I Prayed have prayed
Lord, we pray for those leading the way in the field of cybersecurity. Give them wisdom as they seek to protect us and our nation from increasingly complex and sophisticated attacks.
Reading Time: 3 minutes

As quantum computing becomes more available, hackers will be able to crack encryptions in seconds. How can we prepare for the future?

From VentureBeat. Hackers are waiting for the moment quantum computing breaks cryptography and enables the mass decryption of years of stolen information. In preparation, they are harvesting even more encrypted data than usual. Here is what businesses can do in response.

Post a prayer for your state!

 

Why are hackers harvesting encrypted data?

Most modern organizations encrypt multiple critical aspects of their operations. In fact, about eight in 10 businesses extensively or partially use enterprise-level encryption for databases, archives, internal networks and internet communications. After all, it is a cybersecurity best practice.

Alarmingly, cybersecurity experts are growing increasingly concerned that cybercriminals are stealing encrypted data and waiting for the right time to strike. …

The “harvest now, decrypt later” phenomenon in cyberattacks — where attackers steal encrypted information in the hopes they will eventually be able to decrypt it — is becoming common. As quantum computing technology develops, it will only grow more prevalent.

How ‘harvest now, decrypt later’ works

Quantum computers make the “harvest now, decrypt later” phenomenon possible. …

Whereas classical computers operate using binary digits — bits — that can either be a one or a zero, their quantum counterparts use quantum bits called qubits. Qubits can exist in two states simultaneously, thanks to superposition.

Since qubits may be a one and a zero, quantum computers’ processing speeds far outpace the competition. …

While a classical computer would take 300 trillion years or more to decrypt a 2,048-bit Rivest-Shamir-Adleman encryption, a quantum one could crack it in seconds, thanks to qubits. The catch is that this technology isn’t widely available — only places like research institutions and government labs can afford it.

That does not deter cybercriminals, as quantum computing technology could become accessible within a decade. In preparation, they use cyberattacks to steal encrypted data and plan to decrypt it later.

What types of data are hackers harvesting?

Hackers usually steal personally identifiable information like names, addresses, job titles and social security numbers because they enable identity theft. Account data — like company credit card numbers or bank account credentials — are also highly sought-after. …

What can enterprises do to protect themselves?

There are a few steps business leaders should take in preparation for quantum computing cracking cryptography.

1. Adopt post-quantum ciphers

The Cybersecurity and Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST) soon plan to release post-quantum cryptographic standards. The agencies are leveraging the latest techniques to make ciphers quantum computers cannot crack. …

2. Enhance breach detection

Indicators of compromise — signs that show a network or system intrusion occurred — can help security professionals react to data breaches swiftly, potentially making data useless to the attackers. …

3. Use a quantum-safe VPN

A quantum-safe virtual private network (VPN) protects data in transit, preventing exfiltration and eavesdropping. One expert claims consumers should expect them soon, stating they are in the testing phase as of 2024. …

4. Move sensitive data

Decision-makers should ask themselves whether the information bad actors steal will still be relevant when it is decrypted. They should also consider the worst-case scenario to understand the risk level. From there, they can decide whether or not to move sensitive data.

One option is to transfer the data to a heavily guarded or constantly monitored paper-based filing system, preventing cyberattacks entirely. The more feasible solution is to store it on a local network not connected to the public internet, segmenting it with security and authorization controls. …

How is this article stirring you to pray? Share your prayers and scriptures in the comments below.

(Excerpt from VetureBeat. Photo Credit: U.S. Air Force AFRL by Keith C Lewis)

Comments (3) Print

Comments

Leave A Reply

Your email address will not be published.

Gail
September 24, 2024

Amen to Sister Darlene’s prayer.

Darlene Estlow
September 24, 2024

Father, we can only look to you for the protection we need against this threat. Give those who are working to provide protection against this threat wisdom and discernment and knowledge. Reveal it to them supernaturally to foil the criminals. May we trust you and not fear, knowing you can do this.

9
ELIZABETH MINER
September 24, 2024

Lord Jesus, please guide us in how best to serve you and protect ourselves. Please make us aware of the path and purchases we are to make.

13

Partner with Us

Intercessors for America is the trusted resource for millions of people across the United States committed to praying for our nation. If you have benefited from IFA's resources and community, please consider joining us as a monthly support partner. As a 501(c)3 organization, it's through your support that all this possible.

Dave Kubal
IFA President
Become a Monthly Partner

Share

Click below to share this with others

Log in to Join the Conversation

Log in to your IFA account to start a discussion, comment, pray, and interact with our community.