Fuse Networks Blog

Fuse Networks has been serving the Tukwila area since 2009, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Email Malware is the New Schrödinger’s Cat

Email Malware is the New Schrödinger’s Cat

There is a famous thought experiment devised by physicist Erwin Schrödinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrödinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security.

Schrödinger devised the thought experiment to combat the Copenhagen interpretation of quantum mechanics, which posited that, when unobserved, an object can exist in all states, and reverts to one if observed. In Schrödinger’s thought experiment, a cat was hypothetically shut in a box with a small enough amount of radioactive material to only have a 50/50 chance of being detected by a Geiger counter. If it was, a hammer would break open a container of poison, killing the cat. The premise was that, if the Copenhagen interpretation was correct, the cat could be assumed to be both alive and dead simultaneously until it was observed to be one or the other.

While Schrödinger’s cat was meant to discredit the Copenhagen interpretation, there is a modern version of this thought experiment that businesses should be concerned about. This version focuses on email, and the attachments that often come with it.

It is no secret that email is a very popular way for cybercriminals and other online mischief-makers to deliver their tools. If we treat emails the way that Schrodinger’s cat was approached, any email could feasibly contain a malicious threat, as well as no threats at all. The thing is, while determining if Schrödinger’s cat was alive or dead would be a relatively harmless activity (except potentially for the cat), finding out whether or not an email attachment is infected could cause quite a bit of damage to your system.

Fortunately, there are ways to protect yourself and your system against threats like email malware and phishing attempts. Antivirus and anti-malware scanners can catch many threats on their way in, and a spam blocker can help keep out many more.

If you’d rather know for sure that your inbox doesn’t contain any threats (or dead cats), let Fuse Networks suggest a few solutions. Give us a call at 855-GET-FUSE (438-3873).

Tech Term: HTML vs Plain Text
Disasters Come in All Sizes


Comments are not available for public users. Please login first to view / add comments.

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Tip of the Week Security Best Practices Privacy Cybersecurity Hackers Technology Business Computing Android Backup Network Security Email Data Security Small Business User Tips Malware Cost Management Ransomware IT Support Cybercrime Office 365 Remote Monitoring Saving Money Hacking Scam Social Engineering Update Hardware Gmail Mobile Device Management Bitcoin Blockchain Alert Innovation Internet of Things Maintenance Google Vulnerability Vulnerabilities Business Artificial Intelligence Access Control Collaboration Holiday Passwords Smartphone Communications Software Phishing Virtual Assistant Emergency Mouse Printing Website Company Culture Microsoft Excel Device security Mobile Device IT Management Google Maps Smartphones Government Identity Theft Facebook Disaster Recovery Hard Drive Productivity Knowledge Mobile Devices Legal Cryptocurrency Data recovery Hard Drive Disposal Google Calendar Two-factor Authentication Downtime Tech Terms SharePoint Laptop Augmented Reality Law Enforcement Tech Term email scam Document Management Apps Piracy Business Continuity project management Desktop Network WiFi HTML eWaste Google Docs Budget Gadgets Software License Money Data Breach Browser Audit Excel VPN Robot Patch Management Antivirus Tip of the week Data Protection Computer Care Information Technology Distributed Denial of Service Applications Managed IT Services Data loss Computing Infrastructure Comparison VoIP Internet Business Technology Freedom of Information Mobile Security Downloads Computer Networking Cortana Specifications Mobile Technology News Websites Digital Mobility Business Cards Disaster Television Microsoft Office Unified Communications Virtual Reality Fake News Multi-factor Authentication Regulations IT Services Customer Relationship Management IP Address Customer Service Mobile Office Domains Hard Drives Spam Public Speaking Hosted Solutions Lithium-ion battery Data Tech Support Safety Productivity The Internet of Things Hiring/Firing Competition Fun Big Data Employer-Employee Relationship Users Miscellaneous Upgrade Virtualization Social Media Wireless Search Windows 10 Server Wi-Fi Presentation Devices Cloud Microsoft Communication 5G Wireless Technology Compliance Managed Service Provider IBM Marketing Hacker