Get Started Today!   California: (208) 329-6792   Idaho: (208) 329-6792

The Boise, Twin Falls, Jerome, Magic Valley | Inland Empire and Los Angeles IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Marin Technologies, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

If you have questions about whether or not our IT services platform is right for your business, simply complete and submit this form and one of our trusted IT professionals will promptly respond to your query!

What Our Clients Say

  • I don’t know if I can say enough about Marin Technologies.
    President, Concordia Finance, Inc. / Rancho Cucamonga

    I don’t know if I can say enough about Marin Technologies. I have known Steve Marin for 8 years. He was working for another company at the time but still made us feel like his only client. He even recommended a person to be our in house I.T. manager. The relationship continued as an additional source for our I.T. issues. When our I.T. manager left the company, Marin Technologies had been established. It was an easy decision to make the transition.

  • Marin Technologies treats me like I am their only and most special client.
    President, Accredited Tax, Inc. / Chino, CA

    The uniqueness I have experienced is one of being treated like I am their only and most special client. The response time and willingness to help and wide range of knowledge of technology is beyond my expectations of any firm.

  • Marin Tech provides excellent service with personal attention
    Engineering Manager, Yardney Water Filtration Systems, Inc. / Riverside, CA

    Marin Tech provides excellent service with personal attention, we always get the expert tech!

Latest Blogs

Tip of the Week: Old Mobile Devices Still Have Value

Remote into Your Home Desktop

Inside your average workplace, the Wi-Fi connection is widely available. By connecting your old phone to your Wi-Fi you can do quite a bit. One thing you can do is install apps on both your home machine and your mobile device (or your work machine and your mobile device) and use the old mobile to set up a remote connection to your home device. The more connected you are to the data you use, the more you can do.

Make It a Video Conferencing Hub

Using your old smartphone as a conferencing hub is a great way to communicate with contemporaries, customers, friends, and family. All you need to make it work is a stand of some sort, a power source, and a Wi-Fi connection.

Find Use at Your Desk

You can give an old device function by using it as a desk clock, a photo frame, or a calendar. Even if you don’t have a mobile carrier connected to the device, you can still use the app stores over a Wi-Fi connection.

Turn it into a Security Camera

If you feel as though you need a bit of extra security, you can use your old phone as a security camera. You will need to download an application that will allow you to view a live feed from the phone, but then all you need to do is ensure it is plugged in and positioned the way you want. This wouldn’t be a great replacement for a dedicated physical security system, but it’s good for keeping track of your pets.

If you don’t have plans for your old device, you can resell it if it’s in good shape or you can dispose of it. If that is the route you are going to go, contact Marin Technologies at (208) 329-6792 and our IT experts will help you recycle your device responsibly and properly. 

Learn More

ISPs Altering Service Strategies for Coronavirus

Here, we’ll provide a quick list of what each provider is offering during the pandemic at the time of writing this.

AT&T

  • Late payments are no longer subject to fees or termination of service
  • AT&T hotspots are now accessible to the public
  • Data caps and overage fees have been eliminated

Comcast

  • Late payments are no longer subject to fees or termination of service
  • Comcast hotspots are now accessible to the public
  • The 1TB data cap has been paused
  • Data speeds have risen to 25/3 megabits per second
  • All new and existing customers of the Internet Essentials plan get two months of free service

Spectrum

  • Households with school/college-aged kids can get two months of 100Mbps broadband and Wi-Fi free of charge for 60 days
  • Spectrum hotspots are now accessible to the public

T-Mobile (Including Sprint, After Their Merger)

  • Late payments are no longer subject to fees or termination of service
  • Customers get unlimited data and 20GB of hotspot data
  • Select countries impacted by COVID-19 can be called for free

Verizon

  • Late payments are no longer subject to fees or termination of service for residences or small businesses
  • Verizon hotspots are now accessible to the public
  • The transition to 5G service is also being accelerated

Keep in mind that most of these changes are likely only going to apply for the time that the coronavirus continues to impact daily life, although the predictable frustration of returning to the status quo may be enough to sway these providers into making these changes permanent. Time will only tell.

How has your business been impacted by the COVID-19 outbreak? Share your experience in the comments.

Learn More

Your Cybersecurity Policy Will Come to Define Your Business

Establish Definitions 

It is important to first identify what you define as a cyber incident. Do you limit that to simply some threat coming in from outside of your network? Does it include malfunctioning hardware or corrupted software that is on your network? You will need to define what your aims are. All cybersecurity is in place to protect your data and network against threats. By identifying those threats you will be able to more succinctly strategize what protections you will need to put in place.

You will also want to make an effort to document everything in a manner commensurate with your internal staff’s cybersecurity competency. For organizations with cybersecurity novices, using layman’s terms to describe these definitions will make it simpler for them to understand exactly what the plan is. 

Establish Processes

Once your threats are defined, you will want to start educating your staff. The best way to do this is to establish easily defined processes that work with the express purpose of keeping threats off of your network. That means making standards that apply to all types of situations. This includes a remote worker contingency, what qualifies for acceptable use of company bandwidth, and how to establish the authentication protocols that will dictate access to the systems you are aiming to protect. It should also be noted that your business may be mandated to provide a certain degree of proof-of-security or increased transparency because of federal, state, or industry regulations so you should alter your processes to fit those demands.

As you document your cybersecurity policies, you will want to ensure that you have the following information:

  • What protections are in place (and what they protect against)
  • What backup policies are in place
  • What the updating/patching process looks like regarding your protections

You will also want to make sure that any documentation has your continuity information in case your staff will need to recover data as a result of a cybersecurity problem. 

Establish Accountability

Once your processes are implemented and documented, you will need to make sure that your staff is given the training they need to properly understand what you are trying to accomplish. This step is extremely important. Your staff needs to understand how their actions could have negative (and positive) outcomes for the entire business.

You will want to go over most of the threats they will encounter, like phishing messages, and how to spot and eliminate the threats. You will want to describe the steps you have taken to keep the business safe. Most won’t understand the firewalls and the antivirus solutions that you use. They will shrug off monitoring and react impulsively against solutions that impede on how they use their personally-owned devices. 

Most employees will take a cue from a manager that takes these things seriously, and react in turn. Some won’t, and need to know that there will be consequences for actions taken out of negligence, or worse yet, animosity. If you know that you can trust your staff to carry out their duties without putting the whole business at risk, giving them every reason to trust that your cybersecurity initiatives are there to protect their jobs, your clients, and your business technology you can trust that they will react with diligent action.

If you are looking to implement cybersecurity procedures and need help finding solutions, training staff, and documenting your plan, call the IT experts at Marin Technologies today at (208) 329-6792. 

Learn More

Know someone who would benefit from Marin Technologies? Let us know!

Latest Blog

Most smartphone users like to get a new phone every year or two. This isn’t just because the hardware or software on newer devices are better, but because after two years, many people have dropped their devices a half dozen times and there are cracks and dings in the device....

Latest News

Marin Technologies is proud to announce the launch of our new updated and imroved website at https://www.marintechit.com The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.