<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=111591952803728&amp;ev=PageView&amp;noscript=1">
Skip to content
Our difference

We are on a mission to deliver innovative business transforming technology solutions that exceed our customers’ expectations.

Our culture

Our values guide us in everything we do and help shape our culture and customer approach. Find out more about our values and meet some of our team.

Our Microsoft Partnership

As a Microsoft Solutions Partner, we’ve been at the centre of the revolutionary changes that technology has brought to every aspect of life and we continue to stand by their side at the centre of tomorrow’s digital transformations.

Microsoft Solutions Partner

Our partners

We have successfully built relationships with multiple partners that prepare businesses for the future.

Carbon management

We understand our environmental responsibilities as a UK business and IT Managed Service Provider, and we understand how important it is for our customers to partner with responsible providers.


Our team is made up of a diverse group of people from all around the world, and we all have one thing in common: we’re passionate about providing our customers with outstanding solutions.

Thinking of selling your IT business?

Core is a well funded Microsoft Solutions Partner with a 30 year history of being at the heart of control in IT.

We are supported by our bankers and have funds available for strategic business acquisitions. Together with our successful acquisition track record and a commitment to making deals happen, now is the perfect time to talk to us if you are considering selling your IT business.

If you are interested in discussing a potential exit of your IT business, please complete the form on the right. All correspondence will be treated in the strictest of confidence and a mutual non-disclosure agreement will be exchanged prior to any discussions taking place.

Interactive Microsoft workshops

Our workshops are designed to help you realise the value of Microsoft technologies in your business, gain real value from your investment and transform the way you work.

The workshops are a collaborative and immersive experience; our experts will work with you to identify your business objectives and establish the Microsoft technologies to help you achieve them.

Request a workshop

Our range of workshops covers every aspect of the modern workplace including productivity, collaboration, identity, security and compliance and communication, with interactive and engaging sessions that bring the art of the possible to life.

Download our workshop guide

Read more about the interactive workshops we offer, and how they can benefit your business by downloading our guide.

MCI Workshop Introduction

Managed Services

Discover why Core is the first choice for many organisations looking to add flexibility, efficiency, and expertise to their teams.

Cloud Technology

From Microsoft’s leading platforms to bespoke cloud solutions, Core’s range of cloud technology solutions covers everything the modern workplace needs.

Professional Services

Whichever challenges you face on your digital journey, Core's professional services team has a solution to help, from IT Project Management to our innovative Smart Services.

Public Sector

Certified secure solution for the public sector, providing a reliable, flexible, secure and affordable IT solution.

Commercial Sector

Certified commercial sector solutions, covering all your commercial needs from financial and legal services, through to manufacturing.

Download our Frontline Workers white paper

Learn how technology can help to balance productivity with wellbeing for Frontline Workers.

White paper: How technology is revolutionising the health and productivity of frontline workers

Why customers choose us

Since we were founded in 1990 and started our Microsoft journey, we have supported over 10,000 customers on their communications and collaboration projects, and with the introduction of Microsoft's cloud technology, have grown our capabilities significantly across Microsoft 365 and Azure.

What sets us apart is a talented and passionate team who truly love what they do, demonstrating boundless enthusiasm and dedication in every single project.


"It was apparent from day one that Core had a depth of knowledge in Microsoft 365, which we simply hadn’t found anywhere else."

Greater London Authority

"Core has a lot of experience working with the public sector, which was definitely a benefit."

Angel Trains

"There’s such a good working relationship with Core, it’s like having another permanent person in our organisation."


"We had a really good, down to earth relationship with a few of the guys, and they know what they are doing."

Read our latest blog articles

Harnessing Evergreen IT Services for Strategic Advantage

Maximising Savings on Azure with Core’s Gain-Share Offer
Future-Proofing Your Business: The Perils of Rushing into Copilot for Microsoft 365

AI for All: How Microsoft's Latest Update on Copilot Opens Doors for all Businesses
The Core knowledge hub

Stay up-to-date with the latest insights, trends, and discussions from Core's team of subject matter experts through our blog topics and news articles.

