Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Email Malware is the New Schrӧdinger’s Cat

Email Malware is the New Schrӧdinger’s Cat

There is a famous thought experiment devised by physicist Erwin Schrӧdinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrӧdinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security.

Schrӧdinger devised the thought experiment to combat the Copenhagen interpretation of quantum mechanics, which posited that, when unobserved, an object can exist in all states, and reverts to one if observed. In Schrӧdinger’s thought experiment, a cat was hypothetically shut in a box with a small enough amount of radioactive material to only have a 50/50 chance of being detected by a Geiger counter. If it was, a hammer would break open a container of poison, killing the cat. The premise was that, if the Copenhagen interpretation was correct, the cat could be assumed to be both alive and dead simultaneously until it was observed to be one or the other.

While Schrӧdinger’s cat was meant to discredit the Copenhagen interpretation, there is a modern version of this thought experiment that businesses should be concerned about. This version focuses on email, and the attachments that often come with it.

It is no secret that email is a very popular way for cybercriminals and other online mischief-makers to deliver their tools. If we treat emails the way that Schrodinger’s cat was approached, any email could feasibly contain a malicious threat, as well as no threats at all. The thing is, while determining if Schrӧdinger’s cat was alive or dead would be a relatively harmless activity (except potentially for the cat), finding out whether or not an email attachment is infected could cause quite a bit of damage to your system.

Fortunately, there are ways to protect yourself and your system against threats like email malware and phishing attempts. Antivirus and anti-malware scanners can catch many threats on their way in, and a spam blocker can help keep out many more.

If you’d rather know for sure that your inbox doesn’t contain any threats (or dead cats), let Computerware suggest a few solutions. Give us a call at (703) 821-8200.

Backup and Recovery is Essential for Today's Busin...
Your Guide to Tightening Up Network Security


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 21 March 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Business Computing Hackers Backup Managed Service Provider Productivity Workplace Tips Data Hardware Business Saving Money Malware Email IT Support IT Services Hosted Solutions Google Small Business Efficiency Network Security Quick Tips Smartphones Gadgets User Tips Mobile Devices Business Continuity Disaster Recovery Computer Mobile Office Network Virtualization Microsoft Office Server VoIP Social Media Mobile Device Management Windows 10 Miscellaneous Upgrade Unified Threat Management Ransomware Windows Smartphone Innovation Android Remote Monitoring Passwords Holiday Operating System Remote Computing WiFi Vendor Management Mobile Computing BYOD Communication Apps Marketing Collaboration Facebook The Internet of Things Managed IT services Analytics History Firewall Cybersecurity Users Apple Alert Data Management IT Support Managed IT Services Save Money Productivity communications IT Consultant Phishing Outsourced IT Health Bring Your Own Device Big data Office Internet of Things App Content Filtering Automation BDR Gmail Browser Wireless Technology Search Outlook Budget Data Recovery Maintenance Lithium-ion Battery Virus Hard Drives Antivirus Data Backup Artificial Intelligence Windows 8 Hiring/Firing Information Technology Best Practice Spam Going Green Tech Support Managed IT Mobile Device Recovery Employer-Employee Relationship Cost Management Update Bandwidth Encryption Help Desk Phone System Hacking Money Office 365 Printer IBM Document Management Data storage Government Cybercrime Risk Management Saving Time Legal Intranet SaaS Administration Two-factor Authentication Customer Service Travel Website Education Cloud Computing Proactive IT Computers VPN Networking Save Time Running Cable Law Enforcement It Management Humor Hard Drive Mobility Flexibility Avoiding Downtime Computer Repair Word Laptop Windows 10 Password Current Events Cortana Excel Hacker Downtime Tablet Hosted Solution Company Culture Robot Data Security Digital Payment Wireless Social Engineering Comparison Black Market Augmented Reality PowerPoint Social Networking Business Growth Project Management Twitter Telephone Systems Training Disaster Fax Server End of Support iPhone User Business Intelligence Securty DDoS Solid State Drive Automobile Trending Scam Cryptocurrency Google Docs How To Statistics Pain Points Digital Office Tips Websites User Error Vulnerabilities Start Menu Mobile Technology Taxes Paperless Office Streaming Media Processors Sports Inbound Marketing USB Software as a Service Access Control Uninterrupted Power Supply Computing Presentation Gaming Console Identity Theft Chrome Virtual Desktop Webcam Bitcoin Data Protection IT service Documents Programming Virtual Reality Router Google Maps Computer Accessories Heating/Cooling Compliance Patch Management Blockchain Data Loss Customer Relationship Management Computing Infrastructure Mouse Redundancy Data Breach Hack Retail Experience Text Messaging eWaste Telephony Private Cloud Monitors Value Co-managed IT YouTube Distributed Denial of Service Settings Unified Communications Lifestyle Net Neutrality Public Cloud Specifications Safety Social Politics Business Technology Network Congestion Video Surveillance Smart Phones Time Management Freedom of Information Get More Done Chromebook Fraud Printer Server Messenger LinkedIn Saving ZTime Google Calendar Analytic UTM Motion Sickness Work/Life Balance Archive Debate Touchscreen News Tracking Download email scam Books Public Speaking IT consulting Knowledge Technology Tips Multi-factor Authentication Web Server Point of Contact Cleaning Microchip Entrepreneur CIO Fake News Workers Business Managemenet Webinar Reading Regulations Windows XP Thin CLient HIPAA Upselling Tech Terms Society Electronic Payment Device security Access Hacks Micrsooft Microsoft Excel Samsung Business Cards Relocation G Suite IP Address Leadership Tech Term Spyware Mobile Payment Physical Security Human Resources Tablets Notifications Device Management Best Practives Skype Piracy Reliable Computing Sync Music HTML Microserver cache Television CCTV online Currency Upgrades Teamwork Software License Corporate Profile In Internet of Things Bluetooth LiFi Storage PDF Turn Key Assessment SharePoint Emails Trojan Rental Service Scalability Deep Learning Keyboard Best Available Tip of the week Product Reviews IT Plan Organize VoIP Memory Domains Visible Light Communication GPS Read Consultation Evernote Meetings Wi-Fi Cabling Shortcut Virtual Assistant Troubleshooting Audit Migration Administrator Flash Advertising Staffing Google Wallet Ebay Environment 3D Data Warehousing Supercomputer Hard Drive Disposal Worker Machine Learning Displays Recycling Competition Emergency Business Owner Computer Care Desktop Drones Pirating Information Adminstration Google Drive Windows Server 2008 Employer Employee Relationship Banking Unified Threat Management Licensing File Sharing Application Harddrive Vulnerability Printing Applications Electricity Botnet Language Permissions External Harddrive Windows 7 Business Metrics Content Management Fiber-Optic Writing switches Digital Signature Entertainment Downloads Mobile Security WannaCry Computer Malfunction CrashOverride 3D Printing Devices Capital Productuvuty