Emergency? Urgent?
Please Call 763.593.3017 or 888.707.3017

Remote
Control

When you work with SUCCESS, you have the opportunity to share your computer screen, mouse and keyboard with one our help desk technicians. Using this technology, we can see what you see on your screen. We can diagnose and fix problems as if we were sitting at your desk. We can demonstrate tricks and tips to help you in the future. Of course, when we disconnect, we cannot get back unless you permit it.

To share your desktop, enter your session code and click Connect.

Customer
Support

Our Customer Support Portal provides a window into our internal service ticketing, invoicing and knowledge base systems. Using it, you'll be able to create, modify or close a support ticket (or just give us some instructions or information). You'll also be able to access pdf copies of each of your invoices and service statements, while also viewing statistics about your use of our services. What's more, each service ticket becomes a searchable knowledge base article, created only for the people within your organization.

You'll be given access to our Customer Support portal when you sign up for our Managed Services. Please contact us if you need help.

To access our Customer Support portal, click the launch button below.

Launch

Service
Request

Click the button below to send an email to our support team. To better serve you, please include the following information in your email:

  • First and Last name
  • Company name
  • A detailed description of your problem
  • Preferred way to be contacted
  • Best times to reach you
Email Support

Technology
Events for
Minneapolis
& St. Paul

How to Identify a Spear Phishing Email

By Brandon Nohr, CTO SUCCESS Computer Consulting
Pause. Think. Act.

More than 90% of cyberattacks begin with a spear phishing email. Spear phishing emails aren’t just a generic piece of spam, they’re emails from your boss with your company signature or from your credit card company warning you of some recent activity on your account. Spear phishing attacks are getting more sophisticated and are becoming harder and harder to detect. In this week’s Pause. Think. Act. video, Chief Technology Officer…

Why the White House email spoofing prank scared me, and why it should scare you too

By Brent Morris, Vice President of Business Development

On August 1st, a report was issued that detailed email exchanges between senior-level White House officials and a prankster out of England. It was a simple spoof email in which the officials were duped into communicating openly with someone that was not who they said they were. The officials that were recently tricked included former White House Communications Director Anthony Scaramucci, Ambassador to Russia Jon Huntsman, and Eric Trump. They were quick to…

Social Engineering: What to Look For and How to Protect Yourself

By Brandon Nohr, CTO SUCCESS Computer Consulting
Pause. Think. Act.

In this week’s Pause. Think. Act. installment, we’ll discuss the broader topic of social engineering. Social engineering is one the most effective types of cyber attacks. No matter how much money you spend on security tools and resources to defend against the bad guys, social engineering can circumvent most of these efforts. In these types of attacks, cyber criminals leverage and manipulate human behavior, and there’s not much security tools…

What does a good password look like?

By Alex Fields, Project Engineer SUCCESS Computer Consulting, Inc.
Pause. Think. Act.

Most people know not to use the password “Password1” to protect their private information at work or online. But, there is a bit more to the story than that. Yes, you want to avoid using very common passwords and simple dictionary words. But, even certain character substitutions have been shown to be ineffective, e.g. “P@ssw0rd1” is no more secure than its “simple character” counterpart. Most brute force attacks and password…

Four Keys in Leadership

By Bruce Lach, President, SUCCESS Computer Consulting

As President of SUCCESS, I have the pleasure of spending time with each new employee shortly after they start with the company. On several occasions, I’ve been asked, “what’s your role here?” The easy and short answer is that I’m responsible for “day-to-day operations.” That’s a fairly “stock” answer and applies to the President/Chief Operating Officer at any company.

But that answer isn’t meaningful to most people. Regardless of “level,” what best describes a…

Multi-Factor Authentication 101

By Brandon Nohr, CTO SUCCESS Computer Consulting
Pause. Think. Act.

Last week, Alex talked about password length, complexity, not reusing passwords, etc. Assuming you followed Alex’s advice, you now have a proper password that is complex and unique for each application, webpage, device, network, etc.

This week we will take identity management a step further by introducing the concept of Multi-Factor Authentication (MFA) or 2 Factor Authentication (2FA). Multi-Factor Authentication is simply using a combination of something you know,…

The Lowdown on Password Managers

By Brandon Nohr, CTO SUCCESS Computer Consulting
Pause. Think. Act.

If you’ve been following along with our Pause. Think. Act. campaign, you have reduced your attack footprint and are less susceptible to a brute force attack. This is because you are using unique and complex passwords for all applications and websites. Even if one of your accounts is compromised, you have enabled multi-factor authentication so the attackers are unable to pass the second phase of the authentication process. The downside…

Stay Connected
Sign up for our monthly newsletter