Published on Sunday 4th September 2022

If the Windows computers in the office are turned on 24/7, this method could help reduce electricity usage and create less heat, which could further reduce the energy consumed by air conditioning.
Most newer Windows computers are configured to use the ‘Balanced’ power plan by default, and this makes sense because the Central Processing Until (CPU) clocks down when not being heavily utilised and clocked up when more performance is required. However, the ‘Balanced’ power plan does result in slower performing computers, so the ‘High Performance’ power plan is often preferred during working hours. There’s also a ‘Power Saver’ plan which could potentially save more power.
One option to save energy and create less heat is to manually change the power plan just before finishing work, and when starting work, but most people will forget to do this.
A better solution is to schedule these changes to be made using the Windows Task Scheduler or the Managed Service Provider’s (MSPs) preferred Remote Management & Monitoring (RMM) system. Continue reading →
Published on Tuesday 28th June 2022

Trichromic has proudly renewed their Cyber Essentials certification.
The standard is part of the UK Government’s National Cyber Security Strategy and demonstrates our commitment to cyber security, our ability to safeguard our own systems, the hosting services we deliver to clients, and it reinforces our capabilities as a managed services provider.
Launched in 2014, the Cyber Essentials scheme focuses on promoting the essential security controls that organisations need to have in place in order to reduce the risk posed by threats on the Internet. The scheme addresses five key controls that, when implemented correctly according to the government, could prevent around 80% of cyber attacks:
Continue reading →
Published on Thursday 14th April 2022

Security researchers have recently warned that hackers are compromising Microsoft Teams accounts to access chats and spread malicious executable files and programmes to participants in the conversation.
Over a quarter of a million users rely on Microsoft Teams every month with many of these trusting the platform implicitly, despite the absence of protections against malicious files.
Simple but efficient method
Researchers found that hackers started to drop malicious executable files in conversations on Microsoft Teams communication platform. The attacks started in January and there has been thousands of them. From the data available, most attacks were recorded at organisations in the Great Lakes region in the U.S., with local media outlets being a particular target.
The perpetrator inserts an executable file called “User Centric” into the chat to trick the user into running it. Once executed, the malware writes data into the system registry installs Dynamic Link Libraries (DLLs) and establishes a presence on the Windows machine. Basically, it takes over the computer. Continue reading →
Published on Thursday 14th April 2022

When your on-site server comes to the end of its life or it no longer suits your business needs, you face a choice.
1) Invest in an upgraded owned server
2) Migrate to the cloud with a server free solution
3) Take a ‘hybrid’ approach, with a mix of cloud and locally hosted systems or services.
In this guide we’ll walk you though the decision-making process and suggest key questions the management team should ask before making a decision.
Request our free eBook
Published on Friday 11th March 2022

Many businesses have been encouraging staff to work from home (at least some of the time) during the pandemic, and for many people this has become ‘the new norm’.
Can hybrid working (office and remote working) be ‘the new norm’ once Covid restrictions have been fully removed?
There are pros and cons with both office and home/remote working. (Photo by Glenn Carstens-Peters)
Working from home has some benefits:
- Studies have found that people can be more productive when working from home.
- Less travel to work means cost savings, less congestion, and less air pollution.
- Empty offices don’t need heating.
This needs to be balanced with some of the downsides: Continue reading →
Published on Sunday 10th October 2021

Have you noticed the rapid pace of change in technology these days? Technology component costs appear to be lower than ever and the ability to connect individuals around the globe has dramatically accelerated the capacity for innovation, and businesses need to constantly adapt or fall behind.
This is a two edged sword. Whilst our businesses have the opportunity to use this new and exciting technology, our people, systems, and processes can’t always keep up with such rapid change. These gaps together with outside problems such as staff using technology from home, ransomware, and supply chain attacks have led to Cybersecurity becoming increasingly important for all businesses.
Recent ransomware attacks on Colonial Pipeline and JBS Foods have shown that targeting IT systems is a really effective way to damage our businesses and extort money from corporations.
Very often the weakest link in cybersecurity is humans. Rather than using purely technical methods to crack into a business, hackers use social engineering tactics such as phishing to get information from our employees. These attacks prey on the soft spots of human psychology, and an event such as a global pandemic makes those soft spots even more pronounced.
Throughout October, Trichromic will be sharing resources such as blogs, webinars and podcasts focusing on the cybersecurity issues that we feel are most important to our customers and contacts. If any of this communication hits a nerve and you would like to speak with one of our team to better understand the threats or what you can do to mitigate them or you would like a complementary review of your systems, please call us on: 020 3327 0310
Or send us an enquiry via our website at:
https://www.trichromic.co.uk/contact
Published on Sunday 9th May 2021

Investigators at the largest fuel pipeline in the US are working to recover from a devastating cyber-attack that cut the flow of oil. The hack on Colonial Pipeline is being seen as one of the most significant attacks on critical national infrastructure in history.
How can a pipeline be hacked?
Colonial Pipeline relies on digital technology to control the flow of diesel, petrol, and jet fuel across hundreds of miles of piping. It even has a robot that scurries through its pipes that checks for anomalies. All this technology is connected to a central system, and where there is connectivity, there is risk of cyber-attack.
How did the hackers break in?
Direct attacks on operational technology are rare because these systems are usually better protected. So it’s more likely the hackers gained access to Colonial’s computer system through the administrative side of the business.
Continue reading →
Published on Thursday 10th January 2019

Unable to access data in numerous Windows shares today after the (KB4480970) update.
https://support.microsoft.com/en-gb/help/4480970/windows-7-update-kb4480970
When trying to access shares the error “The handle is invalid” is displayed.
Microsoft has suggested various work-arounds but the only fix we have discovered is to completely remove the KB4480970 update.
Update: Microsoft have now released an update to resolve this issue which can be download from here
Microsoft have also explained this only affected users who in the local administrators group which is often the case in a Windows Workgroup environment.
Published on Monday 4th December 2017

In part 3 of our series of articles on GDPR, we answer some of the questions that our clients have been asking us.
See Also,
Part 1: Are you Ready?
Part 3: Frequently Asked Questions
With the GDPR now only a few months away, lots of questions are starting to be asked about the specific details as we all absorb the implications and impact on almost every business in Europe. We will collect and answer some of the most common ones here. Please check back regularly for updates. Continue reading →
Published on Tuesday 28th November 2017

In part 2 of our series of articles on GDPR, Alex Bailey discusses how to get started on the journey of preparing for it.
See Also,
Part 1: Are you Ready?
Part 3: Frequently Asked Questions
That date of 25th May 2018 is getting ever closer! By now you should be well underway with your implementation plans, data flow analysis and documentation.
No? You haven’t even started yet? You are certainly not alone. Many UK businesses, seem to be leaving it rather late to get their GDPR implementation projects up and running. There’s a lot to get done between now and May and you could find you are breaking the law if you are not ready in time.
Continue reading →