IT in Manufacturing


Quantum leap or quantum risk? Balancing innovation and security

February 2025 IT in Manufacturing

The emergence of quantum computing represents a transformative shift in technology, promising unparalleled computational power while posing significant risks, particularly cybersecurity. For South African businesses, navigating this duality, where quantum computing can be both a friend and a foe, requires a strategic approach that leverages expert third-party IT companies to mitigate risks while harnessing potential benefits.

Quantum computing operates on the principle of quantum mechanics, utilising quantum bits (qubits) that can exist in multiple states simultaneously, unlike classical bits that are limited to binary values. This capability allows quantum computers to solve complex problems at speeds unattainable by traditional computers. Industries such as pharmaceuticals, finance and automotive are already exploring applications of this technology, from drug discovery to optimising supply chains. However, the rapid advancement of quantum computing also brings forth a critical concern: the security of data encrypted using current methods.


Amritesh Anand, vice president and MD, In2IT Technologies.

The threat to data security

The World Economic Forum has highlighted that advancements in quantum computing could soon enable these machines to break widely used encryption algorithms like Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC). This capability threatens the integrity of sensitive data across many sectors, including healthcare and finance. As quantum computers become more powerful, they could render existing encryption methods obsolete, allowing cybercriminals to access private information with unprecedented ease. The concept of ‘capture now, crack later’ becomes particularly alarming; adversaries could store encrypted data today and decrypt it in the future when quantum capabilities are fully realised.

In South Africa, where digital transformation is accelerating across industries, the implications of quantum computing are profound. Businesses must recognise that while quantum computing offers opportunities for innovation and efficiency, it also necessitates a re-evaluation of cybersecurity strategies. The potential for increased data breaches and compromised digital communications underscores the urgency for organisations to adopt robust security measures.

Navigating the quantum landscape with expert guidance

Expert third-party IT companies can be pivotal to address these challenges as these organisations specialise in developing and implementing post-quantum cryptography solutions able to withstand quantum attacks. By collaborating with such firms, South African businesses can transition to encryption methods that are resistant to the capabilities of quantum computers. This proactive approach not only safeguards sensitive information but also instils confidence among clients and stakeholders regarding data security.

As businesses begin to explore the advantages of quantum computing for operational efficiency, they must also consider how these technologies can be integrated into their cybersecurity frameworks. Quantum key distribution (QKD) is one such advancement that utilises the principles of quantum mechanics to create secure communication channels. In QKD, any attempt at eavesdropping disrupts the transmission, alerting the parties involved to potential threats. This innovative method represents a significant leap forward in securing digital communications against current and future cyber threats.

The dual nature of quantum computing in its ability to both enhance and undermine security calls for a balanced perspective among business leaders. While investing in advanced technologies that can drive growth and efficiency is essential, equal emphasis must be placed on understanding and managing the associated risks. This is where expert IT firms come into play as they provide not only technical solutions but also strategic guidance on navigating the complexities of this evolving landscape.

Preparing for a quantum-driven future

As South African businesses prepare for a future increasingly influenced by quantum computing, they should prioritise building partnerships with reputable IT service providers adept at integrating cutting-edge security measures into their operations. These partnerships can facilitate knowledge transfer and ensure that organisations remain agile in adapting to new threats as they arise.

The rise of quantum computing presents significant opportunities and formidable challenges for South African businesses. By recognising the potential risks associated with this technology, particularly around cybersecurity, companies can take proactive steps to safeguard their operations. Engaging with expert third-party IT firms will be crucial in developing robust security frameworks, capable of withstanding the impending quantum threat while simultaneously leveraging its advantages for innovation and growth. As we stand on the brink of this technological revolution, it is imperative for businesses to embrace a forward-thinking approach that balances ambition with caution in navigating the complexities of quantum computing.

For more information contact Amritesh Anand, In2IT Technologies, [email protected], www.in2ittech.com




Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

South Africa’s AI revolution is here – but are we secure?
IT in Manufacturing
South African businesses are sprinting to embrace generative AI, lured by its potential to drive efficiency, productivity and innovation. But here’s the stark reality: without a rock-solid cybersecurity foundation, AI will become a Trojan horse, opening the floodgates to sophisticated cyber threats.

Read more...
Black Rock Mining centralises mining operations with AVEVA
IT in Manufacturing
Black Rock Mine Operations replaced and upgraded its existing infrastructure, and installed additional capacity to expand production from 3 to 4,6 million tons in three years. The new system is powered by a suite of AVEVA solutions.

Read more...
Shaping data resilience strategies with AI and hybrid cloud solutions
IT in Manufacturing
In today’s rapidly evolving digital landscape, organisations are under growing pressure to secure their operations against increasingly sophisticated cyberthreats, including those that leverage AI to enhance the success rate of attacks. In this landscape, it has become essential to ‘fight fire with fire’ – harnessing AI as a means to counter these threats.

Read more...
Cloud or on-prem? Decoding the choices for South African enterprises
IT in Manufacturing
The debate between on-premise and cloud computing architectures remains a prominent topic among businesses, particularly in South Africa.

Read more...
Advancements in wire rope testing
IT in Manufacturing
Being able to get instant, real-time and portable detection of wire rope flaws can make a significant difference for operational teams. There have been a number of significant technological advancements and tools entering the market that help wire rope operators detect and resolve problems faster.

Read more...
Quantum computing power: four steps to protecting your business
IT in Manufacturing
Are you ready for Q-day? Post-quantum cryptography isn’t just an IT issue, it’s a business continuity concern. Quantum computing is fast becoming a reality.

Read more...
Schneider Electric relaunches legacy access control systems
Schneider Electric South Africa IT in Manufacturing
Schneider Electric South Africa has relaunched its comprehensive access control platform to help customers upgrade from ageing and obsolete systems.

Read more...
Digitalisation in mining - the advantage you need now
Schneider Electric South Africa IT in Manufacturing
Digitalisation offers immense and proven benefits such as streamlining operations, reducing error and accelerating workflows. Mining operators today leverage digital technologies to improve efficiency, sustainability and very importantly, safety.

Read more...
The shape of water – automating hydropower operations
Schneider Electric South Africa IT in Manufacturing
Hydropower is undoubtedly one of the building blocks of today’s renewable energy industry and its operations need to be efficient, reliable and sustainable. Automation must therefore form part of today’s modern hydropower operations to improve resource management and enhance reliability.

Read more...
What lies beneath – the hidden cost of AI
Schneider Electric South Africa IT in Manufacturing
The world is quickly realising that with the rapid advancement in AI there are also caveats. In short, apart from environmental implications, it also has major significant financial ramifications.

Read more...