Published on Friday 11th March 2022

Many businesses have been encouraging staff to work from home (at least some of the time) during the pandemic, and for many people this has become ‘the new norm’.
Can hybrid working (office and remote working) be ‘the new norm’ once Covid restrictions have been fully removed?
There are pros and cons with both office and home/remote working. (Photo by Glenn Carstens-Peters)
Working from home has some benefits:
- Studies have found that people can be more productive when working from home.
- Less travel to work means cost savings, less congestion, and less air pollution.
- Empty offices don’t need heating.
This needs to be balanced with some of the downsides: Continue reading →
Published on Sunday 10th October 2021

Have you noticed the rapid pace of change in technology these days? Technology component costs appear to be lower than ever and the ability to connect individuals around the globe has dramatically accelerated the capacity for innovation, and businesses need to constantly adapt or fall behind.
This is a two edged sword. Whilst our businesses have the opportunity to use this new and exciting technology, our people, systems, and processes can’t always keep up with such rapid change. These gaps together with outside problems such as staff using technology from home, ransomware, and supply chain attacks have led to Cybersecurity becoming increasingly important for all businesses.
Recent ransomware attacks on Colonial Pipeline and JBS Foods have shown that targeting IT systems is a really effective way to damage our businesses and extort money from corporations.
Very often the weakest link in cybersecurity is humans. Rather than using purely technical methods to crack into a business, hackers use social engineering tactics such as phishing to get information from our employees. These attacks prey on the soft spots of human psychology, and an event such as a global pandemic makes those soft spots even more pronounced.
Throughout October, Trichromic will be sharing resources such as blogs, webinars and podcasts focusing on the cybersecurity issues that we feel are most important to our customers and contacts. If any of this communication hits a nerve and you would like to speak with one of our team to better understand the threats or what you can do to mitigate them or you would like a complementary review of your systems, please call us on: 020 3327 0310
Or send us an enquiry via our website at:
https://www.trichromic.co.uk/contact
Published on Sunday 9th May 2021

Investigators at the largest fuel pipeline in the US are working to recover from a devastating cyber-attack that cut the flow of oil. The hack on Colonial Pipeline is being seen as one of the most significant attacks on critical national infrastructure in history.
How can a pipeline be hacked?
Colonial Pipeline relies on digital technology to control the flow of diesel, petrol, and jet fuel across hundreds of miles of piping. It even has a robot that scurries through its pipes that checks for anomalies. All this technology is connected to a central system, and where there is connectivity, there is risk of cyber-attack.
How did the hackers break in?
Direct attacks on operational technology are rare because these systems are usually better protected. So it’s more likely the hackers gained access to Colonial’s computer system through the administrative side of the business.
Continue reading →
Published on Thursday 10th January 2019

Unable to access data in numerous Windows shares today after the (KB4480970) update.
https://support.microsoft.com/en-gb/help/4480970/windows-7-update-kb4480970
When trying to access shares the error “The handle is invalid” is displayed.
Microsoft has suggested various work-arounds but the only fix we have discovered is to completely remove the KB4480970 update.
Update: Microsoft have now released an update to resolve this issue which can be download from here
Microsoft have also explained this only affected users who in the local administrators group which is often the case in a Windows Workgroup environment.
Published on Saturday 1st December 2018

The Gold Partner status is awarded to companies who prove their competency installing and supporting the 3CX phone system.
3CX supports many VoIP open standards including SIP and Trichromic is proud to be a 3CX Gold Partner with certified 3CX engineers who have many years of experience installing and supporting the platform. We also provide and support a range of compatible handsets from high quality manufacturers including Yealink.
3CX delivers a flexible and feature-rich telephone solution that ensures cost-savings over traditional ISDN systems. Please contact us for more information.
Published on Monday 4th December 2017

In part 3 of our series of articles on GDPR, we answer some of the questions that our clients have been asking us.
See Also,
Part 1: Are you Ready?
Part 3: Frequently Asked Questions
With the GDPR now only a few months away, lots of questions are starting to be asked about the specific details as we all absorb the implications and impact on almost every business in Europe. We will collect and answer some of the most common ones here. Please check back regularly for updates. Continue reading →
Published on Tuesday 28th November 2017

In part 2 of our series of articles on GDPR, Alex Bailey discusses how to get started on the journey of preparing for it.
See Also,
Part 1: Are you Ready?
Part 3: Frequently Asked Questions
That date of 25th May 2018 is getting ever closer! By now you should be well underway with your implementation plans, data flow analysis and documentation.
No? You haven’t even started yet? You are certainly not alone. Many UK businesses, seem to be leaving it rather late to get their GDPR implementation projects up and running. There’s a lot to get done between now and May and you could find you are breaking the law if you are not ready in time.
Continue reading →
Published on Friday 16th June 2017

It’s a common misconception that macOS is not targetted by malicious software.
This is because the majority of viruses, worms, trojans and adware are developed for Microsoft Windows due to the prevalence of the operating system (OS). However, Apple macOS is more popular than ever and with popularity comes more malicious software to steal your data and force you to hand over your Bitcoins. We don’t want that to happen to our clients’ so we have rigorously tested many AV products and whittled them down to just one which has minimal impact on system performance while identifying and blocking the most malicious items. Continue reading →
Published on Tuesday 6th June 2017

In the first of a new series of articles, Alex Bailey asks: Are you ready for the GDPR?
You may well be asking yourself, “What is GDPR?”, in which case the answer to the above question is a resounding “No” !
However over the next 12 months you are going to hear those 4 letters repeated over and over again because on 25th May 2018, the EU’s General Data Protection Regulation becomes UK law, regardless of the Brexit situation. Continue reading →
Published on Wednesday 11th January 2017

The Microsoft Windows XP operating systems has not been supported by Microsoft since April 2014 and is vulnerable to attack.
In order to keep our clients’ data secure, Windows XP is no longer able to connect to our CloudEXCHANGE (Hosted Exchange) service. The Google Chrome web browser has also not been supported on Windows XP since April 2016 as well as many other applications from numerous vendors. If you are a business which still has Windows XP and Windows 2003 computers in your organisation, you should already have plans to migrate to modern and secure operating systems and applications, in order to protect your business from a wide range of attacks on these outdated operating systems.
We are experts at migrating from legacy Microsoft systems to the current on-site and cloud solutions so please contact us for help if your business systems need to be brought up to date.