<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=111591952803728&amp;ev=PageView&amp;noscript=1">
Skip to content
Our difference

We are on a mission to deliver innovative business transforming technology solutions that exceed our customers’ expectations.
 

Our culture

Our values guide us in everything we do and help shape our culture and customer approach. Find out more about our values and meet some of our team.
 

Our Microsoft Partnership

As a Microsoft Solutions Partner, we’ve been at the centre of the revolutionary changes that technology has brought to every aspect of life and we continue to stand by their side at the centre of tomorrow’s digital transformations.

Microsoft Solutions Partner

Our partners

We have successfully built relationships with multiple partners that prepare businesses for the future.
 

Carbon management

We understand our environmental responsibilities as a UK business and IT Managed Service Provider, and we understand how important it is for our customers to partner with responsible providers.
 

Careers

Our team is made up of a diverse group of people from all around the world, and we all have one thing in common: we’re passionate about providing our customers with outstanding solutions.

Thinking of selling your IT business?

Core is a well funded Microsoft Solutions Partner with a 30 year history of being at the heart of control in IT.

We are supported by our bankers and have funds available for strategic business acquisitions. Together with our successful acquisition track record and a commitment to making deals happen, now is the perfect time to talk to us if you are considering selling your IT business.

If you are interested in discussing a potential exit of your IT business, please complete the form on the right. All correspondence will be treated in the strictest of confidence and a mutual non-disclosure agreement will be exchanged prior to any discussions taking place.

Interactive Microsoft workshops

Our workshops are designed to help you realise the value of Microsoft technologies in your business, gain real value from your investment and transform the way you work.

The workshops are a collaborative and immersive experience; our experts will work with you to identify your business objectives and establish the Microsoft technologies to help you achieve them.
 

Request a workshop

Our range of workshops covers every aspect of the modern workplace including productivity, collaboration, identity, security and compliance and communication, with interactive and engaging sessions that bring the art of the possible to life.

Download our workshop guide

Read more about the interactive workshops we offer, and how they can benefit your business by downloading our guide.

MCI Workshop Introduction

Managed Services

Discover why Core is the first choice for many organisations looking to add flexibility, efficiency, and expertise to their teams.

Cloud Technology

From Microsoft’s leading platforms to bespoke cloud solutions, Core’s range of cloud technology solutions covers everything the modern workplace needs.

Professional Services

Whichever challenges you face on your digital journey, Core's professional services team has a solution to help, from IT Project Management to our innovative Smart Services.

Public Sector

Certified secure solution for the public sector, providing a reliable, flexible, secure and affordable IT solution.

Commercial Sector

Certified commercial sector solutions, covering all your commercial needs from financial and legal services, through to manufacturing.

Download our Frontline Workers white paper

Learn how technology can help to balance productivity with wellbeing for Frontline Workers.

White paper: How technology is revolutionising the health and productivity of frontline workers


Why customers choose us

Since we were founded in 1990 and started our Microsoft journey, we have supported over 10,000 customers on their communications and collaboration projects, and with the introduction of Microsoft's cloud technology, have grown our capabilities significantly across Microsoft 365 and Azure.

What sets us apart is a talented and passionate team who truly love what they do, demonstrating boundless enthusiasm and dedication in every single project.
 

logo-menu-david-lloyd

"It was apparent from day one that Core had a depth of knowledge in Microsoft 365, which we simply hadn’t found anywhere else."

Greater London Authority

"Core has a lot of experience working with the public sector, which was definitely a benefit."

Angel Trains

"There’s such a good working relationship with Core, it’s like having another permanent person in our organisation."

Talbot

"We had a really good, down to earth relationship with a few of the guys, and they know what they are doing."

Read our latest blog articles

Maximising Savings on Azure with Core’s Gain-Share Offer



Future-Proofing Your Business: The Perils of Rushing into Copilot for Microsoft 365
AI for All: How Microsoft's Latest Update on Copilot Opens Doors for all Businesses



Defending Against Modern Cyber Threats with Managed Services
The Core knowledge hub

Stay up-to-date with the latest insights, trends, and discussions from Core's team of subject matter experts through our blog topics and news articles.


Core NewsroomMar 4, 2022 12:40:04 PM4 min read

Core’s approach to security in times of increased cyber threats

Are you prepared for heightened cyber threats? Here is what Core is doing and you what you should consider too.

