Fuse Networks Blog

Email Malware is the New Schrödinger’s Cat

Email Malware is the New Schrödinger’s Cat

There is a famous thought experiment devised by physicist Erwin Schrödinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrödinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security.

Schrödinger devised the thought experiment to combat the Copenhagen interpretation of quantum mechanics, which posited that, when unobserved, an object can exist in all states, and reverts to one if observed. In Schrödinger’s thought experiment, a cat was hypothetically shut in a box with a small enough amount of radioactive material to only have a 50/50 chance of being detected by a Geiger counter. If it was, a hammer would break open a container of poison, killing the cat. The premise was that, if the Copenhagen interpretation was correct, the cat could be assumed to be both alive and dead simultaneously until it was observed to be one or the other.

While Schrödinger’s cat was meant to discredit the Copenhagen interpretation, there is a modern version of this thought experiment that businesses should be concerned about. This version focuses on email, and the attachments that often come with it.

It is no secret that email is a very popular way for cybercriminals and other online mischief-makers to deliver their tools. If we treat emails the way that Schrodinger’s cat was approached, any email could feasibly contain a malicious threat, as well as no threats at all. The thing is, while determining if Schrödinger’s cat was alive or dead would be a relatively harmless activity (except potentially for the cat), finding out whether or not an email attachment is infected could cause quite a bit of damage to your system.

Fortunately, there are ways to protect yourself and your system against threats like email malware and phishing attempts. Antivirus and anti-malware scanners can catch many threats on their way in, and a spam blocker can help keep out many more.

If you’d rather know for sure that your inbox doesn’t contain any threats (or dead cats), let Fuse Networks suggest a few solutions. Give us a call at 855-GET-FUSE (438-3873).

Tech Term: HTML vs Plain Text
Disasters Come in All Sizes
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, December 11 2018

Captcha Image

Newsletter Sign Up

  • No-Spam Guarantee: We hate spam as much or more than you do and will NEVER rent, share or give your information away to anyone else. We will only use your information to communicate with you direct, and you can also remove yourself from our list at any time with a simple click..
  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Tech Term Best Practices Network Security Hackers Business Computing Data Backup Privacy Data recovery Computer Android Innovation Efficiency Productivity Collaboration Data Software IT Support Cybersecurity Internet User Tips Email Communication IT Services Malware Mobile Device Google Artificial Intelligence Hardware Business Technology Smartphone Cloud Communications Small Business Blockchain Browser Cybercrime Business Management Office 365 Backup Applications Cost Management Managed Service Mobile Device Management Access Control Data Security Two-factor Authentication Information Passwords Phishing BDR Maintenance Workplace Tips Saving Money Ransomware Business Cloud Computing Gmail Mobile Devices Automation Holiday Websites Printer Bitcoin Conferencing Tech Terms Document Management Network Apps Saving Time Bandwidth Data Breach Microsoft Office Alert Patch Management Google Maps Social Engineering Internet of Things Vulnerability Disaster Recovery Vendor Hacking Remote Monitoring Smartphones Managed IT services Facebook Social Media Scam Update Vulnerabilities Data loss Distributed Denial of Service Information Technology Spam Entertainment Computers Virtualization Hard Drive Sports Addiction Windows 10 Support Apple Gamification Legal Managed IT Services Mobile Security Tech Telephone Comparison Help Desk Equifax Service Level Agreement Cryptocurrency Laptop VoIP Processor Screen Reader Knowledge Google Calendar Computing Infrastructure Devices Freedom of Information Data Analysis Nanotechnology Downloads Hard Drive Disposal SharePoint Downtime Microsoft CIO Emails Hosted Solutions Law Enforcement Term Social Network Specifications Compliance Augmented Reality Vendor Management Startup Going Green Desktop Navigation Monitoring Networking Machine Learning News Mobile Technology Fileless Malware Operating System Travel Cortana Mobility email scam HTML User Tip project management Piracy Bookmark Bluetooth WiFi Digital Multi-factor Authentication Paperless Office Customer Resource management Television Business Cards Regulations Productivity Download Managed Service Provider Unified Communications Outsourced IT Management Business Continuity Google Docs Network Management Audit Fake News Virtual Reality Gadgets Budget Directions Username Disaster eWaste VPN Mouse Money Software License Browsers Wireless Headphones Content Virtual Assistant Device security Health IT Database Telephone System Big Data NCSAM Upload Printing Excel Antivirus Evernote Chromebook Computing Analytics Accountants Encryption Microsoft Excel Company Culture Users Cost Fuse Networks Emergency IT Management Robot Data Protection Website Cleaning BYOD Miscellaneous Tactics Electronic Medical Records IT Legislation Trends Government Tip of the week Healthcare Backup and Disaster Recovery Error Proxy Server Training Computer Care Identity Theft Microchip App Wireless Hard Drives Twitter Public Speaking Search Regulation Server Presentation Wi-Fi Quick Tips Windows 10 Lithium-ion battery Tech Support Wireless Technology 5G IBM Managing Stress Safety The Internet of Things Marketing Hacker Printers Multi-Factor Security Customer Relationship Management Hiring/Firing Competition IP Address Fun Customer Service Employer-Employee Relationship Upgrade Mobile Office Domains