Microsoft 365 Business Admin Guide: Securing and Managing Microsoft 365 Business Download Free E-Book →
Emergency? Urgent?
Please Call 763.593.3017 or 888.707.3017


When you work with SUCCESS, you have the opportunity to share your computer screen, mouse and keyboard with one our help desk technicians. Using this technology, we can see what you see on your screen. We can diagnose and fix problems as if we were sitting at your desk. We can demonstrate tricks and tips to help you in the future. Of course, when we disconnect, we cannot get back unless you permit it.

To share your desktop, enter your session code and click Connect.


Our Customer Support Portal provides a window into our internal service ticketing, invoicing and knowledge base systems. Using it, you'll be able to create, modify or close a support ticket (or just give us some instructions or information). You'll also be able to access pdf copies of each of your invoices and service statements, while also viewing statistics about your use of our services. What's more, each service ticket becomes a searchable knowledge base article, created only for the people within your organization.

You'll be given access to our Customer Support portal when you sign up for our Managed Services. Please contact us if you need help.

To access our Customer Support portal, click the launch button below.



Click the button below to send an email to our support team. To better serve you, please include the following information in your email:

  • First and Last name
  • Company name
  • A detailed description of your problem
  • Preferred way to be contacted
  • Best times to reach you
Email Support
Is your DNS at risk?

Is your DNS at risk?

By Eric Hassler,
Field Technician, SUCCESS Computer Consulting

A plea to enforce security access controls on your Domain Name System provider.

Even if you have an otherwise multi-layered defense, the tiniest cracks can bring down even the most security-hardened systems. These days, many system administrators and IT or cybersecurity professionals are laser-focusing on hardening individual endpoints and monitoring internal infrastructure, always mindful of that latest vulnerability needing to be patched.

While those steps are necessary, they don’t hit everything. In 2017, published a cautionary tale about how one Brazilian bank had been compromised, in a way you wouldn’t expect: weak security on their DNS name records. If an attacker can compromise the underlying system on which your email, web, apps, and services operate, the internal security of those systems goes out the window—useless. In the Brazilian banking attack, cybercriminals were able to hijack the bank’s email accounts and intercept communications related to wire transfers. In doing so, they were able to redirect nearly $27 billion (yes billion, with a ‘b’) in assets to accounts under their control.

This wasn’t the exploitation of a zero-day vulnerability or an unprecedented attack; this cyberattack used known weaknesses inherent to the way the internet fundamentally functions. I’m not here today to spout doom and gloom and say that the internet is going to crumble due to this fatal flaw. But, listen up: there are ways to avoid going the way of this Brazilian bank. Take the time to limit who has access to DNS records, make sure 2FA is enabled correctly, and use proper access and auditing controls—always. I see too many networks where this access is left wide open, in which case you’re really just handing bad actors the keys to the kingdom.

 TL;DR: Please limit access to your GoDaddy account, and enforce 2FA on it.