blue cybersecurity lock…To determine where post-quantum cryptography (PQC) and conventional cryptography will need to be implemented, businesses will need to understand what of their data needs protecting and what will be worthless to cybercriminals…

…Over time, some data will become obsolete and worthless to hackers, but some data will need to be protected indefinitely…

…Before an initial plan is put into place, a proof-of-concept that uses PQC or hybrid methods to protect data can be created to roll it out across a company’s digital assets…

…Fully rolling out quantum security over an organisation could take years to complete in some cases…

Editor’s Note: Italicized statements are directly quoted from the source. Content may have been edited for style and clarity. Read the full article at the source by clicking on the text or image.