In the current circumstances of heightened threat and concerns around the increased cyber-attacks in Europe, we at Core would like to reassure our customers of the steps we have taken to ensure the security of both our own and our customers’ environments.

In line with the key areas highlighted by the National Cyber Security Centre, (NCSC), this document is an overview of our approach to, and recommendations regarding, these key security areas.

Patching

Core deploys a rigorous schedule of patching of vulnerabilities and application updates, both on our own environments and for those of our customers whose environments we manage.

Regular scans are deployed on our own and managed customer environments, identifying any missing patches for remediation. We use specific tools to ensure our systems, and the systems we manage for customers, are patched and up to date.

We strongly recommend organisations take an uncompromising approach to ensuring all devices, including end user devices, are up to date and patched; and that any vulnerabilities identified are addressed without delay.

Threat Protection Workshop

Access Controls

At Core, we follow best practice for strong access controls with regard to our internal systems and recommend customers review their tenants to ensure access is limited only to those requiring access.

We operate a strict policy on privileged and service accounts to ensure that if a user’s standard account is compromised, this does not present a threat through their privileged access to ours, or our customer platforms. MFA is also mandatory for all privileged access.

Our baseline policy recommendation for customer environments is to enable proper Role-Based Access Control, MFA and Conditional Access policies to monitor and manage access. We will be further reviewing those tenants we manage for our customers to confirm and highlight areas where Access Controls can be improved for our customers’ environments.

Breach Prevention Protections

Antivirus and Anti-malware managed by Core is up to date and deployed across all devices. If your device security is not managed by Core, please check with your appropriate supplier.

We recommend you ensure end users are installing pending updates and make it mandatory to ensure no entry points are left undefended. We have advised customers where there are known vulnerabilities already, and we would recommend customers review this information.

Logging and monitoring

Infrastructure devices such as network devices (switches, firewalls, access points) and servers are fully monitored; and alerts and warnings are addressed in a timely manner.

Alerting is configured to identify and advise on any unexpected deviations from normal service operations, which assists us to address any unusual behaviour that may indicate an issue.

Backups

We run appropriate backup strategies for all services that we provide to customers. Backup integrity and restore capability is checked daily for mission critical services.

For customers’ own environments, the level of backup and restore capability will be defined by the customer’s requirements. Core recommends all customer-run backups be monitored for failures and immediate remediation.

Customers wishing to explore additional backup and restore options for their environments should contact their Core Account Manager.

Incident planning

Core as an MSP, has incident, major incident, and security incident processes and procedures, and encourages customers to have published processes in a location accessible to your key employees for rapid use. We suggest you encourage employees to read, understand and feedback on documented processes.

External Access

We defend external entry points into our environments and for those of our customers whose environments we manage, through a comprehensive range of breach prevention measures. MFA is used on all management platforms, and we recommend you ensure MFA is activated to secure entry points to your environments as well.

If Core is not currently managing your network, please check with your relevant supplier.

Phishing Attacks

Ingress points are most likely end-user devices and Core recommends awareness training for users, such as highlighting phishing attacks.

We have enabled all available tools in the M365 E5 suite to aid in the prevention of attempted phishing attacks reaching Core staff users. We undertake regular staff training to ensure that our team can recognise phishing emails and run regular test attacks to highlight areas where further training is needed.

Customers using M365 E3 and above have access to tools that will help to reduce some of the risks associated with phishing attacks through blocking emails, attachments and malicious links. Core’s standard approach is to enable these tools for customers who are under our management, but please check your documentation to confirm if these have been enabled.

For customers that are not under Core management, or want to enable these tools, please contact your Core Account Manager or email hello@core.co.uk to speak to a member of our team about increased IT security.

Third-Party Access

Core manages all third-party accesses into its systems in line with best practice. All contractors are required to have a Core identity and MFA is mandatory for all accesses. More information is provided above under ‘Access Controls’.

As a key Microsoft Partner, we would also point our customers to Microsoft’s website for updates on measures being taken to support the platform as events unfold in Europe.


If you would like to know more about how Core can help protect your business from growing threats, check your eligibility for a funded Threat Protection Workshop.

avatar

Core Newsroom

Stay informed with Core's blog topics by our subject matter experts.