Local NewsTechnology Upgrade cybersecurity systems, warns expert by Shamar Blunt 29/01/2026 written by Shamar Blunt Updated by Shanna Moore 29/01/2026 4 min read A+A- Reset Share FacebookTwitterLinkedinWhatsappEmail 168 Governments and companies across the region have been urged to re-examine their cybersecurity infrastructure as cyber threats evolve beyond data theft to direct attacks on business operations. ย The advice has come from Matt Castonguay, chief revenue officer at Hitachi Cyber, who has warned that hackers are no longer interested in stealing only data. ย Speaking on Thursday at the Hitachi Cybersecurity Leadership Summit 2026 at the Hilton Barbados Resort, Castonguay warned that modern cyberattacks are increasingly designed to disrupt or shut down critical systems, creating wider financial and reputational fallout. ย You Might Be Interested In Crystal Beckles-Holder, 2nd runner up in regional competition GUYANA: Body of child found after gold mine collapses Barbadians asked to help with return tickets for Haitians โIn the past, cybersecurity breaches have been mainly targeting data. Weโve heard about ransomware โ you get your data locked out, you pay a fee, you get a key, get your data back. Now weโre seeing more deliberate attacks at operations, trying to shut down operations,โ Castonguay said. ย He said ransomware tactics have also evolved, with attackers now focusing on crippling entire systems rather than simply encrypting files. ย โWeโll shut down your operations, weโll shut down your systems, and now you have to pay to use the key to get access to your systems again,โ he explained. โSo thereโs been a kind of an evolution in these levels of threats and the ways that bad actors are actively targeting your business.โ ย Castonguay highlighted identity-based attacks as the primary entry point for most major breaches, despite advances in cybersecurity technology. ย โIf you want to look at the trends to watch, identity-based attacks remain the primary entry point.โย ย โItโs crazy that after all this sophistication, so many breaches are someone who clicked on the wrong link, someoneโs credentials that got hacked, people using the same password across different websites,โ Castonguay said. ย He said compromised credentials often end up on the dark web and are then used in attacks against corporate systems. ย โSo identity access management still remains one of the primary points of all these big breaches that you hear about,โ Castonguay added. ย Artificial intelligence, he said, is further increasing the scale and effectiveness of cybercrime, particularly phishing attacks. ย He said attackers now initiate seemingly harmless interactions that gradually evolve into phishing attempts. ย โAI is increasing the scale and precision of phishing attacks. Before, youโd see the email and youโre like, okay, this doesnโt make any sense, the English is all wrong. Nowadays, itโs so sophisticated that bad actors are creating chatbots and AI agents that are simulating a conversation,โ Castonguay pointed out. ย โIt starts a benign conversation with you, and then eventually leads to a phishing attack. So the level of sophistication has stepped up quite dramatically with the advent of AI.โ ย Castonguay also warned that supply chain vulnerabilities remain a major and often overlooked risk for companies. ย He noted that breaches at third-party vendors can still result in reputational damage for the main company. ย โSupply chain exposure, this is a major one,โ he said. โWeโve seen many breaches where companies have great cybersecurity policies, theyโre protected, theyโre monitoring, theyโre doing all these things, and then they use a third-party vendor for certain aspects of their business.โ ย โThat third-party vendor might have some limited access to customer data, but they might not be secure, and they end up getting breached. Then itโs not the third-party vendor that gets the blame, itโs the company itself.โ ย In recounting real-world consequences of poor cyber defences and policies, Castonguay pointed to the high-profile Colonial Pipeline breach in the United States. ย โThere was a Colonial Pipeline in Texas that was breached two years ago. It was an old VPN account that still had administrative privileges, but nobody was using that account. It was from a former employee and it was still there and it was dormant, but it had full rights.โ ย โThrough brute force, someone was able to find access to this account, get access to the whole network, and then just start taking things apart,โ Castonguay said. ย โA simple cybersecurity assessment or review of the policies would have listed inactive accounts with administrative privileges. It should have been something simple to detect.โ ย He said the failure to address that basic issue resulted in โtens of millions of dollars in ransomware and business outage damage, as well as reputational damages.โ ย Shamar Blunt You may also like Thorne unveils St John development plan during manifesto launch 08/02/2026 Quick response by hospital staff and fire officers contains QEH fire 08/02/2026 In custody: Jeremy Shamar Moore 08/02/2026