<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=111591952803728&amp;ev=PageView&amp;noscript=1">
Skip to content
Our difference

We are on a mission to deliver innovative business transforming technology solutions that exceed our customers’ expectations.
 

Our culture

Our values guide us in everything we do and help shape our culture and customer approach. Find out more about our values and meet some of our team.
 

Our Microsoft Partnership

As a Microsoft Solutions Partner, we’ve been at the centre of the revolutionary changes that technology has brought to every aspect of life and we continue to stand by their side at the centre of tomorrow’s digital transformations.

Microsoft Solutions Partner

Our partners

We have successfully built relationships with multiple partners that prepare businesses for the future.
 

Carbon management

We understand our environmental responsibilities as a UK business and IT Managed Service Provider, and we understand how important it is for our customers to partner with responsible providers.
 

Careers

Our team is made up of a diverse group of people from all around the world, and we all have one thing in common: we’re passionate about providing our customers with outstanding solutions.

Thinking of selling your IT business?

Core is a well funded Microsoft Solutions Partner with a 30 year history of being at the heart of control in IT.

We are supported by our bankers and have funds available for strategic business acquisitions. Together with our successful acquisition track record and a commitment to making deals happen, now is the perfect time to talk to us if you are considering selling your IT business.

If you are interested in discussing a potential exit of your IT business, please complete the form on the right. All correspondence will be treated in the strictest of confidence and a mutual non-disclosure agreement will be exchanged prior to any discussions taking place.

Interactive Microsoft workshops

Our workshops are designed to help you realise the value of Microsoft technologies in your business, gain real value from your investment and transform the way you work.

The workshops are a collaborative and immersive experience; our experts will work with you to identify your business objectives and establish the Microsoft technologies to help you achieve them.
 

Request a workshop

Our range of workshops covers every aspect of the modern workplace including productivity, collaboration, identity, security and compliance and communication, with interactive and engaging sessions that bring the art of the possible to life.

Download our workshop guide

Read more about the interactive workshops we offer, and how they can benefit your business by downloading our guide.

MCI Workshop Introduction

Managed Services

Discover why Core is the first choice for many organisations looking to add flexibility, efficiency, and expertise to their teams.

Cloud Technology

From Microsoft’s leading platforms to bespoke cloud solutions, Core’s range of cloud technology solutions covers everything the modern workplace needs.

Professional Services

Whichever challenges you face on your digital journey, Core's professional services team has a solution to help, from IT Project Management to our innovative Smart Services.

Public Sector

Certified secure solution for the public sector, providing a reliable, flexible, secure and affordable IT solution.

Commercial Sector

Certified commercial sector solutions, covering all your commercial needs from financial and legal services, through to manufacturing.

Download our Frontline Workers white paper

Learn how technology can help to balance productivity with wellbeing for Frontline Workers.

White paper: How technology is revolutionising the health and productivity of frontline workers


Why customers choose us

Since we were founded in 1990 and started our Microsoft journey, we have supported over 10,000 customers on their communications and collaboration projects, and with the introduction of Microsoft's cloud technology, have grown our capabilities significantly across Microsoft 365 and Azure.

What sets us apart is a talented and passionate team who truly love what they do, demonstrating boundless enthusiasm and dedication in every single project.
 

logo-menu-david-lloyd

"It was apparent from day one that Core had a depth of knowledge in Microsoft 365, which we simply hadn’t found anywhere else."

Greater London Authority

"Core has a lot of experience working with the public sector, which was definitely a benefit."

Angel Trains

"There’s such a good working relationship with Core, it’s like having another permanent person in our organisation."

Talbot

"We had a really good, down to earth relationship with a few of the guys, and they know what they are doing."

Read our latest blog articles

Harnessing Evergreen IT Services for Strategic Advantage



Maximising Savings on Azure with Core’s Gain-Share Offer
Future-Proofing Your Business: The Perils of Rushing into Copilot for Microsoft 365



AI for All: How Microsoft's Latest Update on Copilot Opens Doors for all Businesses
The Core knowledge hub

Stay up-to-date with the latest insights, trends, and discussions from Core's team of subject matter experts through our blog topics and news articles.


Lucy WrightJul 23, 2020 10:00:00 AM5 min read

Data under attack: the year's biggest breaches so far

Data breaches are happening all the time.

In May 2020, 40 million records were breached when a Thai mobile phone network, AIS, had their database exposed. And while this breach was addressed and resolved quickly by the company, even the smallest breach can have a lasting and damaging effect both on the organisation that has been hacked, and the victims of it. In May this year, the identities of 250 abuse survivors in Northern Ireland were revealed by the Historical Institutional Abuse Enquiry, in what was called a "massive" error; a monthly newsletter was sent to a mailing list without the survivors names being concealed.

It's obvious then, that the nature of the data that has been breached makes some attacks more significant and impactful than others. But for every organisation, a data breach is an embarrassing and damaging event that can permanently tarnish a company's reputation.

