Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Email Malware is the New Schrӧdinger’s Cat

Email Malware is the New Schrӧdinger’s Cat

There is a famous thought experiment devised by physicist Erwin Schrӧdinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrӧdinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security.

Schrӧdinger devised the thought experiment to combat the Copenhagen interpretation of quantum mechanics, which posited that, when unobserved, an object can exist in all states, and reverts to one if observed. In Schrӧdinger’s thought experiment, a cat was hypothetically shut in a box with a small enough amount of radioactive material to only have a 50/50 chance of being detected by a Geiger counter. If it was, a hammer would break open a container of poison, killing the cat. The premise was that, if the Copenhagen interpretation was correct, the cat could be assumed to be both alive and dead simultaneously until it was observed to be one or the other.

While Schrӧdinger’s cat was meant to discredit the Copenhagen interpretation, there is a modern version of this thought experiment that businesses should be concerned about. This version focuses on email, and the attachments that often come with it.

It is no secret that email is a very popular way for cybercriminals and other online mischief-makers to deliver their tools. If we treat emails the way that Schrodinger’s cat was approached, any email could feasibly contain a malicious threat, as well as no threats at all. The thing is, while determining if Schrӧdinger’s cat was alive or dead would be a relatively harmless activity (except potentially for the cat), finding out whether or not an email attachment is infected could cause quite a bit of damage to your system.

Fortunately, there are ways to protect yourself and your system against threats like email malware and phishing attempts. Antivirus and anti-malware scanners can catch many threats on their way in, and a spam blocker can help keep out many more.

If you’d rather know for sure that your inbox doesn’t contain any threats (or dead cats), let Decatur Computers Inc. suggest a few solutions. Give us a call at 217-475-0226.

Tech Term: HTML vs Plain Text
Disasters Come in All Sizes


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 17 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Privacy Best Practices Business Computing Hackers Network Security Cybersecurity IT Support Malware Backup Technology Email Small Business Managed IT Services User Tips Ransomware Google Software Android Business Management Data IT Management Cloud Productivity Smartphone Internet Windows 10 Phishing Communications Efficiency Update Hardware Innovation Cybercrime Business Gadgets Outsourced IT Data Recovery Data Security Artificial Intelligence Antivirus Cost Management Mobile Device Management Hard Drive Data Management Collaboration Disaster Recovery Saving Money Patch Management Scam Holiday Websites Laptop App BDR Data Protection Network Alert Computer Hacking Business Continuity IT Services Apps Project Management Access Control Office 365 SaaS Windows Money VPN Search Encryption Server Touchscreen Save Money Internet of Things Bitcoin Facebook Microsoft Maintenance Law Enforcement Remote Monitoring Passwords Social Engineering Start Menu Blockchain Microsoft Office Browser Data Backup Gmail Business Technology Word Vulnerabilities Digital Vendor Mangement Consultant Website Disaster Tip of the week Computing Infrastructure Managed IT Services Google Docs Virtual Reality Distributed Denial of Service Access Uninterrupted Power Supply Business Mangement Tech Term Unified Communications Networking Worker Budget Company Culture Redundancy Freedom of Information Spyware HTML Knowledge Cortana Printing Business Cards Software as a Service Tablet Cloud Computing Samsung Unified Threat Management Smartphones Identity Theft News Analytics History Automation Tech Terms Virtual Assistant Government How to Comparison Desktop Fake News IBM Google Drive Hosted Solutions Automobile Mobile Device Legal Downtime Virus Best Practice Data Breach Managed Service Provider Big Data Telephony Employer-Employee Relationship Google Maps Hard Drive Disposal Downloads Piracy Specifications YouTube Unsupported Software Applications Emergency Microsoft Excel VoIP email scam VoIp Software License Social Media Television Settings Mobile Security Vulnerability Cryptocurrency Audit Mobile Devices Mobility Operating System Mouse Administration Upgrades Two-factor Authentication DDoS Time Management Corporate Profile eWaste Information Technology Managed IT Multi-factor Authentication Password Running Cable Computer Care Robot WiFi Google Calendar Mobile Technology Solid State Drive Telephone Systems Device security Excel Spam Unified Threat Management Cabling IT Support Wireless Document Management Augmented Reality Outlook SharePoint Data loss Devices Office Compliance Users Office Tips Regulations CrashOverride Windows 10 Marketing

Latest Blog

If you’ve ever felt as though someone was watching what you were doing while you were working remotely, either at home or in public, there’s a chance that you were right. Without a private Internet connection, it is a simple matter for others to watch your processes and stea...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.