Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Blog
  • Register

Prosper Solutions Blog

Email Malware is the New Schrӧdinger’s Cat

Email Malware is the New Schrӧdinger’s Cat

There is a famous thought experiment devised by physicist Erwin Schrӧdinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrӧdinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security.

Schrӧdinger devised the thought experiment to combat the Copenhagen interpretation of quantum mechanics, which posited that, when unobserved, an object can exist in all states, and reverts to one if observed. In Schrӧdinger’s thought experiment, a cat was hypothetically shut in a box with a small enough amount of radioactive material to only have a 50/50 chance of being detected by a Geiger counter. If it was, a hammer would break open a container of poison, killing the cat. The premise was that, if the Copenhagen interpretation was correct, the cat could be assumed to be both alive and dead simultaneously until it was observed to be one or the other.

While Schrӧdinger’s cat was meant to discredit the Copenhagen interpretation, there is a modern version of this thought experiment that businesses should be concerned about. This version focuses on email, and the attachments that often come with it.

It is no secret that email is a very popular way for cybercriminals and other online mischief-makers to deliver their tools. If we treat emails the way that Schrodinger’s cat was approached, any email could feasibly contain a malicious threat, as well as no threats at all. The thing is, while determining if Schrӧdinger’s cat was alive or dead would be a relatively harmless activity (except potentially for the cat), finding out whether or not an email attachment is infected could cause quite a bit of damage to your system.

Fortunately, there are ways to protect yourself and your system against threats like email malware and phishing attempts. Antivirus and anti-malware scanners can catch many threats on their way in, and a spam blocker can help keep out many more.

If you’d rather know for sure that your inbox doesn’t contain any threats (or dead cats), let Prosper Solutions suggest a few solutions. Give us a call at (617) 369-9977.

