Canvas Hack: Cybersecurity is not just an IT issue – it is a critical business risk

Written by
Nick Cross
Published on
May 13, 2026

The recent breach of the Canvas learning management system has affected nearly 9,000 institutions and 30million users worldwide. The parent company, Instructure, reportedly paid a ransom to the ShinyHunters hacking group to stop the distribution of 3.5terabytes of stolen data, which included sensitive personal information. This incident serves as a strong reminder of the growing cyber threats organisations are facing today.

For CISOs, CEOs, and CFOs, this event is more than just another news story; it is a crucial case study that highlights the serious consequences of weak cybersecurity practices and the urgent need for a strategic review.

The Cost of Compromise: Beyond Financial Losses

The Canvas breach impacted educational institutions in countries like the United States, the United Kingdom, Canada, Australia, the Netherlands, and Sweden. It shows a recurring weakness: the failure to learn from past incidents and improve security measures. The choice to pay a ransom, while it may reduce immediate data exposure, reveals the serious pressure and damage to reputation that arise when an organisation’s digital infrastructure is breached. Beyond the direct financial costs of fixing the issue and potential regulatory fines, the loss of trust among users, partners, and stakeholders can have lasting, harmful effects on brand reputation and market position.

Executive leadership must understand that cybersecurity is not just an IT issue; it is a critical business risk. The focus of the C-suite should shift from reacting to damage control to managing risks proactively, ensuring they invest in strong systems and sound frameworks.

Com-X, an Australian-based Managed Security Services Provider, works daily with clients to secure their operations. We help them follow cybersecurity frameworks like Essential 8 and ISO, while handling complex Governance, Risk, and Compliance (GRC) factors. We often see that many organisations in Australia, despite their resources, remain vulnerable because of outdated security measures and antiquated systems.

The AI Frontier: A New Dimension of Cyber Risk

The rapid growth of AI adds another layer of difficulty to this already complex situation. The Australian Prudential Regulation Authority (APRA) recently sent a critical letter to the industry, urging a significant change in how financial institutions handle AI-related risks and governance. APRA pointed out the rise of “high capability AI frontier models” like Anthropic’s ‘Mythos’, which can autonomously find and exploit previously unknown security weaknesses. This advancement significantly increases the cyber threat landscape, demanding stronger measures to close the gap between old security methods and future-proof solutions.

Traditional legacy endpoint operating systems, often secured by various point solutions, are increasingly inadequate in an environment dominated by SaaS applications and AI browser extensions. This old approach creates a false sense of security, leaving organisations exposed. Where consideration to migrate to immutable and read-only operating systems, along with business continuity and disaster recovery options that can be measured in minutes rather than days, are now essential for maintaining progress and resilience.

Moreover, the unchecked flow of data from one SaaS system into an AI tool/browser extension, which unintentionally trains that tool to be smarter, represents a major and often ignored risk. This practice, regardless of an organisation’s regulatory status, is not wise IT and can lead to serious data governance and compliance problems. While users remain a weak link in cybersecurity, organisations that stick to outdated approaches without proper controls are inviting the next breach.

There is a lot to consider and a lot that should change in how security evolves whilst capturing the promise of AI and maintaining productive growth for Australian businesses.

From External Access to Enterprise-Wide Browser-First Application Delivery

The Canvas hack is a clear example of application publishing to external users, but in reality, this same model is used continuously for internal application delivery across organisations. The ability to securely publish business-critical applications through modern browser-based experiences allows organisations to simplify endpoint management, improve user experience, reduce infrastructure overheads, and strengthen security controls across distributed workforces.

This is particularly relevant in sectors such as healthcare, financial services, education, and government, where users require seamless access to sensitive applications from multiple locations and devices without compromising compliance or operational resilience.

Many organisations continue to rely on legacy operating systems, ageing endpoint architectures, and traditional VPN-centric approaches that were not designed for today’s SaaS-driven and AI-enabled environments. These environments often introduce unnecessary complexity, security gaps, and significant operational costs. Modern secure enterprise browsers, immutable operating systems, and application isolation technologies now provide far more effective ways to secure users, applications, and data.

However, transitioning from legacy application delivery and endpoint models requires careful planning, architecture expertise, and operational experience. Poorly executed migrations can create business disruption, user friction, and unintended security exposure. This is why organisations are increasingly partnering with experienced specialists such as Com-X to modernise application delivery strategies securely and effectively.

Com-X works with organisations to design secure, scalable application delivery environments that support both external and internal users, while aligning security outcomes with operational and business objectives. Whether modernising existing environments, understanding where reducing dependence on traditional operating systems and adopting secure enterprise browser-based workflows, or supporting AI-enabled workplaces; Com-X bring the specialist guidance that is essential to ensuring organisations remain resilient against rapidly evolving cyber threats.

Securing the Future: A Proactive Approach with Com-X

Com-X recognises these evolving challenges. We offer a free Essential 8 Rapid Assessment or Penetration Test for key internet-facing infrastructure to provide valuable help in identifying gaps and outlining strategic options that meet your business goals. Our expertise includes modernising endpoint protection; lowering costs associated with old operating systems and pricey security tools; and thoroughly securing your SaaS applications and AI browser extensions. We achieve this without relying on outdated methods like backhauling network traffic, ensuring a streamlined and strong security posture.

In an age where cyber threats are becoming more sophisticated and regulatory demands are increasing, proactive and smart cybersecurity is essential. The Canvas breach and APRA’s warnings about AI-related risks clearly indicate that executive leadership must invest in modern security solutions.

Com-X is your partner in navigating this complex landscape, transforming your cybersecurity from a reactive cost into a strategic support for business continuity and growth. Contact us today if you’re like to explore a different and more secure approach for your IT strategy.

Ready to Upgrade your IT & Cybersecurity Solutions?