- Quantum computers will soon be able to break modern encryption
- When this happens, nation states can abuse technology to steal sensitive files
- Organizations must prepare today, says Capgemini
Sooner or later, quantum computers will be able to unravel today’s encryption, and when this occurs, critical industries such as defense, critical infrastructure, telecommunications and others will be at risk of nation-state attackers with enough resources to use advanced technology for harmful purposes such as spying or data, research has been prevented.
In fact, many nation states probably already harvest encrypted data, in preparation for this moment “Q-Day”-an attack baptized “Harvest Now, Decrypt later”.
A new report from the Capgemini Research Institute interviewed 1,000 organizations with an annual turnover of at least $ 1 billion in 13 sectors and 13 countries in Asia – Pacific, Europe and North America, finding the majority of respondents (around 70%) are called “early adopters” – which means they work, or plan to work on quantum solutions.
Harvest now, decrypt later
Capgemini researchers have found that two thirds (65%) of respondents are already concerned about the rise in attacks “harvest-night-décrypt-later”, with a first adopt in six thinking that “Q-Day” will occur over the next five years.
Even more, around 60%believe that Q-Day will perform in a decade in a decade.
To mitigate the risk, companies in the vital industries should go to post-quantum protections as soon as possible.
“Early transition ensures the continuity of activities, regulatory alignment and long -term confidence,” said Marco Pereira, a global cybersecurity manager, Cloud Infrastructure Services at Capgemini.
“Quantum security is not a discretionary expenditure, but a strategic investment, which can transform an imminent risk into a competitive advantage. Organizations that recognize this early fact will best ensure against future cyber attacks. ”
The report also indicates that most organizations interviewed (70%) already protect their systems against emerging quantum threats thanks to a mixture of post-quantum cryptographic algorithms.




