<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=111591952803728&amp;ev=PageView&amp;noscript=1">
Skip to content
Our difference

We are on a mission to deliver innovative business transforming technology solutions that exceed our customers’ expectations.
 

Our culture

Our values guide us in everything we do and help shape our culture and customer approach. Find out more about our values and meet some of our team.
 

Our Microsoft Partnership

As a Microsoft Solutions Partner, we’ve been at the centre of the revolutionary changes that technology has brought to every aspect of life and we continue to stand by their side at the centre of tomorrow’s digital transformations.

Microsoft Solutions Partner

Our partners

We have successfully built relationships with multiple partners that prepare businesses for the future.
 

Carbon management

We understand our environmental responsibilities as a UK business and IT Managed Service Provider, and we understand how important it is for our customers to partner with responsible providers.
 

Careers

Our team is made up of a diverse group of people from all around the world, and we all have one thing in common: we’re passionate about providing our customers with outstanding solutions.

Thinking of selling your IT business?

Core is a well funded Microsoft Solutions Partner with a 30 year history of being at the heart of control in IT.

We are supported by our bankers and have funds available for strategic business acquisitions. Together with our successful acquisition track record and a commitment to making deals happen, now is the perfect time to talk to us if you are considering selling your IT business.

If you are interested in discussing a potential exit of your IT business, please complete the form on the right. All correspondence will be treated in the strictest of confidence and a mutual non-disclosure agreement will be exchanged prior to any discussions taking place.

Interactive Microsoft workshops

Our workshops are designed to help you realise the value of Microsoft technologies in your business, gain real value from your investment and transform the way you work.

The workshops are a collaborative and immersive experience; our experts will work with you to identify your business objectives and establish the Microsoft technologies to help you achieve them.
 

Request a workshop

Our range of workshops covers every aspect of the modern workplace including productivity, collaboration, identity, security and compliance and communication, with interactive and engaging sessions that bring the art of the possible to life.

Download our workshop guide

Read more about the interactive workshops we offer, and how they can benefit your business by downloading our guide.

MCI Workshop Introduction

Managed Services

Discover why Core is the first choice for many organisations looking to add flexibility, efficiency, and expertise to their teams.

Cloud Technology

From Microsoft’s leading platforms to bespoke cloud solutions, Core’s range of cloud technology solutions covers everything the modern workplace needs.

Professional Services

Whichever challenges you face on your digital journey, Core's professional services team has a solution to help, from IT Project Management to our innovative Smart Services.

Public Sector

Certified secure solution for the public sector, providing a reliable, flexible, secure and affordable IT solution.

Commercial Sector

Certified commercial sector solutions, covering all your commercial needs from financial and legal services, through to manufacturing.

Download our Frontline Workers white paper

Learn how technology can help to balance productivity with wellbeing for Frontline Workers.

White paper: How technology is revolutionising the health and productivity of frontline workers


Why customers choose us

Since we were founded in 1990 and started our Microsoft journey, we have supported over 10,000 customers on their communications and collaboration projects, and with the introduction of Microsoft's cloud technology, have grown our capabilities significantly across Microsoft 365 and Azure.

What sets us apart is a talented and passionate team who truly love what they do, demonstrating boundless enthusiasm and dedication in every single project.
 

logo-menu-david-lloyd

"It was apparent from day one that Core had a depth of knowledge in Microsoft 365, which we simply hadn’t found anywhere else."

Greater London Authority

"Core has a lot of experience working with the public sector, which was definitely a benefit."

Angel Trains

"There’s such a good working relationship with Core, it’s like having another permanent person in our organisation."

Talbot

"We had a really good, down to earth relationship with a few of the guys, and they know what they are doing."

Read our latest blog articles

Harnessing Evergreen IT Services for Strategic Advantage



Maximising Savings on Azure with Core’s Gain-Share Offer
Future-Proofing Your Business: The Perils of Rushing into Copilot for Microsoft 365



AI for All: How Microsoft's Latest Update on Copilot Opens Doors for all Businesses
The Core knowledge hub

Stay up-to-date with the latest insights, trends, and discussions from Core's team of subject matter experts through our blog topics and news articles.


