Get Started Today!   California: (208) 329-6792   Idaho: (208) 329-6792

croom new

croom new

Marin Technologies Blog

Marin Technologies has been serving small businesses since 2006, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Network Security Basics

Tip of the Week: Network Security Basics

The modern threat landscape is filled with horror stories of people that have been the victim of software vulnerabilities, hackers, and situations that could have been managed differently. Today, we will go over some of the best ways to keep your business from being a victim of a data breach, data theft, or malware attack.

0 Comments
Continue reading

Ransomware Revisited

Ransomware Revisited

Ransom: a sum of money is demanded in order for the release of goods.
Software: the programs and other operating information used by a computer.

What do you get when you combine the two? Ransomware. 

0 Comments
Continue reading

Opening the Cybercriminal Toolbox

Opening the Cybercriminal Toolbox

People’s exposure to cybercrime has been increasing for some time. Today, people with very little coding experience can infiltrate systems and steal data. There is demand for data, and now there is a supply of low-cost--or even free--hacking tools available on the dark web that allows people to get closer to that data. In fact, according to a report by Deloitte entitled Black Market Ecosystem: Estimating the Cost of “Pwnership”, there is a complete economy built around these readily-available hacking tools that are relatively easy to use.

0 Comments
Continue reading

Diagnosing a Man-In-the-Middle Attack

Diagnosing a Man-In-the-Middle Attack

The man in the middle has a lot of power and influence over the end result, and this is true even in the technological world. In fact, there are attacks dedicated to this vector, twisting and turning something that your organization needs into what amounts to a threat. We’ll discuss what a Man-in-the-Middle (MitM) attack is, as well as what you can do to combat these threats.

0 Comments
Continue reading

Have You Implemented These Security Best Practices?

Have You Implemented These Security Best Practices?

If your business hasn’t put protections in place for your technology infrastructure, that needs to be moved to the top of your to-do list, yesterday. It isn’t as though the increasing number of threats are going to avoid you until your network is prepared to deflect them. Therefore, you need to take action now. To help, we’ll review some of the most important security considerations to make for your organization.

0 Comments
Continue reading

How to Identify If an Email is a Security Risk

How to Identify If an Email is a Security Risk

There’s one major reason why email is the preferred method of spreading threats like ransomware and other types of malicious software. The sheer number of messages that can be sent through email on its own increases the odds that a user will click on the wrong link or download the wrong attachment. How can you know the legitimacy of any message you receive in your email inbox?

0 Comments
Continue reading

Take These Steps to Make IT Security Top of Mind

Take These Steps to Make IT Security Top of Mind

Here’s the thing about IT security: it requires a little more than a decent firewall and a reasonably-strong password. We talk a lot about how to ensure that your business’ network stays a top priority, and the best way to do that is to implement what we call a Unified Threat Management (UTM) solution. An enterprise security system like a UTM can provide a considerable improvement for the way you protect your organization, but even something as simple as a little bit of user error could bypass these protocols.

0 Comments
Continue reading

Why CPA Firms are in Danger of Being Hacked

Why CPA Firms are in Danger of Being Hacked

The Internal Revenue Service has declared to tax professionals that they must take extra steps toward protecting the information of taxpayers. Certified Public Accountant (CPA) firms, whether they are large organizations or small businesses, hold much information that could be used by hackers and identity thieves, which makes them major targets during tax season.

0 Comments
Continue reading

2018 is Expected to See $96 Billion in IT Security Investments

2018 is Expected to See $96 Billion in IT Security Investments

If you were considering increasing your investment into your information security in 2018, you certainly aren’t alone. Gartner released a report that indicated a considerable rise in plans to invest in key security considerations.

0 Comments
Continue reading

Without These Tools, Your Network Isn’t Secure

Without These Tools, Your Network Isn’t Secure

Your business might have a limited budget, but this shouldn’t hold you back from implementing the best and strongest security solutions. However, security is a complicated process for any business. This is problematic, especially since common threats and vulnerabilities show up frequently in the business environment. We’ll walk you through some security basics so that you can optimize your organization's protection.

0 Comments
Continue reading

Data Security Must Be a Priority for Your Organization

Data Security Must Be a Priority for Your Organization

After 143 million people had their personal information put at risk in the Equifax data breach, it comes as no surprise that data security is an even hotter topic than usual. As much as you’d like to think that a breach like that would never happen to your business, this is an unrealistic hope that won’t do you any good if the threat of a data breach does come around. It is much better to be prepared.

0 Comments
Continue reading

Network Security Needs To Be A Team Effort

Network Security Needs To Be A Team Effort

Network security is more than just a conscientious attempt by your staff to protect your organization’s digital assets. It’s making sure that your employees know how to handle dangerous situations, implementing preventative IT measures to eliminate potential issues entirely, and having the right technology experts on-hand to handle tough problems that can’t be solved by a few pieces of technology.

0 Comments
Continue reading

FBI Warns of Potential Cyber Attack on Electric Grid

FBI Warns of Potential Cyber Attack on Electric Grid

While it’s not particularly common for hackers to attack physical infrastructure, the few that have occurred have been known to be quite catastrophic. For example, the Ukrainian power infrastructure was taken out by hackers just last year, leaving hundreds of thousands of citizens without power for several hours. In fact, now western countries are believed to be threatened by similar attacks.

0 Comments
Continue reading

New Maktub Locker Ransomware Knows Where You Live

b2ap3_thumbnail_ransomware_maktub_400.jpgRansomware is so common in the world of online threats that even the FBI has labeled it a massive threat to businesses of all kinds. Unlike other types of malware, ransomware has a unique return on investment that’s measurable and highly lucrative for hackers. A new variant of ransomware called Maktub Locker lures victims into a false sense of security by tailoring phishing emails to match their street address.

0 Comments
Continue reading

5 Cloud Security Issues that Every Business Has In Common

b2ap3_thumbnail_cloud_security_400.jpgSecurity is a primary concern for businesses that take advantage of the cloud, but the industry often dictates to what extent a business is concerned about cloud security. Yet, despite the varying cloud needs of industries, there are several variables that should be addressed when thinking about cloud security, including data permissions, account compromisation, and, of course, malware and other common online threats.

0 Comments
Continue reading

Tip of the Week: 5 Steps You Can Take to Bolster Network Security

b2ap3_thumbnail_checklist_for_it_400.jpgNetwork security is more important today than it’s ever been before, especially in light of several concerning developments in targeted hacking attacks. Unfortunately, many employees (and even some employers) don’t know or understand how to follow various security best practices. By ensuring that every single one of your employees understands the importance of cybersecurity, you can exponentially increase your organization's network security.

0 Comments
Continue reading

Tip of the Week: How to Prepare Your Organization for The Internet of Things

b2ap3_thumbnail_internet_of_things_security_400.jpgMost devices that are being produced these days are aiming for the “connectivity” angle, be it simply connecting to the Internet, or allowing you to stay connected to something specific through the cloud. While this does wonders for productivity and online interaction, some users approach these devices without considering the state of online security. October is Cybersecurity Month, so there’s no time like the present to ask yourself how trends in Internet of Things security can affect your organization.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Latest Blog

AR, or augmented reality, has been touted as the next “big thing” for nearly a decade, while other “big things” have been introduced. Google Glass almost made AR more commonplace, but security and privacy concerns turned it into a non-starter. Today, AR has taken a new life,...

Latest News

Marin Technologies is proud to announce the launch of our new updated and imroved website at https://www.marintechit.com The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.