Prepare for Q-Day without breaking your budget

January 26, 2026

Quantum computers will crack today's encryption. Attackers are harvesting data now to decrypt later when quantum tech arrives.
(Credits: Gorodenkoff/Shutterstock)

Quantum computers will eventually crack the encryption protecting today’s internet traffic. You may have filed that under “future problem” and moved on to more pressing issues. That’s understandable, but the threat isn’t entirely future-tense.

Attackers are already harvesting encrypted data today, counting on quantum computers to crack it open later. This “harvest now, decrypt later” approach means your sensitive transmissions are potentially being captured and stored right now, waiting for the day when quantum machines can read them.

Most conversations about post-quantum cryptography (PQC) focus on stored data, and that matters, but your pipes matter too. Every VPN session and every API call to a cloud service is data in motion that could be intercepted and archived. If any of that traffic contains information that will still be sensitive in 2035, your exposure window is open right now.

This is a serious problem every IT pro needs to keep on their radar. That said, you don’t need to panic or throw money at it just yet. For the time being, you can prepare by understanding where your real exposure lies and making sure you’re not caught flat-footed when the transition accelerates.

Figuring out which transmitted data is actually at risk

Ask yourself whether the information crossing your network will still be sensitive when quantum computers can decrypt it. Authentication credentials, encryption keys, and business communications that would still cause damage if exposed a decade from now all deserve your attention first.

If you’re transmitting patient records, financial data subject to long retention requirements, or intellectual property with lasting competitive value, those transmission paths are where you should focus. Your VPN traffic is an obvious capture point, especially remote access connections carrying sensitive internal communications. API calls to cloud services are another concern, particularly if you’re transmitting customer data or proprietary business logic.

You probably don’t need to lose sleep over ephemeral session data, though. A session token that expires in 24 hours isn’t going to be valuable to an attacker when the time comes, for example. You’re not trying to protect everything equally. You’re trying to identify which transmission paths carry data with a long enough shelf life to justify concern.

Prioritizing systems for Q-Day readiness

Once you’ve identified which data flows matter most, you can start figuring out which systems to tackle first according to your risk appetite. If you’re in healthcare, financial services, or legal, you have less flexibility here because compliance frameworks often govern data retention for decades. Check what your regulators are saying about PQC now so you can build their timelines into your planning.

Think about whether your internal transmission paths and customer-facing ones need different treatment. Systems handling employee credentials and internal business communications might be lower priority than systems transmitting customer financial data or protected health information. Ask yourself where the greatest harm would occur if an attacker could read a decade’s worth of captured traffic.

Your vendors’ timelines will ultimately shape yours, too. According to the Spiceworks 2026 State of IT Report, 88% of IT decision-makers are open to switching vendors, which means contract renewals are a natural moment to ask pointed questions. Does this vendor have a PQC roadmap? When do they expect to support quantum-resistant encryption? If they can’t give you a coherent answer, that’s useful information to have.

If you sign a three-year deal and discover halfway through that your vendor has no PQC plans, you’re stuck waiting for that contract to expire or paying to exit early. Neither option is pleasant. On the flip side, asking now will give you some valuable advance intel on what to expect so you can make an informed decision.

Why 2026 is still early for hands-on PQC migration

If you’re trying to figure out how soon you need to address the migration piece, the UK National Cyber Security Centre has published PQC migration guidanceOpens a new window that gives you breathing room. Their timeline runs through 2035, with discovery and planning in the earlier years and hands-on migration work coming later. You have some runway to be strategic about this.

Right now, your most valuable moves are fairly straightforward. Take 30 minutes to check your cloud provider’s security documentation for post-quantum mentions. Look for terms like “PQC,” “quantum-resistant,” or “post-quantum” in their security whitepapers, compliance pages, or roadmap announcements. If you find nothing, that tells you something, too. While you’re at it, start building a mental map of which transmission paths carry your most sensitive long-lived data.

If you’re running a one-person shop or a small team with a hundred other priorities, this is one item on your awareness list rather than something that demands immediate action. Your goal is to make sure you’re not accidentally making things worse by locking yourself into long vendor contracts without asking about PQC or assuming someone else has this covered when nobody actually does.

Meanwhile, between 2026 and 2028, you can get more concrete about discovery and migration planning. By then, more vendors will have published roadmaps, more tools will be validated, and more guidance will be available. If you rush into migrations now, you’ll pay an unnecessary premium in troubleshooting time for tools and processes that aren’t fully mature yet. Hands-on migration work, specialized consultants, dedicated PQC products, and significant capital investment can all wait until 2029 or later for most companies.

Preparing for the PQC transition without rushing it

Getting ready for the PQC era doesn’t require heroic technical efforts or budget-busting security projects. It requires a clear understanding of where your transmitted data is genuinely at risk and which systems to prioritize when the time comes. For once, awareness is enough—and that’s a lighter lift than most of what lands on your desk.

Rose de Fremery
Rose de Fremery

Writer, lowercase d

Former IT Director turned tech writer, Rose de Fremery built an IT department from scratch; she led it through years of head-spinning digital transformation at an international human rights organization. Rose creates content for major tech brands and is delighted to return to the Spiceworks community that once supported her own IT career.
Take me to Community
Do you still have questions? Head over to the Spiceworks Community to find answers.