Four Steps to protecting your business from the quantum threat

Issue 1 2025 IoT & Automation, AI & Data Analytics

Are you ready for Q-day? Post-quantum cryptography is not just an IT issue, it is a business continuity concern. Quantum computing is fast becoming a reality. The United Nations has declared 2025 as the International Year of Quantum Science and Technology. While this evolution of computing keeps the world at the forefront of innovation, businesses across the globe are being warned to bolster protection protocols to avoid losses through decryption.

According to Forbes magazine, “2025 could mark the arrival of ‘Q-Day’. This is a theoretical point in time when quantum computers become powerful enough to render many methods of encryption redundant – with severe consequences for privacy and security.”

As this sector transforms, there are four essential steps to protecting businesses now, and well into the future.


Carrie Peter.

Step 1: Create an encryption inventory

Think of this as a digital safety audit. As part of the audit, the IT team or provider creates and supplies a comprehensive list of all the places where the business uses encryption. Here, it is essential that organisations review and revise how they store their customer data, their email systems, how financial transactions are processed, the management of cloud services, access to remote work tools, and website security certificates.

Step 2: Secure unencrypted data

For smaller businesses that do not encrypt their data, the duty of protection remains their responsibility. Here organisations can take cost-effective, yet highly practical and impactful steps to securing their datasets.

To protect customer data stored on computers, free tools like VeraCrypt empower users to create encrypted containers for sensitive files, saving them in a digital safe. To secure email communication, services like ProtonMail offer free encrypted email accounts. For password management, tools like Bitwarden (free tier available) store passwords in an encrypted vault and can generate strong, unique passwords. Lastly, to assist in encrypting mobile devices, businesses must use the built-in encryption freely available on Android and iPhone devices - just turn it on in settings.

These are just some examples of how small enterprises can protect their data without a large capital outlay.

Step 3: Identify the business’s crown jewels

Focus on what needs protection in the medium to long term. Pay close attention to customer data that must be protected for years, trade secrets and intellectual property, financial records that need long-term storage, legal documents and contracts, healthcare records, and research and development information.

Which data would harm our business if exposed in five to 10 years? What information are we legally required to protect? Which systems contain our most sensitive customer data? These are key questions to ask.

Step 4: Stay informed about security standards

Quantum computing adoption will follow standards. Now, post-quantum cryptography (PQC) has become imperative. Effective PQC requires assigning an employee to monitor National Institute of Standards and Technology (NIST) updates as a strategic operational objective. Key objectives here would be to subscribe to NIST's post-quantum cryptography mailing list, schedule quarterly reviews with the business’s IT team or provider to consider the quantum progress and the relevant response, and include PQC updates in regular security meetings.

By implementing these actions today, organisations are strengthened to safeguard their future, while potentially gaining a competitive edge in security-focused markets.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The impact of AI on security
Technews Publishing Information Security AI & Data Analytics
Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect, to ‘living-off-the-land’ using legitimate system tools to move laterally through networks. This is where AI has a critical role to play.

Read more...
Who has access to your face?
Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts,

Read more...
Adding AI analytics to security monitoring
SEON South Africa News & Events Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) AI & Data Analytics
SEON has announced its latest integration with Refraime, an AI-powered video analytics platform designed to elevate CCTV surveillance through real-time object detection and intelligent alerting.

Read more...
Making drone security more accessible
Editor's Choice Integrated Solutions Residential Estate (Industry) AI & Data Analytics IoT & Automation
Michael Lever discusses advances in drone technology, focusing on cost reductions and the implementation of automated services, including beyond line of sight capabilities, for residential estates with SMART Security Solutions.

Read more...
Securing your estate beyond the gate
ATG Digital Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
Protecting gated communities and lifestyle estates requires a modern, intelligent approach. A truly intelligent system protects both physical and digital perimeters, it must be a fully integrated ecosystem.

Read more...
Know where your asset is - not was
IoT & Automation Asset Management
To properly prevent loss of movable assets, companies need an early warning system, traceability throughout the chain of custody, and intelligence on parameters such as temperature, humidity, and impact.

Read more...
Get the AI fundamentals right
Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
Why DIY IoT does not scale
IoT & Automation Transport (Industry) Logistics (Industry)
From fleet management to inventory management, and security monitoring to equipment maintenance, the Internet of Things (IoT) has become an integral part of business operations in almost every sector today.

Read more...
Combining TETRA or DMR with 5G broadband
Infrastructure IoT & Automation
As enterprises face rising complexity and connectivity demands, hybrid networks offer a transformative path, combining the proven reliability of TETRA or DMR with the innovation and coverage of 5G broadband.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.