Preparing for the Quantum Revolution: Understanding the NCSC's New PQC Roadmap

fahd.zafar • April 29, 2025

The UK's National Cyber Security Centre (NCSC) has recently unveiled a critical new roadmap for organisations to prepare for the quantum computing era. As your trusted technology partner, Altiatech is committed to helping you understand these developments and their implications for your security strategy.

The Quantum Threat to Current Encryption

Quantum computing represents one of the most significant technological leaps of our generation. While these advanced systems promise revolutionary benefits across industries, they also pose a substantial risk to our current security infrastructure.

Today's encryption methods rely on mathematical problems that conventional computers find extremely difficult to solve. However, quantum computers have the theoretical capability to solve these same problems exponentially faster, potentially rendering current encryption methods obsolete.

This means sensitive data that is secure today could become vulnerable in the quantum future—including banking transactions, confidential communications, intellectual property, and personal identifiable information.


The NCSC's Three-Phase Migration Plan

To address this looming challenge, the NCSC has outlined a structured timeline for organisations to transition to post-quantum cryptography (PQC)—encryption methods designed to withstand quantum computing attacks. The roadmap consists of three key phases:

Phase 1: Planning and Assessment (Now to 2028)

  • Identify cryptographic services and systems requiring upgrades
  • Build a comprehensive migration plan
  • Begin educating teams on PQC requirements
  • Monitor developments in PQC standards

Phase 2: Priority Implementation (2028-2031)

  • Execute high-priority upgrades for the most sensitive systems
  • Refine migration plans as PQC standards mature
  • Implement dual-mode cryptography where appropriate
  • Begin testing PQC solutions in production environments

Phase 3: Complete Migration (2031-2035)

  • Finalise migration to PQC across all systems, services, and products
  • Phase out legacy cryptographic methods
  • Ensure supply chain partners have also completed their PQC migration
  • Validate security posture in the post-quantum environment


What This Means for Your Organisation

The good news is that for many small and medium-sized businesses, this transition will likely be relatively seamless. Much of the heavy lifting will be handled by service providers and technology vendors through routine updates and upgrades.

However, larger organisations and those in regulated industries or handling particularly sensitive data should begin preparing now. This proactive approach ensures a controlled, methodical migration rather than a rushed implementation when quantum computers eventually become a practical threat.

As Ollie Whitehouse, NCSC Chief Technical Officer, states: "As quantum technology advances, upgrading our collective security is not just important—it's essential."

How Altiatech Can Help

At Altiatech, we're committed to helping our clients navigate technological transitions securely and efficiently. As this post-quantum journey unfolds, we'll be:

  • Staying abreast of evolving PQC standards and best practices
  • Providing guidance on assessing your cryptographic inventory
  • Offering expertise in implementing quantum-resistant solutions
  • Ensuring your systems and data remain protected through the transition

The quantum revolution brings both exciting opportunities and security challenges. By starting preparations now, organisations can ensure they remain secure in the quantum future while leveraging the benefits these powerful new computing paradigms will offer.

For more information on how your organisation can prepare for the post-quantum era, contact our team today at innovate@altiatech.com or call us at +44 (0)330 332 5482.

December 15, 2025
Traditional security models assumed everything inside the corporate network was trustworthy, focusing defensive efforts on the perimeter. This approach fails catastrophically in today's hybrid work environment where employees access resources from homes, coffee shops, and co-working spaces whilst applications reside across multiple clouds.
Microsoft logo on a wood-paneled wall, with colorful squares and company name.
December 10, 2025
Microsoft is introducing major Microsoft 365 licensing changes in 2026. Learn what’s changing, who is affected and how businesses should prepare.
December 8, 2025
Cloud computing promised cost savings through pay-per-use models and elastic scaling. Yet many UK organisations discover their cloud bills steadily increasing without corresponding business growth. The culprit? Cloud waste - unnecessary spending on unused or inefficiently configured resources.
November 28, 2025
A threat group known as Scattered Lapsus$ Hunters is targeting Zendesk users through a sophisticated campaign involving fake support sites and weaponised helpdesk tickets, according to security researchers at ReliaQuest. The operation represents an evolution in how cybercriminals exploit trust in enterprise SaaS platforms.
November 28, 2025
Amazon Web Services has launched a new feature allowing customers to make DNS changes within 60 minutes during service disruptions in its US East (N. Virginia) region. The announcement tacitly acknowledges what many have long observed: AWS's largest and most critical region has a reliability problem.
November 28, 2025
A Scottish council remains unable to fully restore critical systems two years after a devastating ransomware attack, highlighting the long-term consequences of inadequate cybersecurity preparation and the challenges facing resource-constrained local authorities.  Comhairle nan Eilean Siar, serving Scotland's Western Isles, suffered a ransomware attack in November 2023 that required extensive system reconstruction. According to a report published by Scotland's Accounts Commission, several systems remain unrestored even now, with large data volumes slowing the digital recovery process.
November 26, 2025
Ready to migrate from Windows 10? Contact Altiatech for a comprehensive migration assessment and strategy tailored to your organisation's needs.
November 25, 2025
The Cybersecurity and Infrastructure Security Agency has issued an alert warning that multiple cyber threat actors are actively leveraging commercial spyware to target users of mobile messaging applications including Signal and WhatsApp. The sophisticated campaigns use advanced social engineering and exploit techniques to compromise victims' devices and gain unauthorized access to their communications.
By fahd.zafar November 24, 2025
Microsoft has introduced experimental AI agent capabilities into Windows through Copilot Actions and agent workspaces, features designed to automate everyday tasks like organising files, scheduling meetings, and sending emails. However, the announcement comes with significant security warnings that business leaders and IT administrators must understand before enabling these capabilities.
November 17, 2025
Anthropic has disclosed the first documented case of a large-scale cyberattack executed with minimal human intervention, marking a significant escalation in AI-enabled cyber threats. The campaign, attributed with high confidence to a Chinese state-sponsored group, demonstrates how rapidly AI capabilities are being weaponised for espionage operations.