Get Started Today!   California: (909) 287-3621 | (208)-316-4357   Idaho: (208) 316-4357

The Boise, Twin Falls, Jerome, Inland Empire and Los Angeles IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Marin Technologies, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

If you have questions about whether or not our IT services platform is right for your business, simply complete and submit this form and one of our trusted IT professionals will promptly respond to your query!

What Our Clients Say

  • I don’t know if I can say enough about Marin Technologies.
    President, Concordia Finance, Inc. / Rancho Cucamonga

    I don’t know if I can say enough about Marin Technologies. I have known Steve Marin for 8 years. He was working for another company at the time but still made us feel like his only client. He even recommended a person to be our in house I.T. manager. The relationship continued as an additional source for our I.T. issues. When our I.T. manager left the company, Marin Technologies had been established. It was an easy decision to make the transition.

  • Marin Technologies treats me like I am their only and most special client.
    President, Accredited Tax, Inc. / Chino, CA

    The uniqueness I have experienced is one of being treated like I am their only and most special client. The response time and willingness to help and wide range of knowledge of technology is beyond my expectations of any firm.

  • Marin Tech provides excellent service with personal attention
    Engineering Manager, Yardney Water Filtration Systems, Inc. / Riverside, CA

    Marin Tech provides excellent service with personal attention, we always get the expert tech!

Latest Blogs

Could You Identify a Social Engineering Attack?

Why Social Engineering Works
One of the main reasons that social engineering can be such an effective tactic for cybercriminals is because, rather than telling the target what they want to hear, the target is told what they expect to hear. By coming forward under the guise of someone who should be coming forward, the cybercriminal is able to extract information from unwitting staff members, adding to their intel through intensive online research.

These are the key factors that allow these kinds of attacks to be as successful as they are. The methods used by social engineers aren’t the kind that immediately come to mind when one thinks about cyberattacks. Since the attack doesn’t typically resemble more well-known threats like ransomware, these attacks are often able to infiltrate their target without any suspicion. Additionally, there is an excess of information available online, known as open-source intelligence, that provides the social engineer with the knowledge they need to craft their approach.

This open-source intelligence can come from a variety of places, making the social engineer’s job that much easier. There is plenty of information readily available on the Internet, all it takes is looking in the right place.

Sample Information
While it’s no secret that there is a ton of information online, the true scope of what is available can be alarming when all laid out. The following information can all be found if one knows where to look, and is by no means a comprehensive list of what is there:

Technological Details
Considering how valuable a cybercriminal would find the details of what technology is used in a business, these details are remarkably easy for cybercriminals to find. Companies will often show their hand in online job postings, identifying the hardware and software that they use in order to find someone with the experience. This not only ensures that qualified applicants send in their resumes, it also allows cybercriminals to send in the exploits needed to take the company down. Social media posts can also share this information--the wrong picture could give access to networking hardware and other critical and sensitive data.

Employee Data
On the topic of social media, sensitive company information can easily leak through oversharing. Employee activities that are shared or tweeted can provide a cybercriminal with crucial insights. Images can create an even bigger problem. If not scrutinized before posting, you can inadvertently display key details, from the data on the screens to the model of the computer that holds the data.

Furthermore, employees using social media carelessly can deliver more invaluable data for a cybercriminal to leverage. Discussing work schedules or even sharing specifics of work experience can potentially put your business at risk.

External Companies
Unfortunately, social engineering attacks can leverage data that you have minimal control over against your business as well, as other companies and vendors you do business with may share their experience with you as evidence of their value. Furthermore, if your janitorial services and trash pickup providers aren’t secure, your data could be stolen after it has left your property.

So while it is absolutely critical to leverage cyber protections for your data’s security, including solutions like firewalls and authentication measures, your employees also need to have their eyes peeled for the threat of social engineering. Every business needs to have a plan to avoid and mitigate the threat of social engineering. Marin Technologies can help.

For more information, call (909) 287-3621 | (208)-316-4357.

Learn More

Tip of the Week: Comparing the Pros and Cons of Desktops and Laptops

Is a Laptop or Desktop the Better Option?
As you might expect, this question more or less hinges on your particular need of mobility. If you find yourself conducting business in various places in (and perhaps occasionally out) of the office, the mobility of a laptop will likely serve you better than a desktop would. Conversely, if your work is more or less contained to the office, a desktop may be more appealing than a laptop. While other factors may also influence your choice, mobility should be one of your primary considerations.

