Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Email Malware is the New Schrӧdinger’s Cat

Email Malware is the New Schrӧdinger’s Cat

There is a famous thought experiment devised by physicist Erwin Schrӧdinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrӧdinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security.

Schrӧdinger devised the thought experiment to combat the Copenhagen interpretation of quantum mechanics, which posited that, when unobserved, an object can exist in all states, and reverts to one if observed. In Schrӧdinger’s thought experiment, a cat was hypothetically shut in a box with a small enough amount of radioactive material to only have a 50/50 chance of being detected by a Geiger counter. If it was, a hammer would break open a container of poison, killing the cat. The premise was that, if the Copenhagen interpretation was correct, the cat could be assumed to be both alive and dead simultaneously until it was observed to be one or the other.

While Schrӧdinger’s cat was meant to discredit the Copenhagen interpretation, there is a modern version of this thought experiment that businesses should be concerned about. This version focuses on email, and the attachments that often come with it.

It is no secret that email is a very popular way for cybercriminals and other online mischief-makers to deliver their tools. If we treat emails the way that Schrodinger’s cat was approached, any email could feasibly contain a malicious threat, as well as no threats at all. The thing is, while determining if Schrӧdinger’s cat was alive or dead would be a relatively harmless activity (except potentially for the cat), finding out whether or not an email attachment is infected could cause quite a bit of damage to your system.

Fortunately, there are ways to protect yourself and your system against threats like email malware and phishing attempts. Antivirus and anti-malware scanners can catch many threats on their way in, and a spam blocker can help keep out many more.

If you’d rather know for sure that your inbox doesn’t contain any threats (or dead cats), let Decatur Computers Inc. suggest a few solutions. Give us a call at 217-475-0226.

Tech Term: HTML vs Plain Text
Disasters Come in All Sizes
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, June 24 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Network Security Hackers IT Support Business Computing Cybersecurity Android Tech Term Internet Google Smartphone Business Management Malware User Tips Ransomware Software Backup Email Small Business Managed IT Services Windows 10 Data Recovery Artificial Intelligence Innovation Productivity Data Phishing Communications Cost Management Data Backup Efficiency Business Technology Cloud Cybercrime IT Management Business Outsourced IT Data Security Encryption Hard Drive Update Managed IT Services Saving Money Blockchain App Antivirus Hardware Mobile Device Management IT Services Collaboration Patch Management Gadgets Network Computer Access Control Mobile Device Office 365 Microsoft Data Breach Law Enforcement Passwords Start Menu Windows Applications Browser VPN Server Operating System Internet of Things Data Management Facebook Bitcoin Maintenance Disaster Recovery Remote Monitoring Social Engineering BDR Microsoft Office Data Protection Alert Gmail Spam Vulnerabilities Word Document Management Automation Digital Apps Bandwidth Holiday Scam Websites Laptop SaaS Smartphones Money Data loss Social Media Search Tech Terms Business Continuity Hacking Touchscreen Project Management Save Money Devices Google Drive Legal Emails Upgrades Virus Downtime Big Data Going Green Backup and Disaster Recovery Managed Service Provider Google Maps Compliance Telephony Hard Drive Disposal Downloads Bluetooth Piracy YouTube Specifications Microsoft Excel Download Running Cable Emergency Regulations WiFi VoIP email scam Solid State Drive VoIp Wireless Headphones Telephone Systems Software License Settings Television Cryptocurrency Upload Printer Cabling Vulnerability Mobile Security IT Support Audit Accountants Wireless Mobile Devices Mobility Cleaning Consultant Administration Mouse Trends Paperless Office DDoS Two-factor Authentication Training Time Management eWaste Corporate Profile Uninterrupted Power Supply Computers Managed IT Information Technology Password Gamification Database Worker Multi-factor Authentication Computer Care Equifax Robot Google Calendar Nanotechnology Mobile Technology Excel Tactics Cloud Computing Device security Samsