Get Started Today!   California: (208) 329-6792   Idaho: (208) 329-6792

The Boise, Twin Falls, Jerome, Magic Valley | Inland Empire and Los Angeles IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Marin Technologies, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

If you have questions about whether or not our IT services platform is right for your business, simply complete and submit this form and one of our trusted IT professionals will promptly respond to your query!

What Our Clients Say

  • I don’t know if I can say enough about Marin Technologies.
    President, Concordia Finance, Inc. / Rancho Cucamonga

    I don’t know if I can say enough about Marin Technologies. I have known Steve Marin for 8 years. He was working for another company at the time but still made us feel like his only client. He even recommended a person to be our in house I.T. manager. The relationship continued as an additional source for our I.T. issues. When our I.T. manager left the company, Marin Technologies had been established. It was an easy decision to make the transition.

  • Marin Technologies treats me like I am their only and most special client.
    President, Accredited Tax, Inc. / Chino, CA

    The uniqueness I have experienced is one of being treated like I am their only and most special client. The response time and willingness to help and wide range of knowledge of technology is beyond my expectations of any firm.

  • Marin Tech provides excellent service with personal attention
    Engineering Manager, Yardney Water Filtration Systems, Inc. / Riverside, CA

    Marin Tech provides excellent service with personal attention, we always get the expert tech!

Latest Blogs

The Four Corners Your Network Security Needs to Cover

Patch Management

Despite being an essential tool for business use, software can always be improved… as evidenced by the endless stream of updates and patches that software developers release. Cybercriminals have taken notice and will try to use these software issues to their advantage. This is what makes it so important to promptly install the update packages that will resolve these vulnerabilities and prevent them from causing any ill effects.

While many businesses will test the update before implementing it—assuming that their patches are managed at all—these tests need to be completed expeditiously to avoid as many risks as possible.

Device Control

If a device connects to your network, you need to have some say over its security. This needs to be a universal policy with both company-owned devices and those that belong to your employees. This will enable you to prevent any vulnerabilities from gaining access to your business by coming in on devices that have connected to an insecure network in the past.

With more people than ever before now working remotely, you need to make sure that all your team members can complete their responsibilities without undermining your security. As their home networks are likely far less secure than your business one should be, implementing a virtual private network should be seen as a priority.

Benchmarking

You need to keep track of the solutions you are using, and how well the security you have implemented is protecting your solutions. Accomplishing this is as simple as comparing your own performance with that which should be expected with the protections you’ve put in place. These evaluations can provide the data you need to inform your security improvements so that the largest vulnerabilities you possess can be resolved expeditiously.

Identity Management

Finally, we need to discuss how well your users and their permissions are managed. Controlling access to different data by virtue of an employee’s need to access said data can offer considerable benefits to your overall security.

As for how these permissions should be granted, many security professionals will recommend that you require multiple authentication measures to be provided before allowing access, rather than a password requirement alone. Shifting to multi-factor authentication will help keep unwanted visitors out of your systems by making it far more difficult for them to obtain and input the proper credentials in time. Some common MFA approaches include the use of time-sensitive generated codes also being required for account access, or the use of a physical security key or biometric pattern.

Your security is crucial to your success. Trust us to help protect your network.

At Marin Technologies, our IT experts are well-practiced with the solutions that can greatly improve your security, as well as the best practices necessary to maintain your infrastructure’s viable productivity. Ready to find out what we could do for you? Give us a call at (208) 329-6792 today.

Learn More

When Your Contacts Aren’t Your Contacts - Display Name Spoofing

A cybercriminal really couldn’t care less how much trust you share with your many contacts unless they can use that trust to their advantage. That’s why phishing scams exist, and why a particular approach to them—display name spoofing—can be particularly effective.

Let’s go over what display name spoofing is, and how to prevent it from infiltrating your business.

Understanding Display Name Spoofing

Display name spoofing is a tactic that many hackers will include in their phishing attacks. Phishing is a scam where a cybercriminal will reach out, posing as someone else or as an organization, to subvert your security by manipulating someone in your business. By spoofing their display name, these attacks are made even more effective. Let’s break down how display name spoofing works.

