<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=111591952803728&amp;ev=PageView&amp;noscript=1">
Skip to content
Our difference

We are on a mission to deliver innovative business transforming technology solutions that exceed our customers’ expectations.
 

Our culture

Our values guide us in everything we do and help shape our culture and customer approach. Find out more about our values and meet some of our team.
 

Our Microsoft Partnership

As a Microsoft Solutions Partner, we’ve been at the centre of the revolutionary changes that technology has brought to every aspect of life and we continue to stand by their side at the centre of tomorrow’s digital transformations.

Microsoft Solutions Partner

Our partners

We have successfully built relationships with multiple partners that prepare businesses for the future.
 

Carbon management

We understand our environmental responsibilities as a UK business and IT Managed Service Provider, and we understand how important it is for our customers to partner with responsible providers.
 

Careers

Our team is made up of a diverse group of people from all around the world, and we all have one thing in common: we’re passionate about providing our customers with outstanding solutions.

Thinking of selling your IT business?

Core is a well funded Microsoft Solutions Partner with a 30 year history of being at the heart of control in IT.

We are supported by our bankers and have funds available for strategic business acquisitions. Together with our successful acquisition track record and a commitment to making deals happen, now is the perfect time to talk to us if you are considering selling your IT business.

If you are interested in discussing a potential exit of your IT business, please complete the form on the right. All correspondence will be treated in the strictest of confidence and a mutual non-disclosure agreement will be exchanged prior to any discussions taking place.

Interactive Microsoft workshops

Our workshops are designed to help you realise the value of Microsoft technologies in your business, gain real value from your investment and transform the way you work.

The workshops are a collaborative and immersive experience; our experts will work with you to identify your business objectives and establish the Microsoft technologies to help you achieve them.
 

Request a workshop

Our range of workshops covers every aspect of the modern workplace including productivity, collaboration, identity, security and compliance and communication, with interactive and engaging sessions that bring the art of the possible to life.

Download our workshop guide

Read more about the interactive workshops we offer, and how they can benefit your business by downloading our guide.

MCI Workshop Introduction

Managed Services

Discover why Core is the first choice for many organisations looking to add flexibility, efficiency, and expertise to their teams.

Cloud Technology

From Microsoft’s leading platforms to bespoke cloud solutions, Core’s range of cloud technology solutions covers everything the modern workplace needs.

Professional Services

Whichever challenges you face on your digital journey, Core's professional services team has a solution to help, from IT Project Management to our innovative Smart Services.

Public Sector

Certified secure solution for the public sector, providing a reliable, flexible, secure and affordable IT solution.

Commercial Sector

Certified commercial sector solutions, covering all your commercial needs from financial and legal services, through to manufacturing.

Download our Frontline Workers white paper

Learn how technology can help to balance productivity with wellbeing for Frontline Workers.

White paper: How technology is revolutionising the health and productivity of frontline workers


Why customers choose us

Since we were founded in 1990 and started our Microsoft journey, we have supported over 10,000 customers on their communications and collaboration projects, and with the introduction of Microsoft's cloud technology, have grown our capabilities significantly across Microsoft 365 and Azure.

What sets us apart is a talented and passionate team who truly love what they do, demonstrating boundless enthusiasm and dedication in every single project.
 

logo-menu-david-lloyd

"It was apparent from day one that Core had a depth of knowledge in Microsoft 365, which we simply hadn’t found anywhere else."

Greater London Authority

"Core has a lot of experience working with the public sector, which was definitely a benefit."

Angel Trains

"There’s such a good working relationship with Core, it’s like having another permanent person in our organisation."

Talbot

"We had a really good, down to earth relationship with a few of the guys, and they know what they are doing."

Read our latest blog articles

Maximising Savings on Azure with Core’s Gain-Share Offer



Future-Proofing Your Business: The Perils of Rushing into Copilot for Microsoft 365
AI for All: How Microsoft's Latest Update on Copilot Opens Doors for all Businesses



Defending Against Modern Cyber Threats with Managed Services
The Core knowledge hub

Stay up-to-date with the latest insights, trends, and discussions from Core's team of subject matter experts through our blog topics and news articles.


Privacy and Cookie policy

Acceptable Use Policy

Acceptable Usage Policy


This policy provides standards for correct and proper use of our Customer’s IT networks to protect against degradation of performance and interruption to IT dependant business activities, loss of confidential and business critical information and safely and correctly operating IT equipment.

 

Introduction and scope

The Customer’s IT networks are key to the on-going operations of their businesses; incorrect function of these networks would impact on the service provided to their Customers and profitability.

Furthermore, our Customers wish to protect against loss of data which impacts on the day to day activities of the business, or if disclosed to certain parties, may affect the competitive activities of the business. Certain precautions must be taken to protect against disclosure or loss of information assets.

Finally, as with all electronic equipment, IT hardware can be dangerous when operated incorrectly or in the incorrect environment. It must also be used according to manufacturer’s instructions to prevent damage to the equipment.

