Microsoft 365 Business Admin Guide: Securing and Managing Microsoft 365 Business Download Free E-Book →
Emergency? Urgent?
Please Call 763.593.3017 or 888.707.3017


When you work with SUCCESS, you have the opportunity to share your computer screen, mouse and keyboard with one our help desk technicians. Using this technology, we can see what you see on your screen. We can diagnose and fix problems as if we were sitting at your desk. We can demonstrate tricks and tips to help you in the future. Of course, when we disconnect, we cannot get back unless you permit it.

To share your desktop, enter your session code and click Connect.


Our Customer Support Portal provides a window into our internal service ticketing, invoicing and knowledge base systems. Using it, you'll be able to create, modify or close a support ticket (or just give us some instructions or information). You'll also be able to access pdf copies of each of your invoices and service statements, while also viewing statistics about your use of our services. What's more, each service ticket becomes a searchable knowledge base article, created only for the people within your organization.

You'll be given access to our Customer Support portal when you sign up for our Managed Services. Please contact us if you need help.

To access our Customer Support portal, click the launch button below.



Click the button below to send an email to our support team. To better serve you, please include the following information in your email:

  • First and Last name
  • Company name
  • A detailed description of your problem
  • Preferred way to be contacted
  • Best times to reach you
Email Support

News for
& St. Paul

How to use Microsoft Flow to automate simple, repetitive tasks

By Alex Fields, Senior Solutions Architect, SUCCESS Computer Consulting

Use Microsoft Flow to publish a file to SharePoint and post about it in Teams

Today I want to walk you through a simple custom Flow that I have created to help streamline a process that I use to prepare and publish blog articles, with the help of my team.  Even though this is a specific use case, the Flow that I am building has many possible applications. Before we…

Don’t DIY your cybersecurity: Why managed security services are perfect for small-to-medium businesses

By SUCCESS Computer Consulting, Inc

As a small business owner, we know you wear many hats. Any given day can probably find you dabbling in everything from accounting to HR to customer service, and for that, you have our utmost respect.

There is one area, however, where that do-it-yourself attitude can get you into some serious trouble, and cost you some serious coin: cybersecurity.

Hiring an in-house tech might not be a cost-effective option depending on your business and…

Is All Security the Same?

By SUCCESS Computer Consulting, Inc

With an increasingly technology-dependent business world, companies of all sizes are being forced to hop on the bandwagon and integrate technical systems seamlessly into all aspects of their operations. Unfortunately, with more technology comes more threats. For the SMB market, or small and medium-sized businesses, the need for high-quality security systems is critical. The bad guys don’t just use one method to compromise your cybersecurity, and that’s why…

What is Security?

By SUCCESS Computer Consulting, Inc

Security includes two primary components:

  1. identifying unauthorized users who may have access to your systems, and
  2. protecting your information and preventing those users from accessing it.

By having a strong security practice in place, you can protect your data in case of accidental or intentional destruction or disclosure. In a world where technology is now ubiquitous, it is becoming increasingly important to maintain data safety. Securing your…

Leadership and Unconventional Wisdom: Setting Objectives

By Bruce Lach, President, SUCCESS Computer Consulting

I’ve been in a lead or management role since 1980, so as you might imagine, after all that time I have some opinions about how to lead an organization. For much of that time I was a student of conventional business thinking and wisdom, but for the last decade or so, I’ve been able to put much of that conventional wisdom to the test (working with more than 100 companies in a consultative, turnaround,…

5 Ways to Implement Next-Level Security with Microsoft Office 365

By Alex Fields, Senior Solutions Architect, SUCCESS Computer Consulting

Recent research by the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency revealed that many Office 365 tenants in the United States are left wide open, leaving them vulnerable to attacks and exploits.

Why? They weren’t properly configured. That isn't to suggest that Office 365 is an inherently risky platform; it’s just that, like any other technology, it’s only as secure as you are willing to make it.


Is your DNS at risk?

By Eric Hassler, Field Technician, SUCCESS Computer Consulting

A plea to enforce security access controls on your Domain Name System provider.

Even if you have an otherwise multi-layered defense, the tiniest cracks can bring down even the most security-hardened systems. These days, many system administrators and IT or cybersecurity professionals are laser-focusing on hardening individual endpoints and monitoring internal infrastructure, always mindful of that latest vulnerability needing to be patched.

While those steps are necessary, they don't hit everything. In 2017,

Stay Connected
Sign up for our monthly newsletter