Hackers are waiting for the moment quantum computing breaks cryptography and enables the mass decryption of years of stolen information. In preparation, they are harvesting even more encrypted data than usual. This phenomenon, known as “harvest now, decrypt later,” is becoming increasingly common as quantum computing technology develops.
Most modern organizations encrypt multiple critical aspects of their operations, including databases, archives, internal networks, and internet communications. However, hackers are stealing encrypted data and waiting for the right time to strike. This is possible due to the development of quantum computers, which can process information much faster than classical computers.
If hackers can crack encryption using quantum computers, the consequences for businesses could be devastating. Companies may not even realize they have been affected by a data breach until the attackers use the stolen information. This could lead to account takeovers, identity theft, cyberattacks, and phishing attempts.
There are several steps businesses can take to protect themselves from the threat of quantum computing:
The Cybersecurity and Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST) plan to release post-quantum cryptographic standards. Businesses should adopt these standards as soon as they are available.
Indicators of compromise can help security professionals react to data breaches swiftly. Businesses should implement systems to detect and respond to breaches quickly.
A quantum-safe virtual private network (VPN) can protect data in transit and prevent exfiltration and eavesdropping. Businesses should consider adopting quantum-safe VPN solutions.
Businesses should consider moving sensitive data to a secure location, such as a local network not connected to the public internet. This can help prevent cyberattacks and protect sensitive information.