FAQ

Got questions? We’ve got answers.

Technology moves fast, and when something goes wrong—or even when you’re just curious—you shouldn’t have to waste time searching for the right solution. That’s why we’ve compiled this list of frequently asked questions to help you navigate everything from password security to organizing your inbox. Whether you’re trying to figure out when to replace your computers, how to submit a support ticket, or what the difference is between compliance and cybersecurity, you’ll find the clarity you need right here. At BIS, we believe in making IT simple, secure, and stress-free.
How can I manage my spam filter?
If you’re using Barracuda, you have control over your spam folder. Be sure to act quickly when important emails are flagged—especially time-sensitive ones. Our quick video guide walks you through the process: Watch now »
Set up rules in your email client to automatically sort incoming messages. This helps reduce clutter and lets you prioritize what matters most. Our video also covers this process.
A secure password should be at least 12 characters long and include a mix of uppercase and lowercase letters, numbers, and symbols. Strong passwords are a simple but essential line of defense against cyberattacks.
Yes—password managers securely store your complex passwords, so you don’t have to remember them all. They make logging in easier and safer across all your devices.
MFA adds an extra layer of security by requiring you to verify your identity through a second method (like a text or app notification). It prevents 99.22% of Microsoft account hacks—making it a must-have.
Typically, desktops and laptops should be replaced every 4–5 years. Servers often have a slightly longer lifespan but should be evaluated regularly for performance and security.
For most business users, 16GB of RAM is ideal. Power users or those running demanding applications may benefit from 32GB or more.
TBRs are strategic meetings where we assess your technology landscape, performance, and risks. They help ensure your IT is aligned with your business goals and budget.
A network audit evaluates your current systems, identifies vulnerabilities, and outlines opportunities for performance and security improvements.
Cyber hygiene includes practices like patching software, using strong passwords, and updating antivirus programs. It reduces risk and helps prevent costly breaches.
Compliance is about meeting legal or industry-specific standards (like HIPAA), while security is about proactively protecting your data and systems. You can be compliant without being secure—and vice versa.
Your plan should cover data backup frequency, recovery time goals, failover systems, and communication procedures. It’s critical for business continuity during a cyberattack or outage.
We make it easy to get help—submit a ticket in one of four ways:
Phone: (251) 405-2555
Emailsupport@askbis.com
Client Portal: Log in to your BIS portal
To help us resolve your issue quickly, please include:
  • First and Last Name
  • Company Name
  • Contact Number
  • Detailed Description of the Problem
  • Subject Line (email) with a brief summary and number of users affected
Once we receive your request, we’ll follow up within the hour.
Yes—cybersecurity training is included in our Sentinel Managed IT Support packages. We help your team recognize threats, avoid phishing scams, and stay compliant.
We strongly recommend Microsoft 365 for its advanced security features, collaboration tools, and seamless integration. It’s our top choice for protecting your data in the cloud.