<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=111591952803728&amp;ev=PageView&amp;noscript=1">
Skip to content
Our difference

We are on a mission to deliver innovative business transforming technology solutions that exceed our customers’ expectations.
 

Our culture

Our values guide us in everything we do and help shape our culture and customer approach. Find out more about our values and meet some of our team.
 

Our Microsoft Partnership

As a Microsoft Solutions Partner, we’ve been at the centre of the revolutionary changes that technology has brought to every aspect of life and we continue to stand by their side at the centre of tomorrow’s digital transformations.

Microsoft Solutions Partner

Our partners

We have successfully built relationships with multiple partners that prepare businesses for the future.
 

Carbon management

We understand our environmental responsibilities as a UK business and IT Managed Service Provider, and we understand how important it is for our customers to partner with responsible providers.
 

Careers

Our team is made up of a diverse group of people from all around the world, and we all have one thing in common: we’re passionate about providing our customers with outstanding solutions.

Thinking of selling your IT business?

Core is a well funded Microsoft Solutions Partner with a 30 year history of being at the heart of control in IT.

We are supported by our bankers and have funds available for strategic business acquisitions. Together with our successful acquisition track record and a commitment to making deals happen, now is the perfect time to talk to us if you are considering selling your IT business.

If you are interested in discussing a potential exit of your IT business, please complete the form on the right. All correspondence will be treated in the strictest of confidence and a mutual non-disclosure agreement will be exchanged prior to any discussions taking place.

Interactive Microsoft workshops

Our workshops are designed to help you realise the value of Microsoft technologies in your business, gain real value from your investment and transform the way you work.

The workshops are a collaborative and immersive experience; our experts will work with you to identify your business objectives and establish the Microsoft technologies to help you achieve them.
 

Request a workshop

Our range of workshops covers every aspect of the modern workplace including productivity, collaboration, identity, security and compliance and communication, with interactive and engaging sessions that bring the art of the possible to life.

Download our workshop guide

Read more about the interactive workshops we offer, and how they can benefit your business by downloading our guide.

MCI Workshop Introduction

Managed Services

Discover why Core is the first choice for many organisations looking to add flexibility, efficiency, and expertise to their teams.

Cloud Technology

From Microsoft’s leading platforms to bespoke cloud solutions, Core’s range of cloud technology solutions covers everything the modern workplace needs.

Professional Services

Whichever challenges you face on your digital journey, Core's professional services team has a solution to help, from IT Project Management to our innovative Smart Services.

Public Sector

Certified secure solution for the public sector, providing a reliable, flexible, secure and affordable IT solution.

Commercial Sector

Certified commercial sector solutions, covering all your commercial needs from financial and legal services, through to manufacturing.

Download our Frontline Workers white paper

Learn how technology can help to balance productivity with wellbeing for Frontline Workers.

White paper: How technology is revolutionising the health and productivity of frontline workers


Why customers choose us

Since we were founded in 1990 and started our Microsoft journey, we have supported over 10,000 customers on their communications and collaboration projects, and with the introduction of Microsoft's cloud technology, have grown our capabilities significantly across Microsoft 365 and Azure.

What sets us apart is a talented and passionate team who truly love what they do, demonstrating boundless enthusiasm and dedication in every single project.
 

logo-menu-david-lloyd

"It was apparent from day one that Core had a depth of knowledge in Microsoft 365, which we simply hadn’t found anywhere else."

Greater London Authority

"Core has a lot of experience working with the public sector, which was definitely a benefit."

Angel Trains

"There’s such a good working relationship with Core, it’s like having another permanent person in our organisation."

Talbot

"We had a really good, down to earth relationship with a few of the guys, and they know what they are doing."

Read our latest blog articles

Maximising Savings on Azure with Core’s Gain-Share Offer



Future-Proofing Your Business: The Perils of Rushing into Copilot for Microsoft 365
AI for All: How Microsoft's Latest Update on Copilot Opens Doors for all Businesses



Defending Against Modern Cyber Threats with Managed Services
The Core knowledge hub

Stay up-to-date with the latest insights, trends, and discussions from Core's team of subject matter experts through our blog topics and news articles.


Paul SaerMay 21, 2020 10:27:40 AM8 min read

5 steps to maximise the security of your home router

The world of work has changed drastically since March 2020, with a significant number of knowledge workers now working from home instead of in the office, which reduces the levels of network security protecting your devices.

As the workforce transitions to the home instead of the office, cyber threat actors will seize the opportunity to take advantage of weak network security; having a decent security profile within your home network will help you to protect your employer, and your own devices, from being an easy target.

To help you take the right steps, I have put together my five-step guide to help secure your home network as much as possible against the most common forms of attack.

1. Make sure firmware is up to date


Depending on what hardware you are using, you may or may not be able to monitor and manage updates to the firmware of the device. Details of the firmware version may be listed in the general information on the router; any option to do a forced check and update will be in the device's advanced settings.

Internet Service Provider (ISP)-issued routers generally don’t have this option - they will often be running custom firmware which, unfortunately, won’t get as many updates and revisions as a generic router.

2. Review and remediate connected devices 

Most broadband routers will let you view a list of all devices that are connected to your network. Some routers may also display devices that have connected to the network previously, but are currently offline. This is a great checklist to see what is connected, or can connect to, your WiFi network.

Review the list of connected devices and make sure you recognise all of them. If there are any that you don’t, use the option to block or forget them. If you accidentally block something you need, you can always unblock it later.