With Covid-19 dominating the news headlines for most of the year, many data breaches have happened relatively unnoticed; but they have happened. Here are some of the biggest data breaches of 2020 that you might not have heard about…

MGM Resorts

When? February 2020

How? Hackers

What? In February, the personal details of 10.6 million hotel guests at MGM Resorts were accessed and posted on a hacking forum. Names, home addresses, phone numbers, emails and even the dates of birth of some hotel guests were shared. In July of this year, more than 140 million personal records of MGM Resorts hotel guests were found for sale on the Dark Web suggesting that the initial breach was actually larger than first reported.

Source: https://www.bbc.co.uk/news/technology-51568885

Antheus Tecnologia

When? March 2020

How? Access through an unsecured server

What? In March this year, it was revealed that a Brazilian biometric solutions company which held sensitive information including more than 70,000 fingerprints, had suffered a breach through an unsecured server. The server did not hold fingerprint scans, but did it hold binary code which hackers could use to recreate them. It was reported that the company had failed to password protect or encrypt their database, which also included administrator login information, employee phone numbers and company emails. 

Source: https://www.cnet.com/news/thousands-of-fingerprint-files-exposed-in-unsecured-database-research-finds/

Marriott

When? March 2020

How? Hackers accessing Marriott staff accounts

What? Marriott, one of the world’s leading hotel chains, fell victim to a breach in March 2020 which impacted more than 5 million hotel guests. Hackers accessed a range of customer information via two accounts belonging to Marriott staff. Personally identifiable information such as names, gender, phone numbers and loyalty scheme details were accessed.

Source: https://techcrunch.com/2020/03/31/marriott-hotels-breached-again/

Nintendo

When? April 2020

How? It's not entirely clear how the breach happened. but Nintendo have said that hackers got access to customer accounts by obtaining account passwords “by some means other than our company’s service".

What? Some hackers seem to be gamers, too! In April, gaming company Nintendo announced that the details of around 160,000 users had been compromised through an account hijacking scheme. The affected customers claimed their accounts were being used to by the virtual currency for Fortnite and other games.

Source: https://www.bbc.co.uk/news/technology-52369435

US Small Business Administration (SBA)

When? April 2020

How? The website portal through which people could apply for loans was compromised, leading the SBA to disable and relaunch the portal.

What? Hackers have even seized the Covid-19 pandemic as an opportunity to get their hands on data. In April, the US Small Business Administration (SBA) announced that around 8,000 people who had applied for emergency business loans due to the pandemic had had their data breached. The online loan application portal included personal information such as social security numbers, home addresses, email addresses, dates of birth and citizen status; information that lends itself perfectly to identity theft.

Source: https://www.forbes.com/sites/quickerbettertech/2020/04/26/the-sba-suffers-a-data-breach-congress-gets-zoom-bombedand-other-small-business-tech-news/#5a1b576136e5

easyJet

When? May 2020

How? At the time, easyJet said it was the victim of a "highly-sophisticated cyber attack" but didn't provide further details.

What? When financial details are compromised, breaches take a more sinister turn. In May of this year, easyJet revealed that the details of 9 million customers had been infiltrated, including more than 2,000 credit card records. The breach was so severe that easyJet had an £18 billion class-action lawsuit filed against them.

Source: https://www.bbc.co.uk/news/technology-52722626

How can you protect your data?

Endpoints are end user devices like laptops, mobiles and desktop computers which serve as an access or entry point to your enterprise network. Malicious threats can enter your network through unsecured endpoints.

The shift to a cloud-first model which incorporates mobile working and 'bring your own device' (BYOD) culture is adding to endpoint vulnerability and creating more opportunities for networks to be targeted, compounded by the fact that many of us are now working remotely and using unsecured WiFi to get online. What this means, is network protection is no longer enough. Today, organisations need to control, manage and monitor all their endpoints to defend against a data breach.

If networks or endpoints are compromised (which at some point, they will be) either through external attack, internal accidents (USB sticks etc) or deliberate acts from disgruntled employees – there are things you can have in place to make sure you retain control of the data and information.

Identity management is key to ensuring only the right people can access data.  2FA/Multi factoring authentication is critical to prevent impersonation and password breaches – in short, they are who they say they are.

Tools like content rights management ensure that data is always under your control and access granted in ‘real time’.  Access to data is only given where an (authenticated) person has permissions to specific data – at the time.

Privileged access management ensures even admin type roles only have access to preform specific duties and for only as long as is essential to perform them.

Core's integrated approach to security protects both your networks and data. You can protect your entire Microsoft Office 365 environment, protect against the latest online threats and secure mobile devices against leaks, as well as making sure you have the right access management in place so that only authorised people can access your systems.

If you're ready to take a fresh look at your security strategy, the best place to start is with a Security Discovery Session with our Client Solutions Director. Right now, we're offering this 2-hour call for free, so you can get started on your security journey and put the tools in place to protect your network while businesses continue to work remotely. Click the link below to book your free session, see our security services here or contact us to chat about our security offerings.

 

BOOK A SECURITY DISCOVERY SESSION

 

avatar

Lucy Wright

My name is Lucy and this is my author bio.