<img alt="" src="https://www.instinct365intelligent.com/810470.png" style="display:none;">
Celerity Logo
Solutions & Services
  • Data Resilience
    Data Resilience

    Secure data optimisation & proactive backup

  • Software
    Software

    Proactive Licensing, Compliance & Asset Management

  • Cyber Security
    Cyber Security

    Agile, Modular, & Secure Cyber Security & Managed Siem

  • Infrastructure
    Infrastructure

    Manage & Transform Multi-Cloud, Hybrid & On-Premise

Managed Backup Disaster and Cyber Recovery Copy Assure
Software Licensing Management Managed Licence Compliance Software Asset Management Managed AI
Managed Siem MDR & MXDR Exposure Management Incident Response & Consultancy
Infrastructure Advisory Infrastructure Transformation Managed Services FinOps as a Service Software Resell Hardware Resell
Success Stories Partners
Industries
Healthcare
Local Government
Financial Services
Retail
Manufacturing
Resources
All Resources
Technology Topics & Trends
About
Our Story
Our People
Accreditations
Corporate Social Responsibility
Careers
Contact
  • Contact
  • Sign In
×
  • Solutions & Services
  • Success Stories
  • Partners
  • Industries
  • Resources
  • About
Solutions & Services
  • Data Resilience

    • Managed Backup
    • Disaster and Cyber Recovery
    • Copy Assure
  • Software

    • Software Licensing Management
    • Managed Licence Compliance
    • Software Asset Management
    • Managed AI
  • Cyber Security

    • Managed Siem
    • MDR & MXDR
    • Exposure Management
    • Incident Response & Consultancy
  • Infrastructure

    • Infrastructure Advisory
    • Infrastructure Transformation
    • Managed Services
    • FinOps as a Service
    • Software Resell
    • Hardware Resell
Industries
  • Healthcare
  • Local Government
  • Financial Services
  • Retail
  • Manufacturing
Resources
  • All Resources
  • Technology Topics & Trends
About
  • Our Story
  • Our People
  • Accreditations
  • Corporate Social Responsibility
  • Careers
  • Contact

Harvest Now, Decrypt Later: What Public Sector Organisations Need to Do Next

Abikaye

09 March 2026

Time to read

Loading read time...

Share this post

Table of contents

  • Why this isn't a future problem
  • What ‘harvest now, decrypt later’ means for your organisation
  • Where most public sector organisations currently stand
  • Five steps to start building quantum readiness now
  • The 2030 target is achievable... but not if you wait
  • How Celerity can help

 

There’s a cyber threat already active against public sector organisations that most security leaders haven’t fully accounted for yet. It doesn’t look like a breach. It won’t trigger your SIEM. And you won’t know it’s happened until it’s too late to do anything about it.

Bad actors are harvesting encrypted data right now, government records, citizen data, sensitive communications, clinical information, banking on the fact that quantum computers will be able to decrypt it within the next decade. By the time Q-Day arrives, the data is already gone. The window to protect it is now.

Why this isn't a future problem

The assumption that quantum is a tomorrow concern is the most dangerous position a public sector organisation can take. The encryption protecting your data today was designed for a world where classical computers would take millions of years to break it. Quantum computers will do it in minutes.

The NCSC has been unambiguous: high-risk systems should migrate to post-quantum cryptography by 2030, with complete migration across all systems by 2035. That sounds like runway. It isn’t… not when you factor in the complexity of government and public sector infrastructure, the prevalence of legacy systems, and the time it takes to map cryptographic dependencies before you can even start migrating them.

The organisations that treat 2030 as their start date will miss it. The ones that start now have a realistic chance of hitting it.

What ‘harvest now, decrypt later’ means for your organisation

This isn’t a theoretical attack vector. It’s already happening. State-sponsored actors and sophisticated criminal groups are systematically collecting encrypted data from high-value targets like government agencies, healthcare organisations, defence supply chains and research institutions with the explicit intention of decrypting it once quantum capability reaches the required threshold.

What makes public sector data particularly attractive is its longevity. A citizen’s record, a classified communication, genomic data, long-term research, this information retains its value for decades. The attacker doesn’t need to be able to read it today. They just need to have it.