Lucy WrightFeb 9, 2021 9:15:17 AM5 min read

The BYOD effect: the security risks of using personal devices for work

The rise of smartphones and tablets has meant that productivity never needs to stop. Whether you're on a train, in a coffee shop or working from home, you can log on to your device, access the emails, systems and the files you need, and get to work. The switch to remote working in 2020 means its more important than ever that the workforce can work on a variety of devices; but using your own device, also known as Bring Your Own Device (BYOD) can pose serious risks to security that need to be addressed by IT teams. 

In our recent survey of more than 200 IT decision makers, 56% said they felt personal device use has left them more vulnerable to a security breach. 

But with remote working here to stay and BYOD a firm fixture in that, organisations need to assess the risks and take steps to mitigate them.

So, here's a round up of the security risks of using personal devices for work and what can be done about them.

Loss and theft

Of course we all try to look after our personal devices, but we're only human; sometimes, that iPhone gets left in a cafe, or your laptop gets left on a train. Or if you're really unlucky, you might have your device stolen. However it happens, a device in the wrong hands can be a serious security risk to businesses. Personal devices used for work are basically mini computers, full of valuable and sometimes sensitive company information. To mitigate the risks of a device being lost or stolen, companies need to ensure any device being used for work has adequate security settings like two-factor authentication for apps and platforms housing company data, and protocols for lost devices, such as being able to remotely wipe a phone or laptop.


Data breaches

Because personal devices aren't part of a company's IT infrastructure, they aren't protected by the same security that protects the rest of the network - although they do contain much of the same data and information. And by their very nature, personal devices are designed to be used on the go. It's one thing for an employee to work from their phone, tablet or personal laptop in their home office - but when that device gets taken outside of the home, the security risks increase even more, either through connecting to unsecured WiFi networks, from being lost or stolen or even from prying eyes.

Malware and viruses

When an employee uses their personal device, they can access whatever they like on it; they can view any website and download any app, including those that would normally be restricted or blocked by an organisation for security, that might contain malware or viruses. And because staff members are using their devices outside of the office, it can be difficult to monitor which apps are being downloaded. For more on the risks of unsanctioned apps, read this blog.


If an employee is using their personal device to work, chances are they're outside of the office, in a public place (or it was, pre-Covid anyway). This means connecting to open WiFi that can leave the device vulnerable to hackers, who are known to create hotspots that dupe people into connecting. Once connected tot he network, hackers can see the user's passwords, login details and activity. Personal devices are also typical not encrypted, meaning data can be spied on. And having the most robust security often relies on people using the most current version of software. When staff are using corporate-issued devices in the office, this is often done for them. But when working remotely on their own device, it's down to the user to keep on top of updates and new releases.

Tips for protecting against data loss when staff use personal devices

Where possible, organisations should present the minimum services and data to staff using their own devices, by adjusting permissions or service access policies. Giving staff a remote view of information from their device is safer; doing so means if the device is lost or stolen then the amount of accessible data is limited. 

Taking a serious approach to user authentication can also help. Multifactor authentication (MFA) should be deployed alongside the usual corporate credentials such as passwords to access data. Staff should use a different password for unlocking their device than they do to access corporate data. 

Risk-based authentication adds a further layer of protection for personal devices and BYOD users. This works on an "if-then" basis, granting or denying access based on meta-identity such as the type of device, the location of the device being used and other request information. If suspicious activity is identified, alerts can be raised and access restricted. 

There's also no substitute for IT teams keeping their ear to the ground in terms of the services and data being access by BYOD users. Keeping a record of IP addresses, logins, failed authentications and other requests can be helpful in identifying behaviour that might compromise network security.

Finally, organisations should be aware of the risks of BYOD culture. While using personal devices to work can allow people to be more productive - and is especially important during the pandemic - the myriad risks to security it presents shouldn't be underestimated. Staff need to know this too. Have procedures and processes in place - and communicate them clearly - so that staff know what is expected of them when using their own devices to work, and what they can do to reduce security risks when doing so.

e book workshop

Next steps

Core's security workshops are designed to help your organisation plan its security roadmap for the year ahead - which might look different now we are working remotely and businesses are developing a modern workplace.

We also held a webinar around security during remote working, looking at Data Loss Prevention and how to ensure secure and compliant collaboration within Microsoft Teams. Watch the video here.





Lucy Wright

My name is Lucy and this is my author bio.