Fuse Networks Blog

Fuse Networks has been serving the Tukwila area since 2009, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Email Malware is the New Schrödinger’s Cat

Email Malware is the New Schrödinger’s Cat

There is a famous thought experiment devised by physicist Erwin Schrödinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrödinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security.

Schrödinger devised the thought experiment to combat the Copenhagen interpretation of quantum mechanics, which posited that, when unobserved, an object can exist in all states, and reverts to one if observed. In Schrödinger’s thought experiment, a cat was hypothetically shut in a box with a small enough amount of radioactive material to only have a 50/50 chance of being detected by a Geiger counter. If it was, a hammer would break open a container of poison, killing the cat. The premise was that, if the Copenhagen interpretation was correct, the cat could be assumed to be both alive and dead simultaneously until it was observed to be one or the other.

While Schrödinger’s cat was meant to discredit the Copenhagen interpretation, there is a modern version of this thought experiment that businesses should be concerned about. This version focuses on email, and the attachments that often come with it.

It is no secret that email is a very popular way for cybercriminals and other online mischief-makers to deliver their tools. If we treat emails the way that Schrodinger’s cat was approached, any email could feasibly contain a malicious threat, as well as no threats at all. The thing is, while determining if Schrödinger’s cat was alive or dead would be a relatively harmless activity (except potentially for the cat), finding out whether or not an email attachment is infected could cause quite a bit of damage to your system.

Fortunately, there are ways to protect yourself and your system against threats like email malware and phishing attempts. Antivirus and anti-malware scanners can catch many threats on their way in, and a spam blocker can help keep out many more.

If you’d rather know for sure that your inbox doesn’t contain any threats (or dead cats), let Fuse Networks suggest a few solutions. Give us a call at 855-GET-FUSE (438-3873).

Tech Term: HTML vs Plain Text
Disasters Come in All Sizes


Comments are not available for public users. Please login first to view / add comments.

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Tip of the Week Security Best Practices Technology Network Security Tech Term Privacy Android Hackers Cybersecurity Innovation User Tips Internet Cost Management Artificial Intelligence Business Computing Smartphone IT Support Cybercrime Google Business Data recovery Data Security Blockchain Backup Saving Money Malware Ransomware Email Business Technology Collaboration Small Business Mobile Device Social Engineering Hacking Update Gmail Productivity Computer Passwords Bitcoin Software Network Bandwidth Data Breach Office 365 Business Management Remote Monitoring Alert Scam Patch Management Maintenance Smartphones Internet of Things Applications Vulnerability Data loss Mobile Device Management Vulnerabilities Hardware Access Control Tech Terms Holiday Communications Data Backup Phishing Chromebook Device security Virtual Assistant Mouse Encryption Accountants Cleaning Company Culture Microsoft Excel Printing Backup and Disaster Recovery Virtualization Disaster Recovery Social Media IT Management Google Maps Managed IT services Training Computers Identity Theft Windows 10 Facebook Government VoIP Hard Drive Service Level Agreement Equifax Nanotechnology Laptop Cryptocurrency Legal Printer Cortana Communication Hard Drive Disposal Google Calendar SharePoint Going Green Startup Downtime Operating System Desktop Law Enforcement Paperless Office Disaster HTML email scam Document Management project management Download Microsoft Office Piracy WiFi Database Emergency VPN eWaste Google Docs Website Money Audit Upload Software License Antivirus Excel Tactics Data Protection Robot Trends Legislation App Spam Tip of the week Addiction Knowledge Information Technology Distributed Denial of Service Computer Care Gamification Apple Mobile Devices Screen Reader Mobile Security Two-factor Authentication Managed IT Services Comparison Automation Devices Computing Infrastructure Data Freedom of Information Emails Augmented Reality Conferencing Websites Downloads Specifications Machine Learning Business Continuity Compliance Networking Apps Mobile Technology News Bluetooth Multi-factor Authentication Budget Digital Gadgets Mobility Television Network Management Regulations Browser Business Cards Virtual Reality Fake News Unified Communications Wireless Headphones Employer-Employee Relationship Users Miscellaneous Upgrade Wireless Search Twitter Server Presentation Wi-Fi Cloud Microsoft Wireless Technology 5G Managed Service Provider IBM Hacker Marketing Multi-Factor Security IT Services Customer Relationship Management IP Address BDR Customer Service Mobile Office Domains Hard Drives Public Speaking Hosted Solutions Lithium-ion battery Windows 10 Tech Support Safety The Internet of Things Managing Stress Productivity Hiring/Firing Competition Big Data Content Fun