By the time Q-Day arrives, any data that hasn’t been protected with quantum-safe encryption is already compromised in all but name.

Where most public sector organisations currently stand

In our experience working with public sector organisations on data security, the picture is consistent. Awareness of the quantum threat has increased significantly, particularly following the NCSC guidance and the UK government’s investment in quantum computing. But awareness hasn’t translated into readiness.

The three gaps that come up most often are:

No named owner at a senior level

Quantum readiness falls between IT security, infrastructure, and procurement — and ends up owned by none of them. Without a named individual responsible for driving the programme, and the seniority to get decisions made, it stalls.

Limited visibility of cryptographic exposure

Most organisations don’t have a clear map of where encryption is used across their systems, which algorithms are protecting which data, or which third-party tools and supply chain dependencies introduce cryptographic risk. You can’t migrate to quantum-safe encryption without this picture. Building it takes longer than organisations expect, particularly in complex or legacy-heavy environments.

No engagement with technology suppliers

The majority of public sector organisations rely heavily on third-party technology. If your suppliers haven’t started their quantum-safe roadmap, your migration timeline is constrained by theirs. Most organisations haven’t had this conversation yet.

 

Five steps to start building quantum readiness now

1. Establish ownership. Identify a senior leader to champion quantum readiness and give them a small dedicated team. This is a strategic risk programme, not an IT ticket.

2. Map your cryptographic landscape. Understand where encryption is used, what algorithms are in play, and which systems handle your most sensitive and longest-lived data. This is your baseline.

3. Prioritise by risk and data longevity. Focus first on the systems where a future breach would have the greatest impact. Records that will remain sensitive for decades, systems handling citizen or patient data, and critical operational infrastructure.

4. Engage your technology suppliers. Ask them directly: what is your post-quantum cryptography roadmap, and what timeline are you working to? Their answer will shape yours.

5. Plan for crypto-agility. The post-quantum cryptography standards are still evolving. Build the flexibility to adapt your security posture as the landscape changes, rather than locking into a single approach.

The 2030 target is achievable... but not if you wait

Research from IBM suggests most organisations anticipate needing around 12 years to become fully quantum-safe. The NCSC’s 2035 deadline for complete migration reflects that reality. But the 2030 target for high-risk systems is only four years away and the planning, assessment and supplier engagement work needs to start well before the migration itself.

The good news is that starting now doesn’t require a massive upfront investment. It requires clarity on ownership, a realistic assessment of where you are, and a plan that builds momentum over time. The organisations that will struggle are the ones that keep treating it as a future problem.

How Celerity can help

We work with public sector organisations on the data security and resilience programmes that quantum readiness sits within, helping organisations understand their current exposure, map their cryptographic dependencies, and build a practical path to quantum-safe security. 

Speak to a member of our team today. 

Latest News

All Resources
Zero Trust - Celerity Limited
Zero Trust - Celerity Limited
Cyber Security

Zero Trust - Celerity Limited

Secure your data, eliminate risk and harness the power of Zero Trust.

Read topic
Ransomware - Celerity Limited
Ransomware - Celerity Limited
Cyber Security

Ransomware - Celerity Limited

Protecting your business from threats and data loss.

Read topic
Software Licence Compliance
Software Licence Compliance
Software

Software Licence Compliance

Identifying unlicensed software, monitoring license usage, and ensuring that your organisation abides by its license agreements.

Read topic
Logo WHITE-cropped
phone 0845 565 2097
email info@celerity-uk.com
Vector
9001_Certification Badges_RGB_(0421)_4 14001 Certification Badges_RGB_(0421)_4 27001 Certification Badges_RGB_(0421)_4 cyberessentials_certification mark plus_colour

Transforming Technology. Empowering People.

QUICK LINKS
  • Technology Topics & Trends
  • Clients
  • Partners
  • Policies
LATEST BLOGS
  • Harvest Now, Decrypt Later: What Public Sector Organisations Need to Do Next
  • RAM Prices Are Spiking And Your Next Infrastructure Quote Might Look Very Different
  • Data Security Maturity in Public Sector: The Foundation AI and Quantum Require

Ⓒ Celerity 2026 All Rights Reserved

Privacy

Terms

 

  • There are no suggestions because the search field is empty.