Some other factors to keep in mind are the cost of upkeep of your systems, as well as its intended use. Desktops are often the more cost-effective option, and maintenance is quite often easier. Additionally, a computer capable of more resource-intensive projects--like video editing or CAD rendering, for instance--will cost more, but a laptop will see a faster price increase than a desktop will.

ROI
A desktop can sometimes provide a better return on investment, as they tend to upgrade easier than laptops. This can increase its useful lifetime, allowing your business to remain competitive longer. Another consideration would be reducing your carbon footprint, as you reduce the amount of material going to the landfill.

Checking the Specs
As we just touched on briefly, your intended use of the device should influence your decision considerably. Depending on what you need the computer to be capable of for your business purposes, you may have different requirements than someone else from your organization. For instance, if you primarily use your computer for communications and administrative management, you will not need the same capabilities as someone who regularly uses theirs for advanced, resource-intensive operations. Your role in your organization, as well as the industry you are a member of, will have an impact on this. After all, some industries rely on more data than others, and will therefore have more to manage.

If you’d like assistance in establishing what your particular computing needs are, and which device would serve you best, don’t hesitate to reach out to Marin Technologies for help.

Bargain Hunting
Again, depending on your industry, what qualifies as a good deal for you may be very different than what is considered a good deal for another company that serves a different audience and has different needs. On top of this, there’s also the need to find a reliable vendor who can deliver the technology you need at a reasonable rate - a process that can take an exceptionally long time.

Working with Marin Technologies can help make this process much quicker. You can leverage the relationships we’ve developed with these vendors to get the best deal, while still focusing on your business and leaving negotiations to us.

To discuss your needs and how allowing Marin Technologies to manage your vendors can help fill them, reach out to us at (909) 287-3621 | (208)-316-4357.

Learn More

Remote Monitoring and Maintenance Keeps Your Business In Business

Internal IT departments may resolve an issue in a particular way, but that’s only if you can afford to hire an internal IT department. If you are like many other small businesses, you might find that outsourcing is a more viable approach to IT maintenance and management. There’s nothing to be ashamed of--outsourcing is great for a lot of reasons.

For an example, consider the difference between short-term spending and long-term spending. Short-term means that you get instant gratification in most cases, whereas long-term spending means that you’re investing in the future. In this instance, support costs are more effective when they have the long-term mindset. The reason for this is that you ultimately minimize any damage done to your systems, as well as any costs associated with those damages, by preventing them from happening in the first place. This is accomplished through a remote monitoring and management agent.

Remote monitoring and management, or RMM, allows managed service providers to handle most issues regarding your technology without an on-site visit. Using our agent, we can monitor your network’s resources to ensure that everything is flowing as efficiently as possible, as well as notice any security updates that need to take place before your weaknesses are taken advantage of by a hacker. We can even remotely deploy patches and security updates to each of your workstations, server units, and network devices to ensure that nobody can take advantage of your security discrepancies easily.

The main advantage of utilizing a RMM is that it requires little to no actual hands-on work from your in-house workforce. It’s handled exclusively by your outsourced managed service provider. In this way, it’s almost like an automated solution all on its own. We can handle most issues that your business runs into in such a way that you won’t even notice problems until they’re already resolved. This lets your business focus primarily on its own operations without being hindered by IT troubles, but more than anything else, it makes service accessible when it’s needed--not when it’s most convenient for an on-site visit.

While some issues might still need an on-site visit to resolve, we try to keep those to a minimum--not because we don’t want to travel to help you, but because your company benefits most from swift, prompt service. To learn more about Marin Technologies’s remote monitoring and management solution, reach out to us at (909) 287-3621 | (208)-316-4357.

Learn More

Know someone who would benefit from Marin Technologies? Let us know!

Latest Blog

Social engineering can allow a cybercriminal to access networks without being hampered by the security solutions that a business has in place. Through the manipulation of the human element of a company, its critical resources are exposed. In order to protect your business ag...

Latest News

Marin Technologies is proud to announce the launch of our new updated and imroved website at https://www.marintechit.com The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.