Unless you regularly do housekeeping on your router, or you have recently changed it, there are likely to be a lot of devices in the offline list; old phones and tablets that you might have replaced or perhaps friends’ devices that you have allowed to connect to the network before. Clear out anything that isn’t yours or a current device.

Important note: if you have a Guest Network on your router and you have any smart devices in your home, quickly read step five before going any further and block or delete your smart devices before going onto step three.

3. Change factory settings

There are a range of factory settings that you should change or optimise on your router, running in order of importance/priority. Everyone can do the first three steps:

Change the Admin Password – The admin password will provide access to your router settings and is the most important password on your network. Changing it from the factory default password has lots of benefits, but ultimately it will protect your security settings from anyone who may already have your password (it’s often listed on the router somewhere) and from your credentials being compromised if your provider has their database hacked.

All of your router security details from the factory are listed in at least two external places: at the manufacturer of the hardware and with your ISP. If they are breached in any way, so is your router.

Change the WiFi password – For the same reasons as above, your WiFi password isn't actually that secure - and it’s the gateway to anyone gaining access to your network. Once someone is connected to the WiFi, they are inside your network and have cleared the main security barrier - so we want to protect access to your network. Change the password and make it as complex as you can but make sure you can remember it. You may need to update all your devices with the new password, but it will ensure that you have control over who can access your network.

There are some great random password generators on the web that will create a unique, highly-complex alphanumeric password for you that will be extremely difficult to brute force. Just make sure you keep a note of it somewhere safe.

Change the SSID of your WiFi network – This one is not as critical as the above steps but also highly recommended for two reasons. Firstly, some WiFi networks will push out your changed password to connected devices, which is really useful for the devices you want to keep but not so great for devices that you don’t want to have access moving forward. With a new SSID, devices that previously had access to your network shouldn’t be able to initiate any reconnection that would allow this.

The second reason goes back to the above points; your factory SSID will be available in at least two databases and allows anyone in range of your WiFi to assess what router you have installed, which may allow them to search for known exploits on that model and formulate an attack. A new generic SSID helps guard against this, to a point.

It’s also a great opportunity to have some fun with the neighbours or your guests…

Where the option exists, you may choose to hide/not broadcast the SSID of your private WiFi network. This has the added advantage of ensuring that anyone who is not currently authorised to join your network won't be able to see that it is available.The disadvantage of this, is that you will have to manually enter the SSID name every time you want to join a new device to your network.

Extra credit actions - the availability of the following items will depend on the make and model of your router. Most of the features here will be under a tab called “Advanced Settings”.

Enable enhanced security features – if your router has options such as Malicious Content Filter, Intrusion Prevention System or Infected Device Quarantine, switch them on. This is unlikely to be an option with most ISP provided routers, but if you are using a router you have bought separately it may be a feature. If you get reporting from this, you will be amazed at the number of dubious processes these stop on an hourly basis.

Upgrade your WiFi network encryption – most routers including the ISP provide this option, but not all. If you have options to change the WiFi encryption, select WPA2 or WPA2-PSK, (WiFi Protected Access v2). This is the best generally available WiFi encryption standard and should work with all of your devices. If you don’t have WPA2 available, WPA is next best. WEP (Wired Equivalency Protocol) is better than nothing, but is the last resort.

Enable the router’s Firewall – this is a grey area; most routers have some form of software-based Firewall that is on by default, so you can’t see it or affect it. Some higher-end routers have the ability to switch the Firewall on and off and complete some more advanced configuration. Depending on what you bought and when, it may be on or off as default. Check it, and if it is not already on, enable it. 

Disable Remote Administration - if Remote Administration is available as an option, check to see if it is enabled by default and make sure it is switched off. Your ISP provided router is likely to have this as a default option that you cannot disable.

4. Enable guest network if you have it

Step three recommended culling devices you don’t want connected to your trusted home network, which includes clearing out friends and relatives, or more often in my house, friends of my children!

We have no idea about the hygiene status of other people’s devices; are they secure, have they jail-broken devices that might now be running some form of malware, or cause us a security or performance issue?

A guest network allows us to do at home what your enterprise should do on its core network: working on a basis of zero trust for any devices or users we don’t know. Most modern routers have a guest network capability which will provide guest users with access to your internet, but wall them off from the devices on your main network. Enable this and make sure family members don’t give out the new details to your private network.

5. Isolate Internet of Things (IoT) Devices


Most households have at least one IoT device. It might be an Amazon Alexa or similar digital assistant, smart TV, media sticks like Fire TV or Roku, games consoles, video doorbell, refrigerator or coffee maker. The security built into these devices is pretty poor, and they represent a gateway into your private home network that is a potential security risk. If you have a guest network, my recommendation is to cull all of these devices from your secure network and reconnect them to your guest network. Most will still function exactly as they did before.

The exception to this may be smart TVs and media boxes or sticks if you have set them up for some form of DLNA streaming from digital media stored in Network Attached Storage at home, or if you regularly “cast” content from phones and tablets to your TV screen. Breaking these devices out of your main network will cause this to stop functioning, in which case you need to make a decision about whether to also move that to the guest network, or whether to accept the risk of the Smart TV/ Media device in the trusted network. Taking any of these steps in isolation will help to improve the overall security of your home network, but they work best when performed in the order listed above. Following these steps will help make sure that you protect all of your devices, corporate and personal, from the switch in focus of cyber criminals to unprotected home networks.

Next steps

For organisations that are concerned about IT security as their staff work from home, Core has a range of security solutions that can help, from discovery sessions of your current security landscape to full security workshops. See our security solutions here or contact us to talk about how we can help you stay secure during the time of remote working. 

CONTACT US