Email signatures are common in the business world, which gives cybercriminals who use display name spoofing an advantage. Once the cybercriminal selects their target, they intently research that target to find someone who might be able to influence their behaviors and then target them posing as that someone.

As a result, display name spoofing could look something like this:

Looking closely, the only sign that something here is questionable is the email address… and considering that some email clients don’t show the full address by default, many employees may not even consider that an email isn’t legitimate.

How to Fight Back Against Display Name Spoofing

Consider the kinds of security you should have implemented around your business. You lock the doors, you may have security cameras, and you should have some access control policies to make sure that your employees can use the resources they need to do their jobs. Similar security measures should be put in place to protect your digital assets as well.

To do so effectively, you need to have a strategy in place that acknowledges the hard reality that your business will be faced with a phishing attack. As a crucial part of this, your team needs to be trained so they are ready to spot these attacks and respond accordingly.

Here are a few ways you can gauge whether a message can be trusted or not:

  • Thoroughly inspect both the name and sender’s email address before you act.
  • Check the content for misspellings or completely incorrect uses of grammar.
  • Consider if the sender would send a message asking you to take cavalier action.
  • Consider if the sender would ask you to send them authorization credentials through email.

If one of your team members ever doubts the veracity of an email they receive, you need to be sure that they know to—and how to—properly verify it. Doing so generally takes minutes and can significantly reduce the risks that display name spoofing presents.

For more assistance in identifying cybersecurity threats and training your team how to respond as they should, reach out to Marin Technologies. Give our professionals a call at (208) 329-6792.

Learn More

Taking a Look at Some Innovative Smartphones

LG Wing

The LG Wing is the first device we are going to look at that has changed things up. It looks like a standard smartphone would, but when you get it in your hand a flick of the thumb changes everything. The LG Wing has a 6.8-inch P-OLED display that flips up to horizontal and exposes a smaller 3.9-inch G-OLED display that’s housed underneath. 

The Wing is built from aluminum and Gorilla Glass 5 front and back and runs on the Qualcomm Snapdragon 765G. It carries 8 GB of RAM and a 4,000 mAh battery that lasts a little longer with the lack of a premium chipset. The tri-camera setup includes a 64-megapixel wide angle lens and dual ultrawide angle lenses of different speeds.

As unique as the form factor is, the LG Wing presents some innovative new options for users and software developers alike. It is currently available in Aurora Gray and Illusion Sky and will be coming to most carriers soon.

LG Wing
Body: Aluminum with Gorilla Glass 5 Front and Back
Display: 6.9-inch Dynamic AMOLED 2x (~511 ppi)
OS: Android 10
Chipset: Qualcomm Snapdragon 765G
Memory: 8 GB RAM
Expandable Memory: Yes (microSDXC)
Cameras: Rear - 64 MP (wide), 13MP (ultra wide), 12 MP (ultra wide) Front - 32 MP (wide)
Sounds: Loudspeaker, No Headphone Jack
Battery (endurance rating): 4,000 mAh (87 hours)
Security: In-screen fingerprint reader
Miscellaneous: Accelerometer, Gyrometer, Proximity, Compass, IP54 dust/water
Other versions: None

Samsung Galaxy Z Fold2

As smartphones go, the Galaxy Z Fold2 may be the most gratuitous device currently available. Built on an aluminum frame with glass and plastic, the Galaxy Z Fold2 acts like a traditional smartphone when it is folded with a 6.23-inch Super AMOLED display, but when unfolded, the user gets a huge 7.6 inch display that resembles a tablet. 

The device offers specs similar to the Samsung flagship with a Qualcomm 865+ processor, three cameras, and a standard 4,500 mAh battery. It features two selfie cameras, one for each display. With two displays and three sets of cameras, Samsung has eschewed efficiency for a dedication to the form factor. 

Available in Mystic Bronze, Mystic Black, and a Thom Browne Edition Grey, you can get it today from most major carriers. 

