Computerware

Email Malware is the New Schrӧdinger’s Cat

Email Malware is the New Schrӧdinger’s Cat

There is a famous thought experiment devised by physicist Erwin Schrӧdinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrӧdinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security.

Schrӧdinger devised the thought experiment to combat the Copenhagen interpretation of quantum mechanics, which posited that, when unobserved, an object can exist in all states, and reverts to one if observed. In Schrӧdinger’s thought experiment, a cat was hypothetically shut in a box with a small enough amount of radioactive material to only have a 50/50 chance of being detected by a Geiger counter. If it was, a hammer would break open a container of poison, killing the cat. The premise was that, if the Copenhagen interpretation was correct, the cat could be assumed to be both alive and dead simultaneously until it was observed to be one or the other.

While Schrӧdinger’s cat was meant to discredit the Copenhagen interpretation, there is a modern version of this thought experiment that businesses should be concerned about. This version focuses on email, and the attachments that often come with it.

It is no secret that email is a very popular way for cybercriminals and other online mischief-makers to deliver their tools. If we treat emails the way that Schrodinger’s cat was approached, any email could feasibly contain a malicious threat, as well as no threats at all. The thing is, while determining if Schrӧdinger’s cat was alive or dead would be a relatively harmless activity (except potentially for the cat), finding out whether or not an email attachment is infected could cause quite a bit of damage to your system.

Fortunately, there are ways to protect yourself and your system against threats like email malware and phishing attempts. Antivirus and anti-malware scanners can catch many threats on their way in, and a spam blocker can help keep out many more.

If you’d rather know for sure that your inbox doesn’t contain any threats (or dead cats), let Computerware suggest a few solutions. Give us a call at (703) 821-8200.

Backup and Recovery is Essential for Today's Busin...
Your Guide to Tightening Up Network Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, June 22, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Business Computing Hackers Backup Managed Service Provider Workplace Tips Productivity Data Business Saving Money Hardware Malware Email IT Support IT Services Hosted Solutions Network Security Google Small Business Efficiency Smartphones Gadgets Quick Tips Mobile Devices User Tips Business Continuity Computer Disaster Recovery Virtualization Network Mobile Office Microsoft Office VoIP Android Social Media Innovation Server Mobile Device Management Smartphone Upgrade Miscellaneous Windows 10 Unified Threat Management Windows Ransomware Remote Monitoring Operating System Collaboration Communication Holiday Mobile Computing Passwords Remote Computing Cybersecurity WiFi Vendor Management Apps BYOD Facebook Managed IT services The Internet of Things Marketing Apple IT Support Users Analytics History Firewall Automation Internet of Things Alert Data Backup Data Recovery Productivity Data Management communications Outsourced IT Managed IT Services Artificial Intelligence Save Money IT Consultant Tech Term Phishing App Content Filtering Gmail Bandwidth Going Green Office Mobile Device Health Big data Bring Your Own Device Spam BDR Lithium-ion Battery Maintenance Best Practice Information Technology Printer Tech Support Managed IT Virus Browser Cybercrime Encryption Wireless Technology Antivirus Cost Management Search Hiring/Firing Hard Drives Outlook Windows 8 Budget Computers IBM Recovery Employer-Employee Relationship Update Help Desk Phone System Hacking Money Office 365 Document Management Customer Service Two-factor Authentication Saving Time Humor Hard Drive Law Enforcement Windows 10 VPN Travel Intranet Website Education Government Compliance Data storage Cloud Computing Risk Management Networking Legal Save Time Administration It Management Regulations Business Technology Training SaaS Running Cable Proactive IT End of Support Social Networking iPhone Hosted Solution Robot Data Breach Wireless Securty Twitter Excel DDoS Project Management Mobility Solid State Drive Social Engineering Customer Relationship Management Flexibility Black Market Augmented Reality PowerPoint Word Laptop Access Control Business Intelligence Password Cortana Business Growth Digital Payment Current Events Hacker Downtime Data Security Comparison Tablet Paperless Office Patch Management Blockchain Telephone Systems Company Culture Avoiding Downtime Data Loss User Computer Repair Fax Server Disaster Specifications Safety Redundancy Virtual Desktop Programming Pain Points Identity Theft Social Statistics IT service Network Congestion Documents Digital Google Maps Heating/Cooling Politics Storage Websites Virtual Reality Emails Bluetooth Streaming Media Automobile Start Menu Tech Terms Mobile Technology Chromebook Vulnerabilities Retail Cryptocurrency Software as a Service Gaming Console Computing Infrastructure Hack Healthcare How To eWaste Google Docs Uninterrupted Power Supply Net Neutrality Webcam Private Cloud Experience Chrome Text Messaging Download Value Monitors Cleaning Bitcoin Telephony Applications Router User Error Office Tips Data Protection Co-managed IT Machine Learning Processors Computer Accessories Taxes YouTube Distributed Denial of Service USB Inbound Marketing Presentation Unified Communications Settings Sports Trending Computing Lifestyle Public Cloud Scam Mouse Google Calendar Skype Relocation Tablets Devices Tip of the week Archive Banking Botnet Fraud Tactics File Sharing UTM Content Permissions Language Touchscreen News Best Practives Sync Monitoring VoIP IT Plan Enterprise Resource Planning Digital Signature Consultation Evernote Point of Contact Legislation Knowledge Notifications CCTV switches Writing Technology Tips Microserver Reliable Computing Accountants Entertainment Music Virtual Assistant Business Metrics Computer Malfunction email scam Addiction Teamwork Multi-factor Authentication Fake News Upselling In Internet of Things Management Upgrades Audit Migration Connected Devices LiFi Data Warehousing Analytic Get More Done Wireless Headphones PDF Recycling Video Surveillance Access Product Reviews Turn Key Saving ZTime Scalability Equifax Emergency Hard Drive Disposal Printer Server Motion Sickness Network Management Best Available Keyboard Computer Care Messenger Tracking Device security Domains Work/Life Balance Microsoft Excel Read Trojan Deep Learning Rental Service Meetings Desktop Finance Public Speaking Visible Light Communication Memory Google Drive Windows Server 2008 Harddrive Nanotechnology Organize Debate IT consulting Spyware Mobile Payment Cabling Startup Vulnerability Device Management GPS Web Server Business Cards Service Level Agreement Shortcut Electricity Printing Business Managemenet External Harddrive Books Workers Troubleshooting Content Management Wi-Fi Administrator Unified Threat Management Backup and Disaster Recovery Entrepreneur Supercomputer Gamification HIPAA Advertising Flash Windows 7 Screen Reader Environment CIO Windows XP cache Television Thin CLient Worker Smart Tech Electronic Payment Staffing Google Wallet online Currency Webinar 3D Ebay Microchip Piracy Upload Competition Displays WannaCry Downloads Smart Phones Reading Samsung HTML Business Owner Society Fiber-Optic Database Employer Employee Relationship Mobile Security IP Address Time Management Freedom of Information G Suite Conferencing Micrsooft Corporate Profile LinkedIn Application Assessment SharePoint Leadership Licensing Multi-Factor Security Human Resources Drones Adminstration Pirating Information Hacks Physical Security Software License Trends CrashOverride Capital Productuvuty 3D Printing Managing Stress

toner1.7