Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Blog
  • Register

Prosper Solutions Blog

Email Malware is the New Schrӧdinger’s Cat

Email Malware is the New Schrӧdinger’s Cat

There is a famous thought experiment devised by physicist Erwin Schrӧdinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrӧdinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security.

Schrӧdinger devised the thought experiment to combat the Copenhagen interpretation of quantum mechanics, which posited that, when unobserved, an object can exist in all states, and reverts to one if observed. In Schrӧdinger’s thought experiment, a cat was hypothetically shut in a box with a small enough amount of radioactive material to only have a 50/50 chance of being detected by a Geiger counter. If it was, a hammer would break open a container of poison, killing the cat. The premise was that, if the Copenhagen interpretation was correct, the cat could be assumed to be both alive and dead simultaneously until it was observed to be one or the other.

While Schrӧdinger’s cat was meant to discredit the Copenhagen interpretation, there is a modern version of this thought experiment that businesses should be concerned about. This version focuses on email, and the attachments that often come with it.

It is no secret that email is a very popular way for cybercriminals and other online mischief-makers to deliver their tools. If we treat emails the way that Schrodinger’s cat was approached, any email could feasibly contain a malicious threat, as well as no threats at all. The thing is, while determining if Schrӧdinger’s cat was alive or dead would be a relatively harmless activity (except potentially for the cat), finding out whether or not an email attachment is infected could cause quite a bit of damage to your system.

Fortunately, there are ways to protect yourself and your system against threats like email malware and phishing attempts. Antivirus and anti-malware scanners can catch many threats on their way in, and a spam blocker can help keep out many more.

If you’d rather know for sure that your inbox doesn’t contain any threats (or dead cats), let Prosper Solutions suggest a few solutions. Give us a call at (617) 369-9977.

Backup and Recovery is Essential for Today's Busin...
Your Guide to Tightening Up Network Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, September 25, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

User Tips User Error End of Support Flash Business Growth Apple Knowledge Flexibility Content Virus Google Calendar YouTube Law Enforcement Multi-Factor Security Cryptocurrency Best Available Windows XP Business Metrics VoIP Computer Malfunction Text Messaging Social Network SharePoint Relocation Data Backup File Sharing Telephone Desktop Drones Computer Care Google Drive SaaS Solid State Drive Equifax Business Cards Internet hardware Computer Presentation Antivirus Miscellaneous Displays Server Business Computing Vendor Touchscreen Hacking Physical Security Download Data Warehousing Migration Augmented Reality IP Address Automobile USB Bata Backup Managed IT Apps Health IT Office Chrome Healthcare Best Practice Fiber-Optic Settings History Skype Environment Screen Reader Retail email scam outsource cloud computing Word CIO Small Business BYOD Cost cloud storage Electronic Payment Access Audit switches Operating System Streaming Media Tablet Webcam Holiday Product Reviews Gamification Education User Tip Social Mobility Facebook Social Media In Internet of Things Memory Bitcoin Virtual Assistant Electronic Medical Records Windows Unified Communications Printers Cost Management Wireless Technology Managed Service Programming Intranet Computing Collaboration Hard Drives Spam Printer Tactics Mobile Payment Teamwork Data Breach Mobile Device Websites Thank You Blockchain Patching Social Networking DDoS Gadgets Managed IT Services Co-Managed IT Outlook Artificial Intelligence Sports Consultation Emergency Data Wireless Money Business Mangement IT Management Windows 8 Email WannaCry Processors Messenger Connected Devices Black Market Gaming Console cyber security Maintenance Computer Accessories Running Cable Database Hackers Fake News LiFi Vulnerabilities 3D Printing Managed IT services Robot Save Time Digital Payment VPN Capital HIPAA Upgrade Uninterrupted Power Supply Motion Sickness Network Management Software as a Service Deep Learning Company Culture Entertainment Android Society Document Management Error Laptop Tablets Virtual Desktop Advertising Piracy Trends Data Loss Startup IT Support Health Firewall Virtualization Router iPhone Username PowerPoint Vulnerability Distributed Denial of Service Twitter Meetings News the Internet of Things Google Wallet Spyware Information Technology Finance Smartphone Customer Relationship Management Citrix Xenapp Training Worker Wi-Fi Technology Tips Office Tips Start Menu IT consulting Business Management Specifications Application Analytic cloud Employer-Employee Relationship Legal Productivity Applications Social Engineering Compliance Ransomware IT Plan IT service Cache Botnet Documents Unified Threat Management Excel Update Customer Service Computers Patch Management Hard Drive Disposal Time Management Sync Internet of Things Outsourced IT Website Nanotechnology Private Cloud Gmail Hack Staffing Multi-factor Authentication Wireless Headphones Telephony Visible Light Communication Tech Support Content Filtering Cortana Data storage Regulations Remote Monitoring Scalability Employer Employee Relationship Innovation Recovery Entrepreneur Managed Service Provider Digital Signature Hiring/Firing Mobile Security A.I. Productuvuty Workers Micrsooft CrashOverride Notifications Upgrades Bandwidth Efficiency Encryption Keyboard Hacker Microsoft Access Control Samsung Hacks Security Backup Experience Corporate Profile Disaster Telephone System Bring Your Own Device Legislation Technology Hard Drive Securty Printing Proactive IT Scam Permissions Mobile Computing Public Cloud Language Business Intelligence Device security Current Events Music Evernote Software Productivity Data Security Downtime How To Unified Threat Management Vendor Management Browser IBM Project Management Fraud clout services Backup and Disaster Recovery Emails Domains Chromebook Supercomputer Data Protection Workplace Tips Licensing Tracking Business Continuity Telephone Systems Lithium-ion battery Pain Points Regulation Administration Enterprise Resource Planning Value Comparison Human Resources Shortcut Microsoft Office Google Digital Inbound Marketing Reliable Computing Tip of the week Travel Alert Public Speaking Quick Tips Identity Theft Books Electricity Networking outsource cloud storage IT Administrator Statistics Tip of the Week Best Practices Government Work/Life Balance Windows10 G Suite Congratulations IT Services Monitors Windows 7 Paperless Office CCTV Microsoft Excel Big data Accountants Downloads Two-factor Authentication Rental Service Windows 10 Phishing Banking Risk Management Google Maps eWaste Monitoring Hosted Solution User Machine Learning MSP Privacy uptime Read communications Budget Data Recovery Web Server Vendor Mangement Windows 10 Conferencing Saving Time BDR Business Technology Competition Business Mobile Devices Google Docs Tech Terms Disaster Recovery PDF HTML Phone System Computer Repair Service Level Agreement Net Neutrality Mobile Device Management IT Consultant Software License Information Tech Term Avoiding Downtime Freedom of Information Help Desk Troubleshooting Search Storage Assessment Office 365 Communication Cybersecurity Saving Money Proxy Server Network Passwords Going Green Heating/Cooling Reading Computing Infrastructure Television Virtual Reality Data Management Managing Stress Mobile Technology Writing Upload Marketing Windows Server 2008 UTM Remote Computing Bluetooth Mouse Malware Customer Resource management Politics Devices Fleet Tracking Safety Smart Tech Network Security Password Microchip Analytics Network Congestion Distribution Taxes Trending Business Owner Redundancy Save Money Asset Tracking App Management Cleaning IT Support Automation Cabling Smartphones Cybercrime VoIP cloud computing Addiction Hosted Solutions WiFi

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150