Published on Tuesday 20th January 2026

January 2026 Security Update KB5074109 Causing Problems for POP3 Email Users
Summary: The Windows 11 January 2026 security update (KB5074109) is causing Outlook to hang, freeze, or fail to close properly—particularly affecting users with POP3 email accounts and PST files stored in OneDrive. If you’re experiencing these issues, read on for workarounds.
What’s Happening?
Microsoft released the January 2026 security update (KB5074109) on 13th January for Windows 11 versions 24H2 and 25H2. This updates your system to build 26100.7623 or 26200.7623.
Shortly after release, users began reporting problems with classic Outlook (the desktop version, not the new Outlook app). Microsoft has acknowledged the issue and is investigating, but a fix has not yet been released. Continue reading →
Published on Saturday 17th January 2026

Two Decades of Partnership, Innovation, and Trusted IT Support
In 2006, three IT professionals with a shared vision came together to form Trichromic LLP. Twenty years later, we’re proud to still be here—supporting businesses across the UK with the same commitment to partnership and practical solutions that we started with.
This milestone isn’t just about us. It’s about the clients who have trusted us with their technology, the relationships we’ve built, and the journey we’ve taken together through two decades of extraordinary change in the IT industry.
How It All Started
Continue reading →
Published on Wednesday 14th January 2026

Understanding iOS Versions, Security Updates, and When to Upgrade
If you’re confused about which iOS version your iPhone should be running, you’re not alone. Apple’s approach to software updates has become increasingly complex, and it’s not always obvious whether your device is still secure or when you need to think about upgrading.
This guide explains how Apple’s iOS versioning works, what security updates mean for your device, and how to know if your iPhone is still protected.
The New Naming Convention: Why iOS Jumped to 26
Continue reading →
Published on Tuesday 6th January 2026

Here at Trichromic we prefer not to use too many computer-related terms (Three Letter Acronyms (TLAs),etc) and unnecessary IT jargon when communicating with our clients’.
However, these can’t always be avoided (and some like to use them when they shouldn’t) so here you’ll find a categorised glossary of the most commonly used terms and abbreviations which could be useful to anyone talking to IT departments or even an outsourced IT managed service provider like Trichromic. We’ll keep expanding this list and adding descriptions when time permits so please keep visiting to view the latest updates.
You can contact us for more information on any of the descriptions below or even to find out how Trichromic can help improve the efficiency of your business processes by harnessing the latest technology. ~ Lloyd Reid
Systems, Standards and Common Terms
AD — Active Directory
AI — Artificial Intelligence
AGI — Artificial General Intelligence
ASCII — American Standard Code for Information Interchange
ANSI — American National Standards Institute
ARC — Authenticated Received Chain
ASN — Advanced Shipping Notice
ASR — Automatic Speech Recognition
AWS — Amazon Web Services
B2B — Business-to-Business
B2C — Business-to-Consumer
BOM — Bill Of Materials
BSD — Berkeley Software Distribution
BSI — British Standards Institution
BYOD — Bring Your Own Device
CAD — Computer-Aided Design
CAM — Cybersecurity Awareness Month Continue reading →
Published on Sunday 11th January 2026

The 3CX Partner Program recognises companies who demonstrate proven competency in installing and supporting the 3CX phone system. As a certified 3CX Silver Partner, Trichromic has the expertise and accreditation to deliver reliable, professional telecommunications solutions for businesses of all sizes.
Why Choose a 3CX Partner?
Working with an accredited 3CX partner ensures your business receives:
- Expert installation and configuration tailored to your specific requirements
- Ongoing technical support from certified engineers who understand the platform inside and out
- Seamless migration from legacy systems with minimal disruption to your operations
- Best practice deployment following 3CX’s recommended standards
Continue reading →
Published on Wednesday 31st December 2025

Why “It’s in the Cloud” Isn’t a Backup Strategy
“Don’t worry, it’s all in the cloud.”
We hear this constantly from business owners when we ask about their backup strategy for Microsoft 365. It’s one of the most dangerous assumptions in modern IT—and it’s costing businesses thousands of pounds in lost data, productivity, and recovery costs.
The truth is that Microsoft 365 is a platform, not a backup service. While Microsoft does an excellent job of keeping the platform running and protecting against infrastructure failures, they’re very clear about one thing: your data is your responsibility.
Understanding the Shared Responsibility Model
Microsoft operates under what they call the “Shared Responsibility Model”. In simple terms, this means Microsoft is responsible for keeping the platform available and secure, while you are responsible for your data.
Microsoft’s responsibility:
- Physical infrastructure and data centre security
- Platform uptime and availability
- Replication for disaster recovery of their systems
- Protection against hardware failure
Your responsibility:
- Protecting data from accidental deletion
- Protecting data from malicious deletion (including ransomware)
- Recovering data after account compromise
- Long-term data retention beyond Microsoft’s limits
- Meeting regulatory and compliance requirements
The Reality: Microsoft’s Retention Limits
Many business owners assume that deleted data can be recovered indefinitely. Here’s what Microsoft actually provides: Continue reading →
Published on Monday 29th December 2025

