facebook linkedin twitter

Email Malware is the New Schrӧdinger’s Cat

Email Malware is the New Schrӧdinger’s Cat

There is a famous thought experiment devised by physicist Erwin Schrӧdinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrӧdinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security.

Schrӧdinger devised the thought experiment to combat the Copenhagen interpretation of quantum mechanics, which posited that, when unobserved, an object can exist in all states, and reverts to one if observed. In Schrӧdinger’s thought experiment, a cat was hypothetically shut in a box with a small enough amount of radioactive material to only have a 50/50 chance of being detected by a Geiger counter. If it was, a hammer would break open a container of poison, killing the cat. The premise was that, if the Copenhagen interpretation was correct, the cat could be assumed to be both alive and dead simultaneously until it was observed to be one or the other.

While Schrӧdinger’s cat was meant to discredit the Copenhagen interpretation, there is a modern version of this thought experiment that businesses should be concerned about. This version focuses on email, and the attachments that often come with it.

It is no secret that email is a very popular way for cybercriminals and other online mischief-makers to deliver their tools. If we treat emails the way that Schrodinger’s cat was approached, any email could feasibly contain a malicious threat, as well as no threats at all. The thing is, while determining if Schrӧdinger’s cat was alive or dead would be a relatively harmless activity (except potentially for the cat), finding out whether or not an email attachment is infected could cause quite a bit of damage to your system.

Fortunately, there are ways to protect yourself and your system against threats like email malware and phishing attempts. Antivirus and anti-malware scanners can catch many threats on their way in, and a spam blocker can help keep out many more.

If you’d rather know for sure that your inbox doesn’t contain any threats (or dead cats), let Computerware suggest a few solutions. Give us a call at (703) 821-8200.

Backup and Recovery is Essential for Today's Busin...
Your Guide to Tightening Up Network Security


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, December 16, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Software Business Computing Business Management Hackers Microsoft Workplace Tips Backup Managed Service Provider Data Productivity Hardware Business Saving Money Email Malware IT Services Network Security Efficiency IT Support Hosted Solutions Google Small Business Computer Quick Tips Smartphones User Tips Mobile Devices Gadgets Business Continuity Disaster Recovery Innovation Microsoft Office Mobile Office Virtualization Network Android Social Media VoIP Mobile Device Management Data Backup Collaboration Server Smartphone Communication Miscellaneous Tech Term Ransomware Windows 10 Data Recovery Upgrade Unified Threat Management Windows Productivity IT Support Remote Monitoring Passwords Operating System Mobile Computing Vendor Management Managed IT services Holiday Cybersecurity BYOD Remote Computing WiFi BDR Apps communications Facebook The Internet of Things Analytics Marketing Automation Users Apple Outsourced IT Mobile Device Firewall Phishing History Managed IT Services Browser Save Money Internet of Things Data Management Alert Big data App IT Consultant Encryption Artificial Intelligence Content Filtering Health Spam Going Green Bandwidth Bring Your Own Device Antivirus Office Maintenance Gmail Printer Tech Support Virus Cloud Computing Cybercrime Best Practice Information Technology Lithium-ion Battery Hiring/Firing Hard Drives Cost Management Business Technology Help Desk Saving Time Managed IT Office 365 Outlook Wireless Technology Windows 8 Budget Search Two-factor Authentication Recovery Employer-Employee Relationship Money IBM Phone System Document Management Hacking Blockchain Computers VPN Training Travel Update Regulations Website Government Save Time Applications SaaS Access Control Managed Service Proactive IT Running Cable Law Enforcement It Management Compliance Data storage Administration Intranet Information Education Customer Service Humor Windows 10 Hard Drive Risk Management Legal Networking Websites DDoS Mobility Business Intelligence Social Engineering iPhone Digital Payment Paperless Office Downtime Sports Computing Disaster Word Excel Comparison Tablet Hosted Solution End of Support Current Events Password Cortana Company Culture Robot Value Customer Relationship Management Augmented Reality Data Security Computer Repair Securty Hacker Social Networking PowerPoint Machine Learning Patch Management Telephone Systems Solid State Drive Data Loss Flexibility Fax Server Twitter Black Market Cryptocurrency User Data Breach File Sharing Laptop Business Growth Avoiding Downtime Project Management Wireless Digital Google Maps Healthcare Virtual Reality Net Neutrality Entertainment Politics Office Tips Heating/Cooling Storage Start Menu Tech Terms Emails Chrome Automobile Pain Points Chromebook Mobile Technology YouTube Software as a Service Computing Infrastructure Hack Unified Communications Settings Router How To Retail Uninterrupted Power Supply Computer Accessories Download eWaste Private Cloud Bitcoin Trending Conferencing Mouse IT service User Error Data Protection Telephony Co-managed IT Gaming Console Microchip Taxes Statistics Distributed Denial of Service Processors Programming Monitoring Bluetooth Text Messaging Network Congestion USB Webcam Presentation Lifestyle Scam Public Cloud Redundancy Management Vendor Identity Theft Specifications Safety Streaming Media Google Docs Virtual Desktop Vulnerabilities Experience Social Evernote Cleaning Documents Inbound Marketing Monitors Fake News In Internet of Things Advertising Desktop Flash Finance Navigation Adminstration Pirating Information Audit CIO Nanotechnology Social Network Teamwork Leadership Windows XP Business Cards Service Level Agreement Data Analysis Get More Done Staffing Google Wallet Startup Asset Tracking Data Warehousing Device Management Turn Key Emergency Hard Drive Disposal Business Managemenet Motion Sickness Society Username PDF Printer Server Access Content Management Scalability Unified Threat Management Displays Backup and Disaster Recovery Microsoft Excel Gamification Tech Trojan Computer Care Messenger Tracking Micrsooft Screen Reader Customer Resource management Best Available Keyboard online Currency Piracy Upload Fileless Malware Domains Rental Service Meetings Drones Smart Tech Distribution Organize Google Drive Windows Server 2008 Database Proxy Server Public Speaking Upselling Vulnerability Web Server HTML Spyware Mobile Payment Cabling Fiber-Optic Wi-Fi LinkedIn Administrator Permissions Mobile Security Language Term Video Surveillance Electricity Printing Books Workers Telephone System Electronic Medical Records Shortcut Software License Trends Directions Troubleshooting Supercomputer Multi-Factor Security Cost Entrepreneur Saving ZTime Windows 7 switches Fraud Writing Tactics Dark Web HIPAA Skype Music Devices Environment Webinar cache Television Archive Worker UTM Content Electronic Payment Debate WannaCry Downloads Reading Samsung Upgrades Health IT Competition Harddrive Freedom of Information G Suite LiFi IT Plan Enterprise Resource Planning Managed IT Service Business Owner GPS Corporate Profile Point of Contact Employer Employee Relationship Legislation Error Time Management email scam Addiction Bookmark IP Address Hacks Physical Security Accountants A.I. External Harddrive Assessment SharePoint Licensing Application Tip of the week Banking Botnet Multi-factor Authentication Work/Life Balance Human Resources Google Calendar Relocation Tablets Deep Learning Touchscreen News Recycling Sync Visible Light Communication Migration Memory Connected Devices Processor 3D Ebay Best Practives VoIP Analytic Wireless Headphones Telephone Thin CLient IT consulting Network Management Browsers Knowledge Notifications Product Reviews CCTV Equifax Fleet Tracking Smart Phones Consultation Digital Signature Microserver Virtual Assistant Business Metrics Computer Malfunction Device security MSP Technology Tips Reliable Computing Read User Tip Capital Printers Productuvuty Managing Stress Regulation Processing CrashOverride 3D Printing