We recommend we provide and manage your active domain names. We will renew them constantly and ensure you don’t pay double or let an unknown company steal your domain names. We provide advanced domain name services (DNS) when necessary. However, many clients have a portfolio of domain names; these domains are often unused and inactive. Clients often want to save money when renewing these domains and we encourage these clients to store these with VentraIP (https://getonline.vip/NoydiUJR).
Once you have your VentraIP, we suggest you add us as an extra user. This allows us to make critical changes to your domain names and hosting quickly and without inconveniencing you for authentication.
Note: we have a specific email address used for this purpose (we*******@**********om.au). Do not use our support email address or the email address of your representative.
Adding us to your VentraIP account:
- Sign into VentraIP
- Click your name in the top right.
- Choose MY PROFILE from the drop down panel.
- Choose ADDITIONAL USERS from the left sidebar menu.
- Click the ADD NEW USER button.
- Add our email address (we*******@**********om.au) and enter an expiry date if required.
- Confirm by clicking the ADD USER button.
Warning! Never give permission randomly and without careful consideration.
You are not granting permission to add users or close the account. You are also not granting permission to remove you from the account.
However, you are giving permission to:
- Purchase new services using the credit card stored on the account
- Fundamentally change your website hosting, email and domain settings
- Permission to delete email, delete your website and delete your domain name
- Access the core setting of your website, email and domain.
Give this level of permission only to experienced local IT professionals and website agencies. Do not give permission to freelance developers, marketing agencies, and SEO consultants. Marketing agencies and SEO consultants do not need core (root) access to do their work. Freelance developers should be given temporary access only to specific root-level systems as required. All your trusted suppliers should be local companies, with cyber and professional indemnity insurance and at least 10 years’ experience.