What UK Businesses Need to Know Before They Need to Claim
Many UK businesses now have cyber insurance. Far fewer have ever tested whether it would actually pay out when needed.
If you’ve got a policy sitting in a drawer somewhere, you might assume you’re covered if the worst happens. But cyber insurance isn’t like buildings insurance—you can’t just file a claim and expect a cheque. Insurers are increasingly scrutinising claims, and rejection rates are rising.
This article explains what cyber insurance actually covers, what insurers expect from you, and why so many claims are being denied. More importantly, it explains what you can do now—before an incident—to make sure your policy will work when you need it.
The Current Landscape
Cyber attacks on UK businesses are at record levels. In 2024, insurers paid out £197 million in cyber claims—a staggering 230% increase on the previous year. Malware and ransomware accounted for over half of all claims, and demand for cyber cover surged, with 17% more policies taken out compared to 2023.
High-profile attacks continue to make headlines. The 2025 ransomware attacks on Marks & Spencer and the Co-op resulted in estimated costs of £300 million and £120 million respectively. M&S has since made a £100 million claim on their cyber insurance policy.
But here’s the uncomfortable truth: a significant proportion of cyber insurance claims are rejected or only partially paid. Some industry estimates suggest as many as 30-40% of claims face issues—often because businesses couldn’t prove they had basic security measures in place.
What Does Cyber Insurance Actually Cover?
Cyber insurance policies vary significantly, but most offer a combination of first-party cover (your own losses) and third-party cover (claims against you). Here’s what a typical policy might include: Continue reading →
Published on Monday 22nd December 2025

The Scams That Trick Even the Smartest Employees
“Hi, I need you to process an urgent payment. I’m in a meeting so can’t call, but please action this immediately and confirm when done.”
If you received this email from your managing director, would you question it? What if it came from their actual email address—or one that looked almost identical?
This is the reality of modern email fraud. Gone are the days of obvious scams from foreign princes. Today’s attacks are sophisticated, targeted, and designed to exploit the trust and urgency that keeps businesses running smoothly.
The Scale of the Problem
Email-based attacks remain the number one method criminals use to target UK businesses. According to government statistics, over 80% of cyber attacks begin with a phishing email. For small and medium-sized businesses, the consequences can be devastating—not just financially, but in terms of reputation, client relationships, and business continuity.
We see attempted attacks on our clients regularly. The good news is that with the right awareness and systems in place, the vast majority can be stopped before any damage is done.
Understanding the Different Types of Attack
Not all email attacks are created equal. Understanding the different approaches helps you recognise them. Continue reading →
Published on Wednesday 17th December 2025

Understanding Who’s Responsible for What Under UK Data Protection Law
One of the most common questions we receive from clients relates to their data. “Why is Sarah’s mailbox full?” “What’s using all the space on our file server?” “Can you tell us what emails John has been deleting?”
These are perfectly reasonable questions, but the answers often surprise business owners. As your IT provider, we can tell you how much data exists and where it’s stored—but we can’t tell you what that data contains or make decisions about it. That’s not us being unhelpful; it’s data protection law working exactly as it should.
Understanding the difference between a data controller and a data processor is essential for every business owner. It clarifies responsibilities, prevents misunderstandings, and ensures your business remains compliant.
The Two Key Roles in Data Protection
UK data protection law defines two distinct roles when it comes to handling personal data. Most businesses will act as both at different times, but understanding which hat you’re wearing in each situation is crucial. Continue reading →
Published on Wednesday 10th December 2025

A Plain-English Guide for UK Business Owners
If you’ve ever felt confused by data protection terminology, you’re not alone. Many business owners we speak to aren’t sure whether they should be following “GDPR”, “UK GDPR”, or the “Data Protection Act”—or whether these are all different things entirely.
The good news is that once you understand the background, it all makes sense. This guide cuts through the jargon and explains exactly what UK businesses need to know about data protection law today.
A Brief History of Data Protection in the UK
Data protection law in the UK has evolved significantly over the past few decades. Understanding this history helps explain why we have the current framework. Continue reading →