Offering a joined-up "full-stack" "full-service" experience, designed to propel your business success.
Designed to keep you at the cutting edge of AI, Cyber, and IT advancements, we are voicing the unsaid and shaping the future of business technology solutions.
Latest Insights
As a Business Technology Services Partner, we explore the art of the possible.
Our Microsoft Partnership
Thank you for your interest in Acora. We'd love to hear from you! Please feel free to drop us a message via our contact form.
Follow Us
Work with us
Essence of Acora
To view this video please enable JavaScript, and consider upgrading to a web browser that
Home Insights Cyber Security
Introduction to AI and Data Privacy Currently, 75% of financial services and the largest law businesses are already using AI technology. So are 68% of large accountancy and consulting businesses. However, as with many valuable technological advancements, unleashing AI potential…
From energy services to the healthcare system, the critical infrastructure sector has become a prime target for devastating ransomware attacks that can bring life as we know it to a standstill. Trustwave SpiderLabs’ energy and utilities research 2025 report reveals…
AI’s Role in Modern Cyber Attacks Artificial intelligence (AI) cyber attacks are the top concern for 80% of Chief Information Security Officers (CISOs) polled by BCG in 2025. Cyber criminals use AI to orchestrate increasingly sophisticated and targeted attacks, making…
On the latest CXO Secrets podcast, Darren Humphries, Acora’s Group CISO, and Arron Thundercliffe, Cyber Defence & Threat Intelligence at Google Cloud, share the shift in aligning Dev, IT and Cyber Security today, grounded insights into what it takes to…
In this expert-led conversation, Acora’s Director of Data Strategy & AI, Simon Crumplin, alongside Group Marketing Director Bruce Simpson, share grounded insights into what it takes to turn AI ambition into real business outcomes. From digital transformation to business optimisation,…
Build Layered Security & Proactively Manage Threat Detection Cyber threats can be categorised into opportunistic, material, and targeted attacks, each requiring different levels of preparedness. Opportunistic Attacks Random, large-scale attacks such as phishing emails that aim to exploit vulnerabilities without…
Following on from our CISO Predictions released in December, our Director of Cyber Security Sales, James Fernley, shares what is on his mind ahead of 2025. From Insider Threats, to the prevalence of Ransomware, to the evolving role of a…
Identity has become a primary target, with 𝟴𝟮% of data breaches and ransomware attacks being tied to compromised credentials. In today’s hybrid environments, legacy systems and IT infrastructure struggle to support modern security controls such as Multi-Factor Authentication (MFA) and…
Acora’s Head of Enterprise Security, Simon Crumplin and Head of Cyber Services, James Fernley, recently sat down with Citreno’s Founder & CEO, Svetla Yankova, to explore what it really takes to build and manage a modern-day SOC.