 

Policy

 

PC Usage

IT hardware can easily be damaged when used inappropriately causing interruption to users and hence the business whilst repairs are carried out or a replacement sourced. Data loss, which may be more damaging to the business, could also occur. Finally, as with any electronic equipment, PCs and related accessories can be dangerous when handled inappropriately or in the wrong environment and it is the duty of the operators to ensure responsible usage.

  • Desktops, laptops, workstations (PCs) and related equipment should only be used in the
    manner and environment described in the applicable user guides and instructions.
  • PCs should only be used with recommended peripherals and should not be modified in any way which may invalidate the manufacturer warranty.
  • PCs should only be used for business activities or personal activities where specifically allowed by the Customer’s own IT policy.

 

Housekeeping

IT networks have a finite capacity for file and email storage and a certain amount of ‘housekeeping’ should be practiced by individual users to ensure reasonable storage availability and to prevent impact on performance. Furthermore, storing files in certain areas of a networked computer’s file system can impact performance and these practices should be avoided:

  • Duplicate files in both users’ home drives and on shared drives should be avoided
  • Large programme files, audio files or videos should not be stored on the corporate network unless specifically required for business activities
  • Junk or expired emails should be deleted from users’ email inboxes
  • Emails with large attachments should be deleted from users’ email inboxes. Where the attachments are required for business purposes, they should be saved to a shared drive
  • Files or folders should not be stored on your desktop. Desktop shortcuts to files and folders elsewhere are however acceptable.
  • Certain software which stores information in inappropriate locations (examples include iTunes and Google Earth) should not be installed. Where required for business purposes, this software should be installed by an IT administrator (normally the Supplier)
  • Running email archiving routines from Microsoft Outlook should be avoided. Where required for business purposes, a dedicated email archiving system should be installed. This software would be installed by an IT administrator (normally the Supplier) and would normally require purchasing.

 

Internet and email usage

Traffic coming from outside the business is the main source of software threats to corporate
networks. Almost all software threats including viruses, spyware, trojans and other malicious software are spread through email and the internet and responsible use by operators is therefore paramount to the security of the network.

Antivirus, anti-spam, and other network security software will protect against these threats to some extent but will not be able to identify all malicious software. Users should follow best practices to provide a better level of protection against infection.

  • Emails from unknown senders with attachments should not be opened and immediately deleted.
  • Where an email is received from an unknown sender and it has a link in the email to a website, do not click on the link.
  • Where an email is received from a known sender and it has a link in the email to a website, do not click on the link. Instead of clicking on the link, open Internet Explorer and type in the address that the link says it opens. It is possible for a link in an email to look like it is going to take you to one website, but the actual link that you click on may take you to a different website which may not be safe.
  • Do not download and install any software from the internet without consulting your network administrator (normally the Supplier). Internet based software can often contain viruses, spyware and trojans even if they do appear to come from a reputable source.
  • Do not engage in any file sharing or other peer to peer sharing activities. This will use up network bandwidth (affecting other users) and files downloaded through these mediums cannot be verified and may contain threats to the network.
  • Beware of websites informing you of security problems on your PC. This can be ‘scareware’ where malicious software is installed and a fee demanded to allow normal functioning of your PC. Any such occurrence should be reported to your network administrator (normally the Supplier).
  • Do not visit any websites containing pornographic material, illegal software or those associated with criminal activities. Use of all such websites carries a high risk of introducing malicious software to the network.

 

Network security and management

To ensure proper functioning of corporate IT systems, correct operation of networking equipment is required. Misuse and negligence can result in a reduction in or total loss of IT network functionality and significantly interrupting business activities.

  • Do not plug any network devices in without consulting your network administrator (normally the Supplier). This can include switches, routers, wireless access points, printers and scanners.
  • Do not remove, replace, or add any network cables from the office or from the comms or server areas without consulting your network administrator (normally the Supplier).
  • Do not tamper with, power off or remove any network switches. Reasonable precautions should also be taken to prevent to prevent other parties (i.e., cleaners) from interfering with this equipment.

 

Network servers

Administration of network servers should be left to your network administrator (normally the Supplier) and they should be in no way tampered with or logged on to by non-qualified users. The server environment should also be kept clean and at temperature of 20 degrees centigrade or below.

 

User access and management

Correct management of user access is essential in preventing unauthorised persons from having access to your network and your business’ data. Unauthorised users can be people from outside of the business, former employees, or current employees without the required permissions. All such access, whether malicious or otherwise, can cause damage to the network and interruption to the business. User access and management must therefore be tightly regulated.

  • Network users should use a strong password for network access. A strong password should be a minimum of 8 digits, contain letters, numbers, and symbols. You should also change your password on a regular basis – once a month is good practise.
  • Never leave your PC logged in at the end of the day or for extended periods away from the office and where possible power it off at the end of the working day.
  • Addition of new users to the network, and modification to security permissions of existing users, should only be performed by a qualified network administrator. This would normally be the Supplier as your network support provider.
  • Users who are no longer required on the network should be disabled and deleted by a
    qualified network administrator. This would normally be the Supplier as your network support provider. You should notify your network administrator as soon as the user leaves your business.
  • Network master administrator passwords should not be disclosed to employees and should be kept off site in a safe or safety deposit box. IT administrators should access the network through individual administrator accounts.