Defending Against Cyber Attacks in a Cloud-First, Mobile-First Era Download Free E-Book →
Emergency? Urgent?
Please Call 763.593.3017 or 888.707.3017


When you work with SUCCESS, you have the opportunity to share your computer screen, mouse and keyboard with one our help desk technicians. Using this technology, we can see what you see on your screen. We can diagnose and fix problems as if we were sitting at your desk. We can demonstrate tricks and tips to help you in the future. Of course, when we disconnect, we cannot get back unless you permit it.

To share your desktop, enter your session code and click Connect.


Our Customer Support Portal provides a window into our internal service ticketing, invoicing and knowledge base systems. Using it, you'll be able to create, modify or close a support ticket (or just give us some instructions or information). You'll also be able to access pdf copies of each of your invoices and service statements, while also viewing statistics about your use of our services. What's more, each service ticket becomes a searchable knowledge base article, created only for the people within your organization.

You'll be given access to our Customer Support portal when you sign up for our Managed Services. Please contact us if you need help.

To access our Customer Support portal, click the launch button below.



Click the button below to send an email to our support team. To better serve you, please include the following information in your email:

  • First and Last name
  • Company name
  • A detailed description of your problem
  • Preferred way to be contacted
  • Best times to reach you
Email Support

Spear Phishing 101

By Brandon Nohr,
CTO, SUCCESS Computer Consulting

More than 90% of cyberattacks begin with a spear phishing email. Spear phishing emails aren’t just a generic piece of spam; they’re emails that appear to be from your boss with your company signature or from your credit card company warning you of some recent activity on your account. Hackers often use malicious links or attachments, coupled with an urgent request, to lure you into clicking the link or opening the attachment. Once you do, malware can access your information and use it to spread itself further. Once hackers have access, they often use your contacts to spread the email or access private information. Employees should develop regular processes around vetting and double-checking links that are sent to work emails to avoid phishing.

Spear phishing attacks are getting more sophisticated and are becoming harder and harder to detect. Hackers use tactics like copying official signatures and mimicking the formating of websites and services to trick victims. That’s why it’s more important than ever to arm your business against these threats. In this video, Chief Technology Officer Brandon Nohr takes a deep dive into spear phishing. He shows you how to identify a malicious email, and what to look out for. If you have any questions after watching the video about phishing or cybersecurity in general, contact SUCCESS Computer Consulting at 763-593-3000