Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Blog
  • Register

Prosper Solutions Blog

Email Malware is the New Schrӧdinger’s Cat

Email Malware is the New Schrӧdinger’s Cat

There is a famous thought experiment devised by physicist Erwin Schrӧdinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrӧdinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security.

Schrӧdinger devised the thought experiment to combat the Copenhagen interpretation of quantum mechanics, which posited that, when unobserved, an object can exist in all states, and reverts to one if observed. In Schrӧdinger’s thought experiment, a cat was hypothetically shut in a box with a small enough amount of radioactive material to only have a 50/50 chance of being detected by a Geiger counter. If it was, a hammer would break open a container of poison, killing the cat. The premise was that, if the Copenhagen interpretation was correct, the cat could be assumed to be both alive and dead simultaneously until it was observed to be one or the other.

While Schrӧdinger’s cat was meant to discredit the Copenhagen interpretation, there is a modern version of this thought experiment that businesses should be concerned about. This version focuses on email, and the attachments that often come with it.

It is no secret that email is a very popular way for cybercriminals and other online mischief-makers to deliver their tools. If we treat emails the way that Schrodinger’s cat was approached, any email could feasibly contain a malicious threat, as well as no threats at all. The thing is, while determining if Schrӧdinger’s cat was alive or dead would be a relatively harmless activity (except potentially for the cat), finding out whether or not an email attachment is infected could cause quite a bit of damage to your system.

Fortunately, there are ways to protect yourself and your system against threats like email malware and phishing attempts. Antivirus and anti-malware scanners can catch many threats on their way in, and a spam blocker can help keep out many more.

If you’d rather know for sure that your inbox doesn’t contain any threats (or dead cats), let Prosper Solutions suggest a few solutions. Give us a call at (617) 369-9977.

Backup and Recovery is Essential for Today's Busin...
Your Guide to Tightening Up Network Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, December 10, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

HIPAA Office 365 Apple Microchip IBM Risk Management Entrepreneur Experience SaaS Bata Backup Bring Your Own Device Legal Documents Money Blockchain Information Technology Users WannaCry Skype IT Plan Gaming Console VoIP Comparison Communication Mobile Device Web Server Piracy End of Support Virtual Reality Capital Document Management History Politics Micrsooft Education email scam Data Startup Assessment Devices Managed IT services Workers Backup Reading Mobile Devices Hosted Solution Information Phone System Redundancy Emergency Security Value Company Culture IT Services iPhone Co-Managed IT Training Disaster Recovery Wireless Headphones Wi-Fi Memory Mobile Technology Technology Fake News Collaboration Specifications Printing Managed IT Service Tech Terms Google Docs USB Flash Citrix Xenapp Automobile Gmail Mobile Payment Rental Service Search Hiring/Firing Vendor Management Vulnerabilities Download Emails Telephone Systems Nanotechnology Trending Tech Term Chrome Going Green Robot Business Cards Chromebook Processor Storage Mobile Device Management Botnet Productuvuty Domains WiFi Content Filtering Browsers Cabling outsource cloud computing Google Drive Customer Service Downtime Tech Support User Tips Computer Computing Infrastructure Vulnerability Unified Threat Management Websites Operating System Cybercrime Automation hardware Service Level Agreement A.I. Disaster User Error Proactive IT Social Media Business Mangement Hackers Tablet Sports Virtual Desktop IT Support Managed Service Solid State Drive Congratulations Data Protection Windows Saving Money Social Networking Securty Social PowerPoint Licensing Travel Printers Privacy Tip of the week Data Breach Facebook Tracking Computer Accessories Computers Business Technology the Internet of Things Intranet Bluetooth Audit Connected Devices Remote Monitoring IT service Retail Microsoft Office Processors Cost Management Administration Drones Website Sync Networking Phishing Meetings Cybersecurity Big data Current Events Streaming Media Small Business Software License switches Advertising PDF Black Market Compliance Google Calendar Entertainment Saving Time Finance Apps Public Cloud outsource cloud storage YouTube Spyware Windows XP Outlook Internet of Things Applications Quick Tips Analytics Law Enforcement Social Network User Samsung Electricity Migration G Suite Evernote Multi-factor Authentication Navigation Digital Signature Troubleshooting Relocation DDoS Fiber-Optic 3D Printing Hard Drive Disposal Inbound Marketing Displays Password UTM MSP Distributed Denial of Service Access Electronic Payment Legislation Cache cloud HTML Word File Sharing Bitcoin Upgrade Books Analytic BDR Best Practice Gadgets Efficiency CCTV Proxy Server Writing Backup and Disaster Recovery Keyboard Freedom of Information Corporate Profile Internet Recovery Distribution Environment Uninterrupted Power Supply LiFi Maintenance Gamification Hosted Solutions Save Money Fileless Malware Management IT Management Computer Repair Employer Employee Relationship Deep Learning Office Innovation Business Metrics Tech Workplace Tips Database Business Growth Permissions Motion Sickness Android Private Cloud CrashOverride Regulations Desktop Screen Reader Trends Data Loss Business Continuity Customer Relationship Management Fraud Supercomputer communications CIO Teamwork Windows 8 Directions Firewall Access Control Vendor Windows 10 Content Network Security Pain Points Mobile Security Device security Error VoIP Google Maps Telephone Router Lithium-ion battery Bandwidth cloud computing Marketing Data storage Government Television Software as a Service BYOD Technology Tips Customer Resource management Paperless Office App Employer-Employee Relationship Best Practices Digital Payment Mobile Computing Username Data Security Human Resources Windows 10 Wireless Holiday Equifax Multi-Factor Security Antivirus Music Electronic Medical Records How To Heating/Cooling Flexibility Server IP Address Project Management Miscellaneous In Internet of Things Printer Dark Web Ransomware IT Artificial Intelligence Hacking Augmented Reality SharePoint Network Cost Productivity Unified Communications Smart Tech Data Analysis Spam Smartphones Office Tips User Tip Telephony Identity Theft Time Management Patching News Social Engineering Windows Server 2008 Browser Asset Tracking Microsoft Software Cleaning eWaste Upgrades Health Statistics Malware Knowledge Hacker Machine Learning Language Scam Two-factor Authentication Business Computing Physical Security Hack Healthcare Telephone System Mouse Addiction Net Neutrality Business Touchscreen Banking Running Cable Upload Conferencing cyber security Competition Managing Stress Computing Remote Computing Vendor Mangement Reliable Computing cloud storage Smartphone Visible Light Communication Computer Malfunction Thank You Presentation Update Notifications Laptop Data Warehousing Application Network Management Unified Threat Management Tactics Business Owner Worker Outsourced IT Digital Virtual Assistant Virus Save Time Business Intelligence Google Wallet Encryption Hard Drive clout services Safety Bookmark Patch Management Staffing Business Management Messenger Mobility Managed IT Services Google Managed Service Provider Budget Accountants Text Messaging Network Congestion Virtualization Tip of the Week Windows10 Computer Care Start Menu Enterprise Resource Planning Help Desk Tablets Excel Data Management Shortcut VPN Wireless Technology Scalability Downloads Settings Work/Life Balance Taxes Term Twitter uptime Product Reviews Hard Drives Managed IT IT consulting Alert IT Support Read Health IT Data Backup Windows 7 Public Speaking Monitors Passwords Cortana Best Available IT Consultant Data Recovery Administrator Programming Hacks Fleet Tracking Webcam Avoiding Downtime Monitoring Productivity Regulation Society Email Microsoft Excel Consultation Cryptocurrency

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150