Microsoft 365 Business Admin Guide: Securing and Managing Microsoft 365 Business Download Free E-Book →
Emergency? Urgent?
Please Call 763.593.3017 or 888.707.3017


When you work with SUCCESS, you have the opportunity to share your computer screen, mouse and keyboard with one our help desk technicians. Using this technology, we can see what you see on your screen. We can diagnose and fix problems as if we were sitting at your desk. We can demonstrate tricks and tips to help you in the future. Of course, when we disconnect, we cannot get back unless you permit it.

To share your desktop, enter your session code and click Connect.


Our Customer Support Portal provides a window into our internal service ticketing, invoicing and knowledge base systems. Using it, you'll be able to create, modify or close a support ticket (or just give us some instructions or information). You'll also be able to access pdf copies of each of your invoices and service statements, while also viewing statistics about your use of our services. What's more, each service ticket becomes a searchable knowledge base article, created only for the people within your organization.

You'll be given access to our Customer Support portal when you sign up for our Managed Services. Please contact us if you need help.

To access our Customer Support portal, click the launch button below.



Click the button below to send an email to our support team. To better serve you, please include the following information in your email:

  • First and Last name
  • Company name
  • A detailed description of your problem
  • Preferred way to be contacted
  • Best times to reach you
Email Support

News for
& St. Paul

Multi-Factor Authentication 101

By Brandon Nohr, CTO, SUCCESS Computer Consulting
Pause. Think. Act.

Last week, Alex talked about password length, complexity, not reusing passwords, etc. Assuming you followed Alex’s advice, you now have a proper password that is complex and unique for each application, webpage, device, network, etc.

This week we will take identity management a step further by introducing the concept of Multi-Factor Authentication (MFA) or 2 Factor Authentication (2FA). Multi-Factor Authentication is simply using a combination of something you…

The Lowdown on Password Managers

By Brandon Nohr, CTO, SUCCESS Computer Consulting
Pause. Think. Act.

If you’ve been following along with our Pause. Think. Act. campaign, you have reduced your attack footprint and are less susceptible to a brute force attack. This is because you are using unique and complex passwords for all applications and websites. Even if one of your accounts is compromised, you have enabled multi-factor authentication so the attackers are unable to pass the second phase of the authentication process. The…

Security Starts with You

By Brandon Nohr, CTO, SUCCESS Computer Consulting

Here we are again, talking about security. Some of you might be thinking ok, ok, I got it! Security is important! Or, several of you might be buying into some of the myths:

I’m too small for the bad guys to go after, they have bigger fish to fry

I have nothing worth stealing. I’m safe because my data is in the “Cloud”

I am powerless against the hackers so why…

Make the Most of Your Data with Business Intelligence

By Brandon Nohr, CTO, SUCCESS Computer Consulting

Business Intelligence is a common topic when talking with clients. Everyone is looking for easier ways to gain greater insights using the data they have access to. Historically, these types of tools have been really expensive and complicated to use and many businesses find themselves needing to employ or contract the skills needed to manage the tools. What most people don’t know is that Microsoft Excel and PowerBI are really powerful tools they more…

3 Things We Can All Learn from the Google Docs Phishing Scam

By Chris VanAnda, Senior Network Engineer SUCCESS Computer Consulting, Inc.

It was hard to miss the news about the Google Docs phishing scam last week. A hacker was able to gain full access to over a million Gmail accounts in under an hour without even needing the victims’ credentials. All they had to do was create a fake program they conveniently named “Google Docs”, send out an email to some people claiming they wanted to share a document with them, and hope the user…

5 Key Benefits in “De-Multitasking”

By Bruce Lach, President, SUCCESS Computer Consulting

When I started at SUCCESS in 2013 our ability to deliver projects for our clients on-time and on-budget was stymied simply because we had project engineers that weren’t able to dedicate their time to their main function of delivering projects.

One of the first changes I insisted on as President was to eliminate multitasking wherever possible throughout the company, but especially within the project team.

Here is a list of the 5…

HIPAA Audits—Don’t Panic, Be Prepared

By SUCCESS Computer Consulting, Inc

For many of you out there working in Healthcare or within the Healthcare IT industries, the thought of a HIPAA audit may make you cringe. Dealing with governmental regulations, like those enforced by the Department of Health and Human Services (HHS), tend to be a complex process. However, it’s the responsibility of any business working within the confines of HIPAA to adhere to these regulations and strong preparation tactics can help overcome…

Stay Connected
Sign up for our monthly newsletter