65% of Firms Fear Quantum Driven Data Breaches

A new report by the Capgemini Research Institute warns that Q-computing is rapidly emerging as one of the most urgent cybersecurity challenges facing global enterprises. The study found that 65% of organisations are concerned about ‘harvest-now, decrypt-later’ attacks—where encrypted data is stolen today with the intent of decryption once quantum capabilities mature.

Titled Future Encrypted: Why Post-Quantum Cryptography Tops the New Cybersecurity Agenda, the report surveyed 1,000 firms across 13 countries. Nearly one in six early adopters believe a quantum decryption event—referred to as ‘Q-day’—could occur within the next five years, with six in ten expecting it within a decade.

Post-quantum cryptography adoption gains traction

To counter the risk, 70% of companies are already exploring or adopting post-quantum cryptography (PQC)—viewed as the most comprehensive mitigation strategy. These algorithms are designed to withstand the computing power of future machines, and are being prioritized especially in defense, banking, and critical infrastructure sectors.

Regulatory drivers are also influencing the shift. For most enterprises surveyed, compliance mandates were a key factor in the decision to begin cryptographic transition. While early adopters are actively piloting PQC solutions, 30% of organisations remain unprepared—often due to lack of budget or expertise.

Also read: Amaravati to Launch Quantum Centre by Jan 2026

Q-readiness seen as competitive advantage

Capgemini’s global cybersecurity head Marco Pereira said organisations must not treat quantum security as just another tech upgrade. “Every encrypted asset today could become tomorrow’s breach,” he noted, adding that early action could offer long-term trust and regulatory alignment.

The report calls for enterprise-wide risk mapping, inventory of cryptographic assets, and close collaboration with quantum-safe vendors. As the hardware advances, businesses that delay transition risk falling behind—not just in security, but in digital trust and business continuity.

Latest articles

Related articles