This is A MoFo Privacy Minute, where we answer the questions our clients are asking us in sixty seconds or less.
Question: I’ve read about “Steal Now, Decrypt Later” attacks. What should we be doing now to respond when “secure data” is compromised?
Answer: Traditional encryption methods have long functioned as a key protective data security measure, making data seemingly indecipherable. Because of this, incidents involving encrypted personal data generally do not trigger breach notification requirements under U.S. and global privacy frameworks unless the encryption key has also been compromised. This is, in part, because existing technology has not been readily able to crack robust encryption algorithms. However, advances in quantum computing are expected to make current encryption methods easily crackable in the near future. Threat actors are aware of this and are now investing in attacks aimed at stealing encrypted data because they know that decrypting that data will likely become fairly easy in the near term. Organizations can start preparing now by incorporating smart governance and incident response strategies into their current playbooks.
An incident involving encrypted data today could become a notifiable event in the not-too-distant future. In addition, organizations are required to maintain reasonable security measures and often rely on encryption as a key control. Moving away from encryption is not a “flip the switch” exercise. Organizations should start thinking now about how they will address a future where encryption is not sufficient and where threat actors make good on their promise to “steal now, decrypt later” and begin to extort companies based on now-decrypted data stolen years earlier.
There are concrete steps organizations can take now to plan for what is coming:
As quantum computing advances, organizations may soon find themselves thinking through current security controls as well as past incidents and their prior decisions. Transparency, foresight, and proactive risk management are increasingly critical to maintaining trust and can help organizations prepare for a quantum-computing future that is just around the corner.