About Us

IT Services

Electronic Security

Knowledge Center

News & Events



Contact Us

  • Register

Prosper Solutions Blog

Prosper Solutions has been serving the Chelsea area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Email Malware is the New Schrӧdinger’s Cat

Email Malware is the New Schrӧdinger’s Cat

There is a famous thought experiment devised by physicist Erwin Schrӧdinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrӧdinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security.

Schrӧdinger devised the thought experiment to combat the Copenhagen interpretation of quantum mechanics, which posited that, when unobserved, an object can exist in all states, and reverts to one if observed. In Schrӧdinger’s thought experiment, a cat was hypothetically shut in a box with a small enough amount of radioactive material to only have a 50/50 chance of being detected by a Geiger counter. If it was, a hammer would break open a container of poison, killing the cat. The premise was that, if the Copenhagen interpretation was correct, the cat could be assumed to be both alive and dead simultaneously until it was observed to be one or the other.

While Schrӧdinger’s cat was meant to discredit the Copenhagen interpretation, there is a modern version of this thought experiment that businesses should be concerned about. This version focuses on email, and the attachments that often come with it.

It is no secret that email is a very popular way for cybercriminals and other online mischief-makers to deliver their tools. If we treat emails the way that Schrodinger’s cat was approached, any email could feasibly contain a malicious threat, as well as no threats at all. The thing is, while determining if Schrӧdinger’s cat was alive or dead would be a relatively harmless activity (except potentially for the cat), finding out whether or not an email attachment is infected could cause quite a bit of damage to your system.

Fortunately, there are ways to protect yourself and your system against threats like email malware and phishing attempts. Antivirus and anti-malware scanners can catch many threats on their way in, and a spam blocker can help keep out many more.

If you’d rather know for sure that your inbox doesn’t contain any threats (or dead cats), let Prosper Solutions suggest a few solutions. Give us a call at (617) 369-9977.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, June 23, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Passwords Avoiding Downtime Redundancy Training Workplace Tips Operating System Business Data Management Assessment Accountants Outsourced IT Spyware Solid State Drive switches Collaboration Wireless Technology Managed Service Provider Data Security Business Growth Storage Presentation Productivity Printer Devices Browser Analytic Settings Meetings Outlook Read Lithium-ion battery Password Hosted Solutions Software IT Services Thank You Running Cable Computer Trending Teamwork Firewall Holiday Twitter Websites Inbound Marketing Remote Monitoring Digital Payment Hacks Legal Google Docs Notifications Managed IT User Smartphones Micrsooft uptime G Suite YouTube Worker Startup CrashOverride IT Support Applications Data storage Visible Light Communication Managed IT services Patch Management hardware Statistics Networking VoIP End of Support Entrepreneur Network Congestion eWaste Data Warehousing Electronic Payment Virtual Reality IT consulting Downloads Cortana Computer Accessories Backup Tip of the week Co-Managed IT Maintenance User Error Wi-Fi Device security Office 365 Management Social Mobile Device Management IT Politics iPhone Black Market Identity Theft Value Troubleshooting Digital Signature Piracy Monitors Shortcut Society Hiring/Firing Television Nanotechnology Cleaning Streaming Media History Mobile Computing Backup and Disaster Recovery Content Filtering SharePoint Social Media Computing Infrastructure Computer Malfunction Windows 10 Cybersecurity Sports Application Tracking Data Loss Company Culture Banking Encryption outsource cloud computing Staffing Internet Upgrade Freedom of Information Advertising Flash Google Relocation App Product Reviews Knowledge Smartphone Fake News Mobile Security Virtualization Work/Life Balance Server Patching Books Quick Tips Fiber-Optic Two-factor Authentication Botnet Enterprise Resource Planning Project Management Software License Data Breach Congratulations How To Access Telephone Systems Emergency Social Networking Budget Save Time Sync Office Tips Digital Content Data Backup Business Mangement UTM Intranet VPN Router HIPAA Business Management Hacker Emails Business Continuity Productivity Risk Management Healthcare Wireless Headphones Screen Reader News Consultation Language Gadgets Microsoft Excel Regulations clout services In Internet of Things Pain Points Network Security Machine Learning Mobility Network Management Website Corporate Profile Text Messaging Business Technology Business Intelligence Best Available IT Consultant Apps Chrome IT service Access Control Business Computing Internet of Things Microsoft Office Writing USB PowerPoint Help Desk Security Finance Environment Law Enforcement Disaster Recovery Mobile Devices Messenger Windows 7 Social Engineering Keyboard Business Metrics Windows SaaS Ransomware Hard Drive Miscellaneous Displays BDR Entertainment Word Public Cloud Innovation Customer Relationship Management 3D Printing Memory Windows 8 Software as a Service LiFi Current Events Programming Money Chromebook Automobile Comparison PDF WiFi Hacking Time Management Customer Service Going Green Big data Scalability Business Owner Tech Term IT Plan Vendor Management Disaster Skype WannaCry Administration Windows Server 2008 Automation Experience Computer Care Google Maps Remote Computing outsource cloud storage Addiction Productuvuty Google Drive Telephony Upgrades CIO Vendor Mangement Taxes Drones Reliable Computing Processors Rental Service Bandwidth Virtual Desktop communications VoIP Robot Uninterrupted Power Supply Heating/Cooling Bitcoin CCTV Tech Terms Analytics Vulnerability cloud Domains Augmented Reality Privacy Supercomputer Bluetooth Deep Learning Administrator Licensing Multi-factor Authentication Unified Threat Management Update Hard Drive Disposal Google Wallet Hard Drives Data Flexibility Public Speaking Hosted Solution Windows 10 Windows10 Unified Communications Compliance Travel Excel Technology Tips Health Multi-Factor Security Virus Scam Computers Windows XP Cybercrime Computer Repair cloud computing Touchscreen Electricity Vulnerabilities Upload Gmail Conferencing Desktop email scam Fraud Technology Citrix Xenapp Government Mobile Payment Efficiency Cabling Database Start Menu Virtual Assistant Service Level Agreement Artificial Intelligence Smart Tech Managing Stress Bata Backup Mobile Technology Migration Search Unified Threat Management Permissions Microchip MSP Safety Hack Google Calendar Alert Saving Money Facebook Marketing Gamification Gaming Console Tech Support Connected Devices Physical Security Securty Specifications DDoS Phishing Mouse Recovery Tip of the Week Email Education Apple Workers Proactive IT Network File Sharing HTML Web Server Information Technology Audit Trends Best Practice Wireless Equifax Best Practices Evernote Documents Monitoring IT Support Competition Human Resources Small Business Cache Paperless Office Reading Mobile Device Managed IT Services Data Protection Motion Sickness Legislation Webcam Music BYOD Download cloud storage Phone System Tablet Blockchain Private Cloud Net Neutrality Antivirus Retail Office Tactics the Internet of Things Hackers Downtime Capital IT Management Malware Android Cost Management User Tips IBM Saving Time Samsung Employer-Employee Relationship Document Management Microsoft Cryptocurrency Tablets cyber security Employer Employee Relationship Distributed Denial of Service Save Money Bring Your Own Device Computing Printing Data Recovery Laptop Business Cards IP Address Spam Communication

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150