Backup and Recovery is Essential for Today's Busin...
Your Guide to Tightening Up Network Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, March 18, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Fleet Tracking Business Management Managing Stress Internet of Things Computer Integration Chrome SharePoint Time Management Addiction Managed IT Services Consultation Two-factor Authentication Communication Writing Social Networking Telephone GDPR Holiday User Error Office 365 Tech Licensing Employer Employee Relationship Co-Managed IT Technology Tips Phishing Windows XP Legislation Backup and Disaster Recovery Chamber File Sharing Patching Innovation Tracking Text Messaging Printing Upgrade Multi-Factor Security Redundancy Processing Mouse Risk Management Cybercrime Fraud Hosted Solution Navigation Equifax Competition Disaster Recovery Mobile Security Compliance Safety Apple Laptop Users Hacking clout services Identity Theft Accountants Small Business Device security Corporate Profile Directions Google Maps Politics App Project Management Artificial Intelligence Samsung Networking Electronic Payment Microsoft 365 Information Language Sync Technology Printer Processors News Vendor Management Server Automobile Desktop Smartphones Monitoring Saving Time Inbound Marketing Computer Care Fake News IT Consultant switches Update DDoS Mobile Computing Printers Mobile Device Management Medical IT Chromebook Virtualization Mobile Payment Spam Proxy Server Social Engineering Business Intelligence Help Desk WiFi User Solutions Citrix Xenapp Hosted Solutions Microchip Trends Advertising Wireless Technology Electronic Medical Records Cortana Data Managed Service Provider Cabling Vendor Content Filtering Employer-Employee Relationship Going Green Word Screen Reader Motion Sickness Vendor Mangement Network Management Tip of the Week Automation Username Monitors Analytic Gmail IT consulting Paperless Office Fileless Malware User Tips Computer Repair Skype Webcam Work/Life Balance CIO Network Congestion Unified Threat Management Money Bandwidth Google Docs Supercomputer Business Growth MSP Remote Computing eWaste Term Unified Threat Management Cleaning Analytics Data Breach Saving Money IBM Data Analysis SSID Unified Communications Piracy Error Conferencing Television IT Services Data Recovery Gaming Console Public Cloud Startup Microsoft Solid State Drive Data Security Running Cable Travel Business Computing cyber security Scam VoIP Managed Service Quick Tips Business Cards Website Database Twitter Best Practices Thank You Troubleshooting Botnet Augmented Reality User Tip Managed IT Service Streaming Media Websites Relocation Tip of the week Marketing Entertainment Downtime Capital HTML email scam Windows 10 Browser Telephone Systems Browsers BDR Customer Service Big data Keyboard SaaS Virus Logistics Save Money Nanotechnology End of Support Robot PowerPoint Teamwork Maintenance Computer Malfunction Shortcut Windows 8 Firewall History Entrepreneur Productivity IT Support Internet Health IT Collaboration Digital Signature Malware Gamification Business Technology Cooperation Cost Remote Monitoring Proactive IT Sports Administration Processor outsource cloud computing Android Phone System Machine Learning Bluetooth Telephone System Congratulations Asset Tracking Storage Domains Bitcoin Meetings cloud computing Settings Computing LiFi Current Events Dark Web Encryption Ransomware Antivirus Service Level Agreement Upload Hard Drives Budget Google Calendar Mobile Device hardware Web Server Lithium-ion battery Download Content Computer Accessories Displays Tech Support Upgrades Email Mobile Technology Specifications Hacks Privacy Read Workers Comparison G Suite USB Virtual Assistant Wireless Headphones Start Menu Network Security Avoiding Downtime Windows Server 2008 Business Mangement Uninterrupted Power Supply cloud storage Administrator Notifications IT Plan Reliable Computing Emergency Hacker UTM Messenger Education Managed IT services Blockchain Business Metrics Wireless Miscellaneous Search Hack Statistics Data Backup Environment Rapid City Company Culture Computing Infrastructure Customer Resource management Data Warehousing Application Private Cloud Productivity Google Drive Connected Devices Tablets Digital Smart Tech Freedom of Information Net Neutrality Health Tech Terms Intranet Security Cameras Data Management Human Resources Regulation Taxes Productuvuty Professional Services Trending YouTube Micrsooft Backup VoIP Programming CrashOverride Microsoft Office Cost Management uptime Vulnerabilities VPN Google Access Control Google Wallet Managed IT Fiber-Optic Black Market Electricity Securty Security Presentation Mobility Operating System Flash Best Practice Staffing Network Books Deep Learning Society Management Save Time cloud Disaster Passwords Modem Access Social Media BYOD Music Data storage Virtual Reality Gadgets Outsourced IT the Internet of Things Reading Tech Term Data Protection Product Reviews Applications Social Network Permissions Software Efficiency Legal Business Patch Management Office Tips Hard Drive Disposal Multi-factor Authentication Business Owner Training Distributed Denial of Service IP Address Customer Relationship Management Windows 10 IT Management Spyware outsource cloud storage Business Continuity How To Windows 7 Knowledge Apps 3D Printing Excel Cryptocurrency Hackers Retail Alert Distribution IT service Telephony Devices communications Drones Best Available Software as a Service IT Scalability Cybersecurity Tactics Vulnerability Bata Backup Enterprise Resource Planning Wi-Fi Virtual Desktop Microsoft Excel Workplace Tips Rental Service Pain Points Information Technology Banking Tablet Software License iPhone Healthcare Finance Worker Recovery A.I. IT Support Downloads Emails Regulations Physical Security Law Enforcement Memory Heating/Cooling Router Document Management Visible Light Communication HIPAA Hard Drive Documents Hiring/Firing Assessment Password Windows10 Digital Payment Facebook Flexibility Office Touchscreen Voice over Internet Protocol Outlook Computers Social Experience Mobile Devices Bookmark Value In Internet of Things Cache Windows Evernote Smartphone Migration Data Loss Government Public Speaking Google Play PDF Audit Bring Your Own Device CCTV WannaCry

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150