Get Started Today!   California: (208) 329-6792   Idaho: (208) 329-6792

croom new

croom new

Marin Technologies Blog

Marin Technologies has been serving small businesses since 2006, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

7 Habits of Highly Effective PC Users

remote_monitoring_400

Security is an incredibly important part of running any business, but unless you’re a professional IT technician, you may run into a couple of roadblocks while implementing a solution. Chief among these is not knowing exactly what you’re protecting your business from. Keep the following tips in mind to reinforce your security strategy and preserve your business infrastructure’s integrity.

0 Comments
Continue reading

It's Time to Write a Eulogy for the Internet as We Know It

It's Time to Write a Eulogy for the Internet as We Know It

The Internet is prone to change. We all know this and have experienced it firsthand. Even though we may understand this reality, it can still be rather shocking when we’re confronted with it. The latest statistics show us how the current changes of the Internet have huge implications about how we’ll all interact with the web moving forward, which may spell doom for doing “online business as usual.”

0 Comments
Continue reading

Tip of the Week: How to Encrypt Files on Your Windows PC

Tip of the Week: How to Encrypt Files on Your Windows PC

Encryption is one of the most effective ways to secure a file, and even the average user can take full advantage of it on their Windows PC. In essence, you can arrange for your files to appear as random numbers, letters, and special characters in the event that an unauthorized user accesses them.You might be surprised to learn that even your  Windows PC has encryption options so that you can protect your sensitive information if so desired.

0 Comments
Continue reading

When Juggling Business Responsibilities, You Can't Afford to Drop IT Maintenance

When Juggling Business Responsibilities, You Can't Afford to Drop IT Maintenance

The business world increasingly relies on IT services. Regardless of which industry you fall into, IT will undoubtedly play a major role in how your business functions on a daily basis. Businesses also need their technology to remain in proper working order, but this is easier said than done--especially if you don’t have the luxury of an in-house IT department. Thankfully, managed service providers make this much less difficult.

0 Comments
Continue reading

Take Advantage of Big Data to One-Up the Competition

Take Advantage of Big Data to One-Up the Competition

Your business’s IT strategy is of incredible importance, especially when you consider how much your operations stand to benefit from a functional infrastructure. More than anything, though, IT can ensure that your business remains competitive in a world where the slightest advantage can mean all the difference.

0 Comments
Continue reading

Tip of the Week: Spot Spyware on Your PC Before it Spots You

Tip of the Week: Spot Spyware on Your PC Before it Spots You

Spyware is a form of malware that can quickly become a big problem. For today’s tip, we’ll go over exactly what spyware is, and how you can keep your business safe from it.

0 Comments
Continue reading

4 Steps to Getting Started With Digital Transformation

4 Steps to Getting Started With Digital Transformation

Smart business owners always look for ways to improve the way their organization functions. Digital transformation is one of these ways, as it allows for organizations to use technology to minimize waste and enhance workflow. To help you with digital transformation, we’ll walk you through what it is and how it works.

0 Comments
Continue reading

With Great Power Comes a Greater Security Risk, Study Finds

With Great Power Comes a Greater Security Risk, Study Finds

Every user on your network adds an additional level of risk, whether it be risk of user error, making a mistake that causes a data breach, or worse. One would assume that a company’s biggest risk would come from an untrained employee that disregards security policies, but surprisingly, that’s not always the case. Research has shown that a company’s CEO along with the rest of its C-level executives are the greatest security risk.

0 Comments
Continue reading

Tip of the Week: How to Get Around YouTube’s Restrictions and Play Videos on Repeat

Tip of the Week: How to Get Around YouTube’s Restrictions and Play Videos on Repeat

Anyone who has taken a stroll through YouTube knows that people love to upload music to the video sharing website. However, YouTube doesn’t inherently offer a built-in repeat function for playing videos, so if you want to watch a video multiple times, you’re out of the loop. Fortunately, there are numerous online services that allow you to repeat videos.

0 Comments
Continue reading

Because Busy Business Owners Shouldn’t Have to Worry About Technology

Because Busy Business Owners Shouldn’t Have to Worry About Technology

A business without its own IT department will expend vast amounts of time and resources to manage its technology. Tasks like managing your email solution, upgrading or managing your desktop infrastructure, or securing your network from threats, can be draining. If you don’t have time to perform these tasks, then it’s worth it to invest in an outsourced IT provider for your technology needs.

