say

  • I don’t know if I can say enough about Marin Technologies.
    President, Concordia Finance, Inc. / Rancho Cucamonga

    I don’t know if I can say enough about Marin Technologies. I have known Steve Marin for 8 years. He was working for another company at the time but still made us feel like his only client. He even recommended a person to be our in house I.T. manager. The relationship continued as an additional source for our I.T. issues. When our I.T. manager left the company, Marin Technologies had been established. It was an easy decision to make the transition.

  • Marin Technologies treats me like I am their only and most special client.
    President, Accredited Tax, Inc. / Chino, CA

    The uniqueness I have experienced is one of being treated like I am their only and most special client. The response time and willingness to help and wide range of knowledge of technology is beyond my expectations of any firm.

  • Marin Tech provides excellent service with personal attention
    Engineering Manager, Yardney Water Filtration Systems, Inc. / Riverside, CA

    Marin Tech provides excellent service with personal attention, we always get the expert tech!

Latest Blogs

How Augmented Reality is Changing the Face of Industries

Defining AR

To be clear, augmented reality is the real-time process of adding information to reality via cameras and displays. A few familiar examples can be found in common applications and games, like the filters on Snapchat that turn you into a cartoon character, or that bring Pokemon into “reality” in Pokemon Go. Many businesses have devised ways of utilizing AR in their marketing, as well.

AR’s Drawbacks and Opportunities

One of the biggest hurdles to AR innovation has always been the limitations of the devices that the technology would be found on. As a prime example, consider the size of most smartphones. While screens are getting larger, most devices feature a display that is fewer than seven inches long - hardly the immersive experience that AR has the potential to be. However, this isn’t exactly stopping companies in their efforts to integrate AR. There are quite a few reasons that AR can now be considered viable:

Connections are Faster

4G LTE connections helped AR find a foothold, but the expansion of 5G has simply made AR a more practicable technology. AR needs a lot - a lot - of information to work, so as bandwidth continues to rise, so will the functionality of augmented reality.

Hardware is Improving

On a related note, hardware has improved greatly, making it more capable of handling AR’s assorted demands - things like processing power, and the quality of a device’s sensors. As these improvements continue, AR will only become a more available option.

Wider Adoption and Application

Many organizations are coming up with various new ways to leverage AR to their advantage. Marketing agencies have used AR as a means of boosting engagement with their efforts and initiatives. It has proven useful in training applications in various industries, especially training and development - delivering information to students and workers at the time it is needed.

Reduced Costs

Of course, as AR becomes more common, it also becomes more affordable for a business to deploy. As more applications and devices become able to support it, its costs should only continue to trend down.

It has become apparent that AR will play a big role in the future of many industries - so, what is your impression of all of this? Is AR just a gimmick, or do you see truly legitimate uses for it in the business environment? Discuss it in the comments, and don’t forget to subscribe!

Learn More

Stop Trusting Hackers With Your Smartphone!

You probably know how to do most everything using your smartphone, but how much do you know about basic security? Today, we will share tips to ensure your defense is adequate against cyberattacks. 

Lock Your Device!

This one is simple. Your smartphone should have a passcode or a passphrase. Why is this? A smartphone without a lock, sure is easy to access. This simple security measure is a very effective one. Some smartphones even come with a standard fingerprint or facial recognition feature, making unlocking your device take little to no extra time. 

Neglecting to lock your device ultimately puts you at the mercy of anyone who might stumble upon it. Lock it!

Protect Your Device by Capping Wireless Connectivity!

Wireless connections can be equally as hazardous to your device as someone who simply plugs it into their laptop. Your device likely has numerous ways to connect wirelessly: Bluetooth, NFC communications, Wi-Fi, all pretty standard connection options. However, failing to turn your connection capabilities off while dormant, could mean a cybercriminal is connecting unbenounced to you. 

Stop Giving Unused Applications Access!

Have you ever downloaded an application that didn’t come standard with your device? Whether you realize it or not, you were given a prompt to accept or deny permissions. If you installed the application, chances are you accepted those (potentially deceiving) permissions. Let’s put it into real world terms. You go to a driving range, and request a bucket of balls. The clerk puts the balls right in front of your face, but tells you in order to receive them you must accept the following:

You must allow him to view every photo and every message within your device from this point forward, allow the ability to enable or disable your microphone at any given time, and even allow him to view every contact within your device. Do you accept? 

When you accept permissions on downloaded applications, that does not mean they are actively viewing your photo gallery. It doesn’t mean they are monitoring every text you send; it just means that they could if they wanted to. So why do simple flashlight apps or gaming apps request so much information? Well, the data you actively transfer is often sold to advertising companies to ensure they are trying to sell you things that YOU like. 

If you’ve had the same application on your phone for months without using it a single time, then you can live without it. Deleting this application means not only will you be spammed with less ads, but you free up storage, and better enhance the security of your device. If “Golfing Simulator 2017” is hacked and data is breached for all users, you won’t fall victim.

Keep It Updated!

The primary reason that updates are now reoccurring is for operating systems to shore up any cybersecurity issues that become apparent. This simple update procedure ensures you are able to stay one step ahead of cybercriminals. Neglecting to update your device in a timely manner leaves you susceptible to a cyberattack. 

Following these simple tips will help you keep your smartphone secure. If your smartphone shares access to some (or all) of your business data, maintaining these best practices will also boost the security of your business! For more detailed means of securing your technology, call our experts at Marin Technologies today by dialing (208) 329-6792.

Learn More

Microsoft is Releasing Out-of-Band Security Updates

The two vulnerabilities were patched off of Microsoft’s typical “patch Tuesday” schedule that sees the software giant release bug fixes every second Tuesday of the month. The fact that they broke their patch schedule suggests that the two vulnerabilities were critical for their customers. Let’s take a look at the two updates and how they’ll function to secure Microsoft products. 

Internet Explorer Zero-Day

The first, and obviously most significant patch, is a zero-day vulnerability found in Internet Explorer, the antiquated (and much maligned) Internet Browser that comes on most Microsoft operating systems. Since this is a zero-day event, the vulnerability had already been exploited in places. 

Little is known about the vulnerability, but Microsoft did call it a remote code execution exploit that if accessed could give a user control over the user account of another. The attack requires phishing an Internet Explorer user onto a malicious website, but once there, an attacker would be able to gain access over the user account of the visitor. 

Luckily, IE currently has an active market share of under two percent, but attacks have already happened so remaining vigilant about the use of IE, and your network’s patch management is key to keeping this particular vulnerability from causing problems for your organization.

Microsoft Defender DOS Bug

The other issue fixed in the out-of-band patch was a denial of service vulnerability in Microsoft Defender. The antivirus program ships with all Windows 10 PCs and is a core component in Windows 10’s sterling security record. 

The bug itself isn’t much of an issue. To successfully exploit it an attacker would need unfettered access to a computer and the ability to execute some code. It disables Windows Defender components and gives people with access (and the ability to code) the chance to completely take over a system with malware or other more sophisticated programs. 

Keeping your software patched and running smoothly is extremely important. Reach out to our expert IT technicians today to see how Marin Technologies can help you manage your system updates and software management at (208) 329-6792.

Learn More

Know someone who would benefit from Marin Technologies? Let us know!

Latest Blog

AR, or augmented reality, has been touted as the next “big thing” for nearly a decade, while other “big things” have been introduced. Google Glass almost made AR more commonplace, but security and privacy concerns turned it into a non-starter. Today, AR has taken a new life,...

Latest News

Marin Technologies is proud to announce the launch of our new updated and imroved website at https://www.marintechit.com The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.