Home ยป Posts ยป Upgrade cybersecurity systems, warns expert

Upgrade cybersecurity systems, warns expert

by Shamar Blunt
4 min read
A+A-
Reset

Governments and companies across the region have been urged to re-examine their cybersecurity infrastructure as cyber threats evolve beyond data theft to direct attacks on business operations.

ย 

The advice has come from Matt Castonguay, chief revenue officer at Hitachi Cyber, who has warned that hackers are no longer interested in stealing only data.

ย 

Speaking on Thursday at the Hitachi Cybersecurity Leadership Summit 2026 at the Hilton Barbados Resort, Castonguay warned that modern cyberattacks are increasingly designed to disrupt or shut down critical systems, creating wider financial and reputational fallout.

ย 

โ€œIn the past, cybersecurity breaches have been mainly targeting data. Weโ€™ve heard about ransomware โ€” you get your data locked out, you pay a fee, you get a key, get your data back. Now weโ€™re seeing more deliberate attacks at operations, trying to shut down operations,โ€ Castonguay said.

ย 

He said ransomware tactics have also evolved, with attackers now focusing on crippling entire systems rather than simply encrypting files.

ย 

โ€œWeโ€™ll shut down your operations, weโ€™ll shut down your systems, and now you have to pay to use the key to get access to your systems again,โ€ he explained. โ€œSo thereโ€™s been a kind of an evolution in these levels of threats and the ways that bad actors are actively targeting your business.โ€

ย 

Castonguay highlighted identity-based attacks as the primary entry point for most major breaches, despite advances in cybersecurity technology.

ย 

โ€œIf you want to look at the trends to watch, identity-based attacks remain the primary entry point.โ€ย 

ย 

โ€œItโ€™s crazy that after all this sophistication, so many breaches are someone who clicked on the wrong link, someoneโ€™s credentials that got hacked, people using the same password across different websites,โ€ Castonguay said.

ย 

He said compromised credentials often end up on the dark web and are then used in attacks against corporate systems.

ย 

โ€œSo identity access management still remains one of the primary points of all these big breaches that you hear about,โ€ Castonguay added.

ย 

Artificial intelligence, he said, is further increasing the scale and effectiveness of cybercrime, particularly phishing attacks.

ย 

He said attackers now initiate seemingly harmless interactions that gradually evolve into phishing attempts.

ย 

โ€œAI is increasing the scale and precision of phishing attacks. Before, youโ€™d see the email and youโ€™re like, okay, this doesnโ€™t make any sense, the English is all wrong. Nowadays, itโ€™s so sophisticated that bad actors are creating chatbots and AI agents that are simulating a conversation,โ€ Castonguay pointed out.

ย 

โ€œIt starts a benign conversation with you, and then eventually leads to a phishing attack. So the level of sophistication has stepped up quite dramatically with the advent of AI.โ€

ย 

Castonguay also warned that supply chain vulnerabilities remain a major and often overlooked risk for companies.

ย 

He noted that breaches at third-party vendors can still result in reputational damage for the main company.

ย 

โ€œSupply chain exposure, this is a major one,โ€ he said. โ€œWeโ€™ve seen many breaches where companies have great cybersecurity policies, theyโ€™re protected, theyโ€™re monitoring, theyโ€™re doing all these things, and then they use a third-party vendor for certain aspects of their business.โ€

ย 

โ€œThat third-party vendor might have some limited access to customer data, but they might not be secure, and they end up getting breached. Then itโ€™s not the third-party vendor that gets the blame, itโ€™s the company itself.โ€

ย 

In recounting real-world consequences of poor cyber defences and policies, Castonguay pointed to the high-profile Colonial Pipeline breach in the United States.

ย 

โ€œThere was a Colonial Pipeline in Texas that was breached two years ago. It was an old VPN account that still had administrative privileges, but nobody was using that account. It was from a former employee and it was still there and it was dormant, but it had full rights.โ€

ย 

โ€œThrough brute force, someone was able to find access to this account, get access to the whole network, and then just start taking things apart,โ€ Castonguay said.

ย 

โ€œA simple cybersecurity assessment or review of the policies would have listed inactive accounts with administrative privileges. It should have been something simple to detect.โ€

ย 

He said the failure to address that basic issue resulted in โ€œtens of millions of dollars in ransomware and business outage damage, as well as reputational damages.โ€

ย 

You may also like

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it. Accept Privacy Policy

-
00:00
00:00
Update Required Flash plugin
-
00:00
00:00