Fuse Networks Blog

Email Malware is the New Schrödinger’s Cat

Email Malware is the New Schrödinger’s Cat

There is a famous thought experiment devised by physicist Erwin Schrödinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrödinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security.

Schrödinger devised the thought experiment to combat the Copenhagen interpretation of quantum mechanics, which posited that, when unobserved, an object can exist in all states, and reverts to one if observed. In Schrödinger’s thought experiment, a cat was hypothetically shut in a box with a small enough amount of radioactive material to only have a 50/50 chance of being detected by a Geiger counter. If it was, a hammer would break open a container of poison, killing the cat. The premise was that, if the Copenhagen interpretation was correct, the cat could be assumed to be both alive and dead simultaneously until it was observed to be one or the other.

While Schrödinger’s cat was meant to discredit the Copenhagen interpretation, there is a modern version of this thought experiment that businesses should be concerned about. This version focuses on email, and the attachments that often come with it.

It is no secret that email is a very popular way for cybercriminals and other online mischief-makers to deliver their tools. If we treat emails the way that Schrodinger’s cat was approached, any email could feasibly contain a malicious threat, as well as no threats at all. The thing is, while determining if Schrödinger’s cat was alive or dead would be a relatively harmless activity (except potentially for the cat), finding out whether or not an email attachment is infected could cause quite a bit of damage to your system.

Fortunately, there are ways to protect yourself and your system against threats like email malware and phishing attempts. Antivirus and anti-malware scanners can catch many threats on their way in, and a spam blocker can help keep out many more.

If you’d rather know for sure that your inbox doesn’t contain any threats (or dead cats), let Fuse Networks suggest a few solutions. Give us a call at 855-GET-FUSE (438-3873).

Tech Term: HTML vs Plain Text
Disasters Come in All Sizes
 

Comments

Comments are not available for public users. Please login first to view / add comments.

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Tip of the Week Security Technology Tech Term Best Practices Network Security Privacy Hackers Data recovery Android Cybersecurity User Tips Computer Software Business Computing Data Backup Innovation Malware Collaboration Email IT Support Backup Cost Management Google Artificial Intelligence Internet Business Technology Smartphone Communication Data Communications Small Business Cybercrime IT Services Business Management Office 365 Maintenance Mobile Device Applications Saving Money Ransomware Business Hardware Mobile Device Management Access Control Data Security Two-factor Authentication Passwords Blockchain Patch Management BDR Social Engineering Internet of Things Vulnerability Hacking Remote Monitoring Managed Service Scam Update Vulnerabilities Data loss Smartphones Managed IT services Facebook Social Media Gmail Efficiency Productivity Information Holiday Conferencing Tech Terms Document Management Cloud Bitcoin Network Apps Phishing Vendor Bandwidth Data Breach Microsoft Office Browser Alert Chromebook Computing Upload Printing Excel Antivirus Fuse Networks Emergency IT Management Robot Data Protection Website Accountants Encryption Microsoft Excel Company Culture Disaster Recovery Miscellaneous Tactics Electronic Medical Records Google Maps Cleaning BYOD Backup and Disaster Recovery Error Legislation Trends Government Tip of the week App Training Computer Care Identity Theft Hard Drive Addiction Cloud Computing User Tip Distributed Denial of Service Information Technology Spam Computers Virtualization Managed IT Services Mobile Security Telephone Comparison Windows 10 Apple Gamification Legal Screen Reader Knowledge Google Calendar Computing Infrastructure Devices Mobile Devices Equifax Service Level Agreement Cryptocurrency Laptop VoIP Downloads Hard Drive Disposal Automation Freedom of Information Nanotechnology Websites Printer Social Network Specifications Health IT SharePoint Downtime Microsoft Emails Law Enforcement Monitoring Networking Compliance Augmented Reality Startup Going Green Desktop Cortana Mobility email scam HTML Machine Learning News Mobile Technology Operating System Travel Digital Multi-factor Authentication Paperless Office Customer Resource management Television project management Piracy Bluetooth WiFi Management Business Continuity Google Docs Business Cards Regulations Download Unified Communications Username Disaster eWaste VPN Network Management Audit Fake News Virtual Reality Gadgets Budget Virtual Assistant Device security Database Telephone System Mouse Sports Money Software License Wireless Headphones Content IP Address Big Data Fun Users Quick Tips Customer Service Employer-Employee Relationship Mobile Office Upgrade Domains Wireless Twitter Hard Drives Regulation Public Speaking Search Server Presentation Wi-Fi Printers Lithium-ion battery Windows 10 Hosted Solutions Wireless Technology 5G Analytics Tech Support Safety IBM Managing Stress Marketing Hacker The Internet of Things Productivity Managed Service Provider Proxy Server Multi-Factor Security Competition Customer Relationship Management Hiring/Firing