Four Steps to protecting your business from the quantum threat

Issue 1 2025 IoT & Automation, AI & Data Analytics

Are you ready for Q-day? Post-quantum cryptography is not just an IT issue, it is a business continuity concern. Quantum computing is fast becoming a reality. The United Nations has declared 2025 as the International Year of Quantum Science and Technology. While this evolution of computing keeps the world at the forefront of innovation, businesses across the globe are being warned to bolster protection protocols to avoid losses through decryption.

According to Forbes magazine, “2025 could mark the arrival of ‘Q-Day’. This is a theoretical point in time when quantum computers become powerful enough to render many methods of encryption redundant – with severe consequences for privacy and security.”

As this sector transforms, there are four essential steps to protecting businesses now, and well into the future.


Carrie Peter.

Step 1: Create an encryption inventory

Think of this as a digital safety audit. As part of the audit, the IT team or provider creates and supplies a comprehensive list of all the places where the business uses encryption. Here, it is essential that organisations review and revise how they store their customer data, their email systems, how financial transactions are processed, the management of cloud services, access to remote work tools, and website security certificates.

Step 2: Secure unencrypted data

For smaller businesses that do not encrypt their data, the duty of protection remains their responsibility. Here organisations can take cost-effective, yet highly practical and impactful steps to securing their datasets.

To protect customer data stored on computers, free tools like VeraCrypt empower users to create encrypted containers for sensitive files, saving them in a digital safe. To secure email communication, services like ProtonMail offer free encrypted email accounts. For password management, tools like Bitwarden (free tier available) store passwords in an encrypted vault and can generate strong, unique passwords. Lastly, to assist in encrypting mobile devices, businesses must use the built-in encryption freely available on Android and iPhone devices - just turn it on in settings.

These are just some examples of how small enterprises can protect their data without a large capital outlay.

Step 3: Identify the business’s crown jewels

Focus on what needs protection in the medium to long term. Pay close attention to customer data that must be protected for years, trade secrets and intellectual property, financial records that need long-term storage, legal documents and contracts, healthcare records, and research and development information.

Which data would harm our business if exposed in five to 10 years? What information are we legally required to protect? Which systems contain our most sensitive customer data? These are key questions to ask.

Step 4: Stay informed about security standards

Quantum computing adoption will follow standards. Now, post-quantum cryptography (PQC) has become imperative. Effective PQC requires assigning an employee to monitor National Institute of Standards and Technology (NIST) updates as a strategic operational objective. Key objectives here would be to subscribe to NIST's post-quantum cryptography mailing list, schedule quarterly reviews with the business’s IT team or provider to consider the quantum progress and the relevant response, and include PQC updates in regular security meetings.

By implementing these actions today, organisations are strengthened to safeguard their future, while potentially gaining a competitive edge in security-focused markets.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

South African counter-drone system completes trials
Products & Solutions Perimeter Security, Alarms & Intruder Detection IoT & Automation
Pretoria-based military engineering company Centauri Technologies has announced that its TriAD counter-drone system successfully completed integrated, multi-layered C-UAS (counter-unmanned aerial system) capability trials in a vehicle-mounted configuration.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Managing access for devices, bots, and systems
Securex South Africa IoT & Automation
South African access control environments are becoming more complex. It is no longer only people who need identities; machines, IoT devices, service accounts, and even AI tools now require secure authentication.

Read more...
CAA-compliant ground drone outsourcing
Surveillance IoT & Automation
South African mines, estates, utility companies, independent power producers, ports, municipalities and others can now own and operate a CAA-compliant drone dock ground station in just six to eight weeks.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Top five AIoT trends in 2026
IoT & Automation AI & Data Analytics
As we enter 2026, the convergence of artificial intelligence (AI) and IoT infrastructure is reshaping industries, unlocking unprecedented opportunities to optimise operations, enhance security, and improve sustainability.

Read more...
From digital transformation to digital sovereignty
Security Services & Risk Management IoT & Automation
As cyberthreats grow, data regulations tighten, and AI becomes central to economic competitiveness, countries are recognising the need to control and protect their own digital assets.

Read more...
The IoT is a criminal’s worst nightmare
IoT & Automation
For South Africans who want to stay here and build a better country for our kids, grandkids, friends, and others, the Internet of Things gets us really excited because it enables ‘edge processing’.

Read more...
Banking’s AI reckoning
Financial (Industry) News & Events AI & Data Analytics
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Securing a South African healthcare network
Surveillance Healthcare (Industry) AI & Data Analytics
VIVOTEK partnered with local integrator Chase Networks and distributor Rectron to deliver a fully integrated security ecosystem, providing PathCare with a centralised view of all facilities, simplifying monitoring of sensitive laboratory areas, and ensuring SOP compliance.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.