About Us

IT Services

Electronic Security

Knowledge Center

News & Events



Contact Us

  • Register

Prosper Solutions Blog

Prosper Solutions has been serving the Chelsea area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Email Malware is the New Schrӧdinger’s Cat

Email Malware is the New Schrӧdinger’s Cat

There is a famous thought experiment devised by physicist Erwin Schrӧdinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrӧdinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security.

Schrӧdinger devised the thought experiment to combat the Copenhagen interpretation of quantum mechanics, which posited that, when unobserved, an object can exist in all states, and reverts to one if observed. In Schrӧdinger’s thought experiment, a cat was hypothetically shut in a box with a small enough amount of radioactive material to only have a 50/50 chance of being detected by a Geiger counter. If it was, a hammer would break open a container of poison, killing the cat. The premise was that, if the Copenhagen interpretation was correct, the cat could be assumed to be both alive and dead simultaneously until it was observed to be one or the other.

While Schrӧdinger’s cat was meant to discredit the Copenhagen interpretation, there is a modern version of this thought experiment that businesses should be concerned about. This version focuses on email, and the attachments that often come with it.

It is no secret that email is a very popular way for cybercriminals and other online mischief-makers to deliver their tools. If we treat emails the way that Schrodinger’s cat was approached, any email could feasibly contain a malicious threat, as well as no threats at all. The thing is, while determining if Schrӧdinger’s cat was alive or dead would be a relatively harmless activity (except potentially for the cat), finding out whether or not an email attachment is infected could cause quite a bit of damage to your system.

Fortunately, there are ways to protect yourself and your system against threats like email malware and phishing attempts. Antivirus and anti-malware scanners can catch many threats on their way in, and a spam blocker can help keep out many more.

If you’d rather know for sure that your inbox doesn’t contain any threats (or dead cats), let Prosper Solutions suggest a few solutions. Give us a call at (617) 369-9977.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 19 March 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Storage Skype IT service Society Relocation Hiring/Firing Hacking Chrome Network Windows 10 Avoiding Downtime Telephony Windows 8 Read Entertainment Staffing Health Congratulations Reading Virtual Reality Phishing BYOD Public Cloud Audit Excel Application IT UTM cloud computing Bata Backup iPhone Social Media IBM Capital Memory Saving Time Internet Assessment Notifications Sports Google Maps Proactive IT 3D Printing SharePoint switches Thank You Visible Light Communication Apps Fraud Business Continuity Office Business Growth Customer Relationship Management eWaste Cryptocurrency Settings Laptop Quick Tips Hacks Save Time Managed IT Services Downtime Rental Service Computer Accessories Reliable Computing Workplace Tips Television clout services IP Address Uninterrupted Power Supply Website Text Messaging Securty App Technology IT Support Operating System Websites Wi-Fi Business HIPAA Recovery Education Twitter Router Password Citrix Xenapp Data Management Miscellaneous Printer Books Hackers Mobile Payment Physical Security Experience History Software as a Service Small Business Business Intelligence Phone System Email Content Filtering Identity Theft Data Loss Safety Alert Productivity Machine Learning How To Document Management Gadgets Domains Security Advertising Access Control Hacker Computing Infrastructure PDF Customer Service Scalability Consultation Google Vulnerabilities User Unified Threat Management Data storage IT Plan Flash Innovation Language Analytics Blockchain Cost Management Travel Data Breach CCTV Private Cloud Social Engineering Motion Sickness Tracking Hard Drive Efficiency Running Cable Tablet Windows Employer Employee Relationship Social Networking Migration Upgrade Save Money Fake News Legal Mobile Computing Computers Pain Points Bring Your Own Device Mobile Devices Technology Tips Telephone Systems Data Recovery Networking Hack Disaster Recovery WannaCry Automation Maintenance Regulations Lithium-ion battery User Tips Backup Fiber-Optic Work/Life Balance Data Security Digital Signature Access Computer Malfunction Government Webcam Productuvuty Keyboard Documents Piracy Start Menu HTML Cleaning Google Drive Digital Payment Download Downloads Antivirus Vendor Management Business Mangement Hard Drive Disposal Big data Public Speaking Compliance Windows10 VPN Mobile Device Management Specifications Managed IT services Environment Solid State Drive Firewall Office Tips Managed IT DDoS Social Unified Communications Going Green Corporate Profile Windows Server 2008 Server the Internet of Things Risk Management Administration Facebook Intranet Black Market Device security Emergency Cortana Monitors Encryption Google Docs Project Management Electricity outsource cloud storage WiFi Upgrades Bluetooth Presentation Company Culture Passwords Marketing Tablets MSP Remote Computing Microsoft Office Tech Terms Apple Computer Care Smartphone Internet of Things Computing Touchscreen Emails Robot Music Business Owner Sync Value Distributed Denial of Service Remote Monitoring Patch Management Best Practices Permissions CIO Worker Printing Information Technology Virus IT Management Network Congestion Co-Managed IT Browser End of Support Productivity uptime Windows 7 Employer-Employee Relationship Ransomware Law Enforcement Android Unified Threat Management Teamwork Redundancy Shortcut Drones Writing Entrepreneur Cabling Managed Service Provider Licensing Data Warehousing Trending Windows 10 IT Support Heating/Cooling Virtualization Troubleshooting Data Protection Time Management Displays Chromebook Meetings Virtual Desktop Deep Learning Analytic Applications Update Computer Two-factor Authentication Business Management Inbound Marketing Digital Botnet Holiday Microchip Tip of the week Wireless Virtual Assistant Microsoft communications Computer Repair Patching Samsung Current Events Data hardware Mobility LiFi Saving Money Desktop Retail Gmail Hosted Solutions Microsoft Excel Mobile Device Automobile Artificial Intelligence Help Desk PowerPoint Micrsooft Data Backup Budget Workers Business Computing Tech Term Wireless Technology Programming Business Metrics Politics Communication Mouse In Internet of Things Training Outlook Mobile Security VoIP Taxes Vulnerability Hosted Solution Cybercrime outsource cloud computing Freedom of Information G Suite Web Server YouTube BDR Malware Google Calendar Product Reviews Flexibility Vendor Mangement Tech Support Administrator Gaming Console File Sharing News Augmented Reality Hard Drives Bandwidth Competition IT consulting Net Neutrality Messenger Comparison email scam Devices USB Money cyber security Business Cards User Error Scam Collaboration Bitcoin Disaster Spyware Office 365 VoIP Processors Paperless Office cloud Human Resources Privacy Electronic Payment Search Tip of the Week Mobile Technology Multi-factor Authentication Supercomputer Windows XP Evernote Cybersecurity Best Available Banking Cache Spam Word IT Services cloud storage Business Technology Knowledge Outsourced IT Network Security Best Practice Smartphones Software License Software Streaming Media IT Consultant CrashOverride Google Wallet SaaS Statistics

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150