Lucy WrightOct 18, 2018 9:30:56 AM3 min read

Data security for SMEs: common threats and solutions

Data theft and breaches are a serious matter. A business cannot afford to lose client data or financial information. Although companies have security protocols and systems in place, there are still many vulnerabilities that result in data being breached.

What exactly is data in business?

The word ‘data’ is a broad term, but in business, it primarily refers to the customer, transactional and business processes that are stored on their computer systems. An example of such data for an e-commerce website will be an order that has been completed on a website. For a service provider, it will be the enquiry made on the site.

The data that is received by a business is critical for a company to continue to operate. If this data is accessible to everyone or can be stolen by another party, it breaks data confidentiality laws that protect customers. A recent example of such a breach is Facebook–Cambridge Analytica data scandal which had far-reaching implications.

How is data stolen or leaked in business?

An infographic on common data security threats for SMEs and their solutions

For most SMEs, there are six common external threats and data leaks which result in their data being breached. We discuss them individually as follows.

Weak credentials - Non-complex, simple passwords being used by employees.

Accessing any device nowadays require a username and password. The same applies to many software and tools. However, many people tend to stick with simple passwords or ones that they use across multiple accounts. This is one of the most common methods of data being breached when a person's credentials are compromised. In fact, 81% of hacking breaches occur when a person’s login credentials are compromised.

The solution that works well for this is multi-factor authentication, where users are required to present two or more pieces of evidence before they are allowed access.

Stolen/lost devices - Devices with company information being stolen or misplaced by employees.

It is very common for devices to be lost, stolen or misplaced. Mobile phones are often lost or stolen and are actively used to view, share or process business data. Laptops being portable are also easy to misplace or lose. It’s estimated that a laptop is stolen every 53 seconds.

Devices can easily be lost or stolen and to safeguard the data, the best solution is the ability to wipe the data from the device remotely.

Unsecure access - Users accessing their work data through their own devices.

It is easy to access work data from other devices by logging into work email and data sharing systems. The issue is a lack of encryption and the vulnerability of the personal devices in allowing the business data to be breached. 20% of workers use own devices for work without permission.

The way to overcome this issue is to have systems in place that encrypt data wherever it is accessed. Office 365 allows such an ability to businesses for data encryption.

Outdated antivirus - Many computers run expired or old antivirus that isn’t fit for purpose.

Many people tend to ignore using antivirus or tend to ignore updating it to face new computer threats that are released. A new malware specimen is released every 4.2 seconds.

Keeping work computers secure through up-to-date antivirus for Mac or Windows will help businesses keep such threats away.

Ransomware/Phishing - One of the major threats in the cybersecurity world where users receive an email that looks like an official email, but it is a fake email used to direct people to malicious sites

Symantec noted that 1 in 13 of the web requests led end-users to malware. This is after they analysed more than 1 billion web requests daily in 2017. 91% of cyber attacks start with a phishing email.

Email links need to be scanned and stripped of any threat before reaching an inbox. This is how the problem with phishing email is resolved.

Leaked Data - Users share information in an insecure way with people outside of their business

For the sake of ease, many people tend to share data through emails or other insecure methods outside of business systems. This a significant risk for businesses, with 58% of users accidentally sharing sensitive information.

The method of resolving this is through access control for files which can be revoked or restricted when data is shared.

If you're an SME in need of an IT security review, now is the perfect time to book a security workshop from Core. Our experts will give a comprehensive overview of your security landscape and how it can be improved, helping you address challenges head on and comply with industry regulations. Book yours below or contact us to find out more about what our workshop entails. 

 

BOOK A SECURITY WORKSHOP

 

avatar

Lucy Wright

My name is Lucy and this is my author bio.