Get Started Today!   California: (909) 287-3621 | (208)-316-4357   Idaho: (208) 316-4357

The Boise, Twin Falls, Jerome, Inland Empire and Los Angeles IT Experts

We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Marin Technologies, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

If you have questions about whether or not our IT services platform is right for your business, simply complete and submit this form and one of our trusted IT professionals will promptly respond to your query!

What Our Clients Say

  • I don’t know if I can say enough about Marin Technologies.
    President, Concordia Finance, Inc. / Rancho Cucamonga

    I don’t know if I can say enough about Marin Technologies. I have known Steve Marin for 8 years. He was working for another company at the time but still made us feel like his only client. He even recommended a person to be our in house I.T. manager. The relationship continued as an additional source for our I.T. issues. When our I.T. manager left the company, Marin Technologies had been established. It was an easy decision to make the transition.

  • Marin Technologies treats me like I am their only and most special client.
    President, Accredited Tax, Inc. / Chino, CA

    The uniqueness I have experienced is one of being treated like I am their only and most special client. The response time and willingness to help and wide range of knowledge of technology is beyond my expectations of any firm.

  • Marin Tech provides excellent service with personal attention
    Engineering Manager, Yardney Water Filtration Systems, Inc. / Riverside, CA

    Marin Tech provides excellent service with personal attention, we always get the expert tech!

Latest Blogs

Have You Considered What You’re Really Losing When You Lose Your Phone?

To get started, let’s think about the information that’s being put at risk. Here is a list of information that could possibly be stolen from mobile devices--a surprising amount of data for most users, to say the least.

  • Payment information: The applications on your device could potentially be storing credit card numbers or bank routing numbers, which could become problematic if stolen. Hackers could make off with all of your precious, hard-earned cash.
  • Passwords and usernames: If you use your device’s web browser, it’s likely that you have passwords and usernames saved on it--even if it’s been done accidentally. These usernames and passwords can be stolen from the device, or used on the device by whoever is accessing it.
  • Application data: There are a lot of applications installed on your business’ devices, and these applications store lots of information that a hacker could have a field day with. Even if applications are locked behind a login screen, these accounts can be infiltrated if the login credentials are stored on the device
  • Cloud storage: Access to cloud storage is one of the best things about mobile devices, but if you lose one, you’ll be compromising any sensitive data that your account has access to. Any information that’s shared with your device will be accessible by whoever finds your misplaced device.
  • Social media accounts: If you have social media applications on your device, it’s likely that you have the password and username saved to the device. This means that anyone who finds your device will have access to your social media accounts, ready to use for whatever vile purposes they want.
  • Email: You’d be surprised by how much information you keep hidden in your email inbox. Think what would happen if any of your countless messages was accessed by a hacker who has found your smartphone. Now THAT’s frightening!
  • Contacts: You might not think the people you associate yourself with are valuable targets for hackers, but they certainly are. Contact lists for both business and personal use hold a lot of value, as it essentially becomes a list of potential targets to hit with phishing scams.

Keeping all of this in mind is of the utmost importance, especially if you want to make sure your mobile devices don’t become a liability in the event of a loss scenario. To learn more about how you can secure your business’ devices, reach out to us at (909) 287-3621 | (208)-316-4357.

Learn More

Encrypt and Protect Your Data with a VPN

There is fortunately a relatively simple means of doing so, through a virtual private network. You may have heard of virtual private networks, or VPNs, during the debate on net neutrality and the Federal Communications Commission’s verdict. Many plan to thwart the FCC’s plans to give Internet Service Providers the power to sell their users’ browsing habits to advertisers through the use of VPNs. In addition to defying the loss of net neutrality, VPNs can play a key role in your business and its security.

A VPN works by encrypting data as it is sent to and from important assets on a given network, including the Internet. The data is jumbled while in transit, so if it is intercepted, all the interceptor would see would be a jumbled mess of letters, numbers, and symbols. This renders the stolen data effectively useless to the thief, as the time it would take to manually decrypt the data makes it no longer worth it. With a VPN installed on your device, both the data you send and the data you receive is protected by military-grade encryption.

It might be helpful to picture the data you send as a letter, but instead of just sending your letter unprotected and vulnerable, you’ve locked it in a special box. This box can only be opened by another with the key, so if the box were to be intercepted in transit, the thief wouldn’t be able to open it. As a result, your letter to your friend is still safe.

It is for this reason that a VPN can help protect a business from data loss of any size. A word of warning, however: you will want to utilize a VPN that is suitable for use by an enterprise, capable of securing each device on your network. Marin Technologies can help set your business up with a VPN that suits your needs. To get started, call (909) 287-3621 | (208)-316-4357.

Learn More

Tech Term: HTML vs Plain Text

Hyper Text Markup Language (HTML)
HTML is the language used by most web browsers. Basically, it’s the accepted standard for web content. HTML was initially developed by CERN, the European Organization for Nuclear Research, back in the 1980s by Sir Tim Berners-Lee. HTML is the standard by which a browser displays a web page’s content, using tags to determine what exactly is being displayed.

In fact, HTML is the reason why this sentence can be displayed as its own paragraph, separate from the rest of the page.

A web browser looks at the HTML code and translates it into a layout that can easily be read by whoever visits the page. HTML allows for a lot of text customization, including the bold, italic, and underlined text that you might see all over the place. Hyperlinks are just HTML tags that lead to other pages online, as well. You could say that the Internet as we know it today was built off of the concept of HTML.

Plain Text
You can think of plain text as the opposite of HTML. It’s what you get when you get rid of any and all formatting. Punctuation and paragraphing are preserved, but styling is removed, more or less.

HTML is used to create fancy text that is designed to capture attention, whereas plain text is quite simple. Plain text websites barely even exist anymore on the modern Internet, and chances are that they haven’t been updated in years if you ever run into one. They were commonly used over a decade ago when the primary reason to be running them was to embrace slow dial-up Internet connections.

Email Uses
HTML and plain text both have their own specific uses in web design, but they can also both be used in various ways for your email messages. It all depends on what kind of message you want to send. You can use HTML to create something that catches the eye of a potential client or recipient, or you can use plain text to build something simple.

Both HTML and plain text have distinct advantages and disadvantages. HTML can tell a dynamic and visually appealing story, which is great for email campaigns and branding. HTML can also help you track who opens which email, and how often. Despite these great features, HTML messages are also more likely to be flagged as spam or sorted into the wrong folder.

On the other end of things, plain text emails are easy to write, and formatting has never been simpler. These messages can be read on any device, and they rarely run into deliverability problems. However, plain text isn’t as appealing, which makes them easier to set aside and forget about. Plain text also can’t easily be tracked, which means that you aren’t going to know how successful these messages are or how often they reach the intended audience.

Hopefully we have cleared up some of the confusion surrounding these two tech terms. Do you have any that you would like to learn a little more about? Let us know below in the comments.

Learn More

Know someone who would benefit from Marin Technologies? Let us know!

Latest Blog

Losing a smartphone can be a problem for anyone. For the modern business, it can really cause issues. Mobile devices are notorious for housing a lot of personal information, which makes them extraordinarily dangerous to lose track of. How much is at stake with mobile devices...

Latest News

Marin Technologies is proud to announce the launch of our new updated and imroved website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.