0 Comments
Continue reading

Tip of the Week: Looking to Free Up Hard Drive Space? This Free Tool Can Help

Tip of the Week: Looking to Free Up Hard Drive Space? This Free Tool Can Help

No matter how much we wish it weren’t so, all PCs have limited amounts of storage space on them. This means that the user will eventually run out of space, and they will have to find a way to resolve this issue as soon as possible so as to avoid unsaved work. Plus, your performance will take a hit, so it’s best to look for a way to resolve this issue. Thankfully, a free tool like WinDirStat can help you free up space by identifying where all of your free space is being taken up, and how you can make some wiggle room with your PC’s largest files.

0 Comments
Continue reading

The Fallout From Data Loss Isn’t Pretty

The Fallout From Data Loss Isn’t Pretty

Data loss: it’s not a fun term for any business to hear. However, when one considers all of the ramifications that data loss can have upon a business, it swiftly transitions from “not fun” to “alarming.” Have you taken the time to think about what losing your business’ data would really mean for your company?

0 Comments
Continue reading

Tip of the Week: Did You Know Microsoft Word Calculates Math Equations?

Tip of the Week: Did You Know Microsoft Word Calculates Math Equations?

You know Microsoft Word as a word processor that lets your organization compose documents. Yet, you may not know the extent to which you can use this application. You might be surprised to hear this, but you can even perform mathematical calculations using Microsoft Word!

0 Comments
Continue reading

Lowlife Ransomware Hackers Now Asking for More Than $1k Per Attack

Lowlife Ransomware Hackers Now Asking for More Than $1k Per Attack

Ransomware remains a very real threat, and is arguably only getting worse. Attacks are now able to come more frequently, and there are opportunities for even relative amateurs to level an attack against some unfortunate victim. However, this is not to say that there is nothing you can do to keep your business from becoming another cautionary tale.

0 Comments
Continue reading

100+ Years Ago, IBM Started Just Like Any Other Business

100+ Years Ago, IBM Started Just Like Any Other Business

Of the many technology companies in the public eye, IBM is one of the oldest and perhaps the most recognizable--but do you know the story behind Big Blue? It’s a history of innovation and revolution in computing that stretches back over 100 years, to when it was created by uniting three existing companies.

0 Comments
Continue reading

Tip of the Week: 11 Security Best Practices Every User Should Know

Tip of the Week: 11 Security Best Practices Every User Should Know

You might spend a significant amount of time thinking about your business’s security practices, but the same can’t be said for your organization’s employees. Unless you give them a reason to care about security, they likely won’t. The resulting apathy could eventually become serious problems that could hinder operations in the long run, or worse, expose your business to threats that could put your employees and your clients in danger.

0 Comments
Continue reading

Tip of the Week: The Windows Start Menu is the Powerful Search Tool You Didn’t Know About

Tip of the Week: The Windows Start Menu is the Powerful Search Tool You Didn’t Know About

Sometimes it can be a chore to find certain programs or files on your computer when they aren’t immediately available on the desktop. You might have to dig through countless folders just to get started on an important task. Thankfully, there’s a well-known way of getting around this frustration: Windows’ integrated search application. To get started with this week’s tip, turn your attention to the Start menu.

0 Comments
Continue reading

3 Ways Managed IT Safeguards Your Company’s Digital Assets

3 Ways Managed IT Safeguards Your Company’s Digital Assets

It’s inevitable that your organization will face some hard decisions, but no choice is as painful as pulling the plug on the one thing that you’ve dumped your heart and soul into; your business. There is a plethora of problems that could cause a business to consider shutting its doors, but often there is a solution. If technology-related costs and downtime are your main problems, managed IT services can help.

0 Comments
Continue reading

It’s Now Legal for ISPs to Sell Your Online Browsing History

It’s Now Legal for ISPs to Sell Your Online Browsing History

Due to recent legislative activity, the rules and regulations that the Federal Communications Commission put in place to protect the personal data of Internet users have been struck down. This change now allows ISPs, or Internet Service Providers, to sell the browsing information of their customers to advertisers without consent--a move many consider to be a threat to net neutrality. This is what you need to know.

0 Comments
Continue reading

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

Managing permissions for their network is something that many organizations may only consider when it’s too late to do anything about it. This can provide outsiders with access to sensitive information that shouldn’t be seen by anyone but your employees. To learn a few lessons about user permissions, let’s look at the misfortune of PA Online, a Pennsylvania-based Internet service provider.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Latest Blog

Imagine having a data backup and disaster recovery solution, thinking you’re prepared to handle anything that comes your way. Then disaster strikes and recovery is impossible. If you had tested your solution beforehand, it may have been possible to prevent this misstep entir...

Latest News

Marin Technologies is proud to announce the launch of our new updated and imroved website at https://www.marintechit.com The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.