Samsung Galaxy Z Fold2
Body: Aluminum with plastic front and Gorilla Glass 6 back
Display: Folded: 6.23-inch Super AMOLED Unfolded: 7.6-inch Dynamic AMOLED 2X (~373 ppi)
OS: Android 10
Chipset: Qualcomm Snapdragon 865+
Memory: 12 GB RAM
Expandable Memory: No
Cameras: Rear - 12 MP (wide), 12 MP (telephoto) 2x, 12 MP (ultra wide); Front (Folded) - 10 MP (wide); Front (Unfolded) - 10 MP (wide).
Sounds: Stereo Speakers, No Headphone Jack
Battery (endurance rating): 4,500 mAh (87 hours)
Security: Fingerprint reader
Miscellaneous: Accelerometer, Gyrometer, Proximity, Barometer, Compass, Bixby assistant
Other versions: 5G version

Samsung Z Flip and Motorola RAZR 

The Samsung Z Flip and the Motorola RAZR take the nostalgia of the flip phone and turn it into something special. Utilizing the old form factor of the popular flip phone, each device flips open to reveal a smartphone. Pretty ingenious if we may say so.

The Motorola RAZR 5G is actually the second edition smartphone RAZR. Motorola has built a device that features a small display on the front of the phone while folded, but the real gem is the 6.2-inch P-OLED screen while unfolded. The RAZR runs Android 10 on a Qualcomm Snapdragon 765G chip and 8 GB of RAM with 256 GB of onboard storage space. 

The Z Flip is Samsung’s attempt at making a similar device, and in many ways they do it better. The Z Flip doesn’t have much of a front facing display, but when you open the device you get a 6.7-inch Dynamic AMOLED smartphone display that is in line with many of the largest phones currently available. The Z Flip runs Android 10 on a powerful Qualcomm Snapdragon 865+ processor, the best one Samsung uses at the moment. This provides a Samsung phone experience on a phone that you can fold up and put in your pocket. 

Eventually these thin, flexible OLED screens will allow manufacturers to do some really neat things, but to get the technology off the ground, they will need to make devices that will sell immediately. Latching onto the nostalgia of flip phones is a great way to finance additional innovations. 

Samsung Galaxy Z Flip
Body: Aluminum with Plastic Front and Glass Back
Display: Folded: 1.1-inch Super AMOLED; Unfolded: 6.7-inch Foldable Dynamic AMOLED (~425 ppi)
OS: Android 10
Chipset: Qualcomm Snapdragon 865+
Memory: 8 GB RAM
Expandable Memory: No
Cameras: Rear - 12 MP (wide), 12 MP (ultrawide). Front - 12 MP (wide)
Sounds: Loudspeaker, No Headphone Jack
Battery (endurance rating): 3,300 mAh 
Security: Fingerprint reader
Miscellaneous: Accelerometer, Gyrometer, Proximity, Barometer, Compass, Bixby assistant, IP68 dust/water resistant
Other versions: No

Motorola RAZR 5G
Body: Aluminum with plastic, Gorilla Glass 5
Display: 6.2-inch P-OLED (~373 ppi)
OS: Android 10
Chipset: Qualcomm Snapdragon 765G
Memory: 18 GB RAM
Expandable Memory: No
Cameras: Rear - 48 MP (wide)
Sounds: Loudspeaker, No Headphone Jack
Battery (endurance rating): 2,800 mAh
Security: Fingerprint reader
Miscellaneous: Accelerometer, Gyrometer, Proximity, Barometer, Compass, Bixby assistant
Other versions: RAZR (2019)

The rectangular smartphone isn’t going anywhere, but the more that manufacturers are able to create innovative new devices with OLED technology, the more people will be willing to pay a premium price for unique smartphone designs.

What are your opinions of these devices? Should smartphone companies explore new form factors more, or is the traditional smartphone good enough? Leave your thoughts today in the comments section below. 

Learn More

Know someone who would benefit from Marin Technologies? Let us know!

Latest Blog

Network security is paramount to a business’ success with the number of security incidents and data breaches that could potentially upend it. While this sounds like a task of marginally epic proportions, managing your security can be greatly simplified via a few basic activi...

Latest News

Marin Technologies is proud to announce the launch of our new updated and imroved website at https://www.marintechit.com The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.