harvest-now-decrypt-later attacks aren't much of a concern for modern symmetric cryptography. heck, even known-broken ciphers like rc4 aren't easy to break in a non-interactive setting with modest ciphertext sizes and no key reuse.
It all depends on who the message needs to be secure from, and for how long.
It all depends on who the message needs to be secure from, and for how long.