Start implementing post-quantum cryptography, keep an eye on adversarial quantum programs and secure the quantum supply chain.