FAQ
Got questions? We’ve got answers.
Technology moves fast, and when something goes wrong—or even when you’re just curious—you shouldn’t have to waste time searching for the right solution. That’s why we’ve compiled this list of frequently asked questions to help you navigate everything from password security to organizing your inbox. Whether you’re trying to figure out when to replace your computers, how to submit a support ticket, or what the difference is between compliance and cybersecurity, you’ll find the clarity you need right here. At BIS, we believe in making IT simple, secure, and stress-free.
How can I manage my spam filter?
If you’re using Barracuda, you have control over your spam folder. Be sure to act quickly when important emails are flagged—especially time-sensitive ones. Our quick video guide walks you through the process: Watch now »
How can I keep my inbox more organized?
Set up rules in your email client to automatically sort incoming messages. This helps reduce clutter and lets you prioritize what matters most. Our video also covers this process.
What makes a good password?
A secure password should be at least 12 characters long and include a mix of uppercase and lowercase letters, numbers, and symbols. Strong passwords are a simple but essential line of defense against cyberattacks.
Should I use a password manager?
Yes—password managers securely store your complex passwords, so you don’t have to remember them all. They make logging in easier and safer across all your devices.
Why use Multi-Factor Authentication (MFA)?
MFA adds an extra layer of security by requiring you to verify your identity through a second method (like a text or app notification). It prevents 99.22% of Microsoft account hacks—making it a must-have.
When should I replace my computer or server?
Typically, desktops and laptops should be replaced every 4–5 years. Servers often have a slightly longer lifespan but should be evaluated regularly for performance and security.
How much RAM do I need?
For most business users, 16GB of RAM is ideal. Power users or those running demanding applications may benefit from 32GB or more.
What are Technology Business Reviews (TBRs), and why are they important?
TBRs are strategic meetings where we assess your technology landscape, performance, and risks. They help ensure your IT is aligned with your business goals and budget.
What is a network audit or assessment?
A network audit evaluates your current systems, identifies vulnerabilities, and outlines opportunities for performance and security improvements.
Why is cybersecurity hygiene important?
Cyber hygiene includes practices like patching software, using strong passwords, and updating antivirus programs. It reduces risk and helps prevent costly breaches.
What’s the difference between compliance and security?
Compliance is about meeting legal or industry-specific standards (like HIPAA), while security is about proactively protecting your data and systems. You can be compliant without being secure—and vice versa.
What should a disaster recovery plan include?
Your plan should cover data backup frequency, recovery time goals, failover systems, and communication procedures. It’s critical for business continuity during a cyberattack or outage.
How do I submit a support request or ticket?
We make it easy to get help—submit a ticket in one of four ways:
Phone: (251) 405-2555
Email: support@askbis.com
Client Portal: Log in to your BIS portal
Phone: (251) 405-2555
Email: support@askbis.com
Client Portal: Log in to your BIS portal
To help us resolve your issue quickly, please include:
- First and Last Name
- Company Name
- Contact Number
- Detailed Description of the Problem
- Subject Line (email) with a brief summary and number of users affected
Once we receive your request, we’ll follow up within the hour.
Do you offer security training for employees?
Yes—cybersecurity training is included in our Sentinel Managed IT Support packages. We help your team recognize threats, avoid phishing scams, and stay compliant.
What cloud solutions do you recommend?
We strongly recommend Microsoft 365 for its advanced security features, collaboration tools, and seamless integration. It’s our top choice for protecting your data in the cloud.