facebook linkedin twitter

Email Malware is the New Schrӧdinger’s Cat

Email Malware is the New Schrӧdinger’s Cat

There is a famous thought experiment devised by physicist Erwin Schrӧdinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrӧdinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security.

Schrӧdinger devised the thought experiment to combat the Copenhagen interpretation of quantum mechanics, which posited that, when unobserved, an object can exist in all states, and reverts to one if observed. In Schrӧdinger’s thought experiment, a cat was hypothetically shut in a box with a small enough amount of radioactive material to only have a 50/50 chance of being detected by a Geiger counter. If it was, a hammer would break open a container of poison, killing the cat. The premise was that, if the Copenhagen interpretation was correct, the cat could be assumed to be both alive and dead simultaneously until it was observed to be one or the other.

While Schrӧdinger’s cat was meant to discredit the Copenhagen interpretation, there is a modern version of this thought experiment that businesses should be concerned about. This version focuses on email, and the attachments that often come with it.

It is no secret that email is a very popular way for cybercriminals and other online mischief-makers to deliver their tools. If we treat emails the way that Schrodinger’s cat was approached, any email could feasibly contain a malicious threat, as well as no threats at all. The thing is, while determining if Schrӧdinger’s cat was alive or dead would be a relatively harmless activity (except potentially for the cat), finding out whether or not an email attachment is infected could cause quite a bit of damage to your system.

Fortunately, there are ways to protect yourself and your system against threats like email malware and phishing attempts. Antivirus and anti-malware scanners can catch many threats on their way in, and a spam blocker can help keep out many more.

If you’d rather know for sure that your inbox doesn’t contain any threats (or dead cats), let Computerware suggest a few solutions. Give us a call at (703) 821-8200.

Backup and Recovery is Essential for Today's Busin...
Your Guide to Tightening Up Network Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, September 21, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Hackers Microsoft Backup Managed Service Provider Productivity Workplace Tips Data Hardware Business Saving Money Email Malware Network Security IT Services IT Support Hosted Solutions Google Small Business Efficiency Smartphones User Tips Gadgets Computer Quick Tips Business Continuity Mobile Devices Disaster Recovery Mobile Office Virtualization Network Microsoft Office Innovation Social Media Android Server Mobile Device Management VoIP Smartphone Miscellaneous Upgrade Communication Ransomware Windows 10 Unified Threat Management Collaboration Windows Tech Term Passwords Operating System Data Backup Data Recovery Remote Monitoring BYOD Remote Computing IT Support Managed IT services Holiday Mobile Computing communications Apps Facebook Cybersecurity WiFi Vendor Management The Internet of Things Marketing History BDR Firewall Automation Apple Users Analytics Productivity Phishing Outsourced IT Internet of Things Managed IT Services Alert Data Management App Mobile Device Save Money Artificial Intelligence IT Consultant Spam Bandwidth Gmail Content Filtering Maintenance Browser Going Green Office Health Bring Your Own Device Big data Antivirus Search Budget Outlook Windows 8 Two-factor Authentication Hiring/Firing Hard Drives Managed IT Best Practice Information Technology Lithium-ion Battery Printer Virus Cybercrime Encryption Tech Support Cost Management Wireless Technology Office 365 Money Training Document Management Recovery Computers IBM Employer-Employee Relationship Travel Cloud Computing Hacking Update Help Desk Phone System It Management Business Technology Save Time SaaS Customer Service Law Enforcement Running Cable Compliance Proactive IT Humor Hard Drive Website Windows 10 Data storage Government Saving Time VPN Intranet Education Legal Networking Access Control Risk Management Regulations Administration Business Intelligence Sports Data Security Machine Learning Digital Payment Disaster Computing Patch Management Hosted Solution Blockchain Applications Telephone Systems Downtime End of Support User Data Loss Robot Avoiding Downtime Fax Server Comparison Tablet Securty Wireless Company Culture iPhone DDoS Computer Repair Data Breach File Sharing Solid State Drive Social Networking Project Management Black Market Flexibility Excel Mobility Twitter Laptop Social Engineering Word Customer Relationship Management Business Growth Augmented Reality Password Cortana PowerPoint Hacker Paperless Office Current Events User Error Data Protection Co-managed IT Telephony USB Chrome Unified Communications Settings Presentation Taxes Distributed Denial of Service Router Specifications Safety Inbound Marketing Virtual Desktop Computer Accessories Lifestyle Public Cloud Scam Managed Service Social IT service Trending Redundancy Documents Conferencing Identity Theft Heating/Cooling Mouse Pain Points Storage Bluetooth Statistics Vendor Programming Digital Monitoring Google Maps Cryptocurrency Virtual Reality Network Congestion Politics Websites Automobile Retail Start Menu Tech Terms Google Docs Emails Experience Information Chromebook eWaste Mobile Technology Management Software as a Service Cleaning Gaming Console Computing Infrastructure Hack Streaming Media Monitors Value Vulnerabilities How To Uninterrupted Power Supply Office Tips Private Cloud Text Messaging Download Webcam Healthcare Bitcoin Processors YouTube Net Neutrality Business Cards Service Level Agreement Business Owner Micrsooft Startup Asset Tracking Supercomputer Device Management Windows 7 Worker IP Address Business Managemenet Drones 3D Ebay Username Webinar Microchip Content Management cache Television Thin CLient Unified Threat Management Backup and Disaster Recovery Gamification Electronic Medical Records Human Resources WannaCry Downloads Smart Phones Screen Reader Customer Resource management Reading Samsung Application Piracy Upload G Suite Corporate Profile Smart Tech Distribution Employer Employee Relationship online Currency Time Management Permissions Freedom of Information Language Licensing Adminstration Pirating Information HTML Hacks Physical Security Assessment SharePoint Leadership Fiber-Optic Database LinkedIn Music Tip of the week Mobile Security Banking Botnet Health IT switches Google Calendar Writing Telephone System Relocation Tablets Digital Signature Software License Trends Best Practives Sync Entertainment VoIP Upgrades Multi-Factor Security Cost Teamwork Touchscreen News Tactics Skype Knowledge Devices Notifications CCTV Archive Consultation LiFi Evernote Fraud Virtual Assistant UTM Content Business Metrics Computer Malfunction PDF Technology Tips Microserver Reliable Computing Fake News Upselling Work/Life Balance IT Plan Enterprise Resource Planning In Internet of Things Point of Contact Audit Deep Learning Legislation Error Best Available Keyboard email scam Addiction Get More Done Domains Video Surveillance Accountants A.I. Visible Light Communication Data Warehousing Memory Public Speaking Emergency Hard Drive Disposal Multi-factor Authentication Printer Server Motion Sickness User Tip Access IT consulting Saving ZTime Turn Key Scalability Microsoft Excel Migration Connected Devices Trojan Analytic Computer Care Wireless Headphones Telephone Messenger Tracking Shortcut Recycling Network Management Troubleshooting Product Reviews CIO Debate Equifax Fleet Tracking Organize Rental Service Meetings Entrepreneur Google Drive Advertising Windows Server 2008 Harddrive Flash Cabling HIPAA Staffing Vulnerability Google Wallet GPS Device security MSP Web Server Environment Read Spyware Windows XP Mobile Payment Society Desktop Finance Wi-Fi Administrator Electronic Payment Electricity Printing External Harddrive Displays Nanotechnology Social Network Books Workers Competition Managing Stress CrashOverride Regulation Capital 3D Printing Productuvuty Printers

toner1