Login to your account

Username *
Password *
Remember Me

Blog

It isn’t difficult to find evidence of the fast-growing cybersecurity risks that companies of all sizes and in all sectors now face.

For example, as this article was being researched and written, one of Canada’s largest energy producers was crippled by a major cyberattack that took its point of sale systems, website, app, and internal messaging systems offline. Suncor Energy, which owns the Petro-Canada chain of over 1,500 retail gas stations, later confirmed customer information had been compromised.

The attack reinforces the unsettling reality of cybersecurity in 2023: we no longer have to look far to find evidence of its spread. The impact is, literally, right in front of us, and not even global energy giants are immune. 

Published in Blog

There’s no way to sugar coat it: the economy is heading into turbulent waters.

As is often the case during a downturn, the impact on businesses will be profound, with tighter budgets, tougher-to-justify business cases, and a general desire to slow down and hold on tight.

Information technology isn’t immune, and conventional wisdom might suggest tech leaders should also be battening down the hatches. But we humbly suggest conventional wisdom needs a dose of modernization; now is the time for IT to hit the gas on investing. 

Published in Blog

A major ransomware attack Sunday kicked the majority of Italians off of the internet before administrators were able to restore service.

Italy’s National Cybersecurity Agency, ACN, said the attackers targeted a known vulnerability in VMware’s ESXi servers. VMware encouraged customers to install patches.

If it feels like you’ve heard this story before, that’s because you probably have. In fact, you’re forgiven for thinking this feels like Groundhog Day.

That’s because the vulnerability was first detected almost two years ago, and the Canadian Centre for Cyber Security issued its first security advisory – known as AV21-093 – on February 24, 2021. The Canadian cybersecurity agency issued a second advisory, AV22-689, on December 9, 2022. 

Published in Blog

Forgive us, but here at STEP Software, we’re optimists, and we believe the dawn of a new year brings all sorts of opportunities for renewal and growth to employers and their employees.

Optimistic doesn’t mean we aren’t realistic, though, and as 2023 dawns all fresh and clean and shiny and new, we also recognize that cybercriminals remain as threatening and dirty as they’ve always been. Actually, even more so.

So, as we’ve been reviewing our own cybersecurity plans for the upcoming year, we wanted to share some recommendations with you so that you can consider incorporating them into your own workflow. Because it’s always a good time to focus on cybersecurity.

Published in Blog

Whatever business you’re in, it’s reasonable to assume that software powers your day-to-day operations.

So as the end of year approaches, now is an ideal time to look at all of your software-related assets through a critical lens and ask whether or not you’re getting your money’s worth.

Published in Blog

Outsourcing your IT department offers impressive benefits, such as improving productivity, increasing security, and gaining access to the latest technology. However, one of the main advantages of using a managed service provider is that it is an excellent way to save your company money in many ways. Instead of hiring additional IT employees, a managed service provider will take care of all your technical needs in the workplace at a fixed price each month. Ultimately, this will make it easier to stay within a budget, as you will not have to worry about any unexpected expenses.

Here are a few more ways that an IT service provider can save your business money.

Published in Blog


Our exceptional talented developers and supportive team, combined with our highly effective, well-developed methodology has provided custom applications to Fortune 500 corporations and entrepreneurial companies.

 

Latest Posts from Blog

Toyota halts production after hard drive fills up: The 6 things you must know.

Toyota halts production a...

Is quality still job one at Toyota? The global aut...

CDW/IDC Canada report: Businesses facing unprecedented cybersecurity risks

CDW/IDC Canada report: Bu...

A new report from CDW Canada and IDC Canada contai...

Luna-25 and Chandrayaan-3 tell two very different stories for developers

Luna-25 and Chandrayaan-3...

As space missions go, Russia’s Luna-25 and India’s...

Maui wildfire alert system failure highlights critical gaps in disaster planning

Maui wildfire alert syste...

As the death toll from the wildfires that destroye...

LastPass breach: an historic - and likely ignored - cybersecurity lesson

LastPass breach: an histo...

In a world where a new cybersecurity breach is rev...

Cybersecurity staffing alert - Gartner sounds the alarm about stress and retention

Cybersecurity staffing al...

If you think the current cybersecurity crisis is c...

Apple’s new device fingerprinting rules send clear privacy message to developers

Apple’s new device finger...

Apple’s crusade to tighten privacy in its App Stor...

Developers take notes as Twitter rebrands as X – and kills the bird for good

Developers take notes as...

Elon Musk’s decision to kill the Twitter bird and...

Threads privacy policies reveal need for better development best practices

Threads privacy policies...

Meta’s wannabe-Twitter-killer, Threads, is having...

As business concerns over AI ethics continue to worsen, new best practices emerge

As business concerns over...

No one doubts that generative AI is the next big t...

Cybersecurity budgets fail to keep pace with intensifying threat landscape

Cybersecurity budgets fai...

It isn’t difficult to find evidence of the fast-gr...

Is Meta Threads a Twitter killer? The answer may surprise you.

Is Meta Threads a Twitter...

It’s no exaggeration to say the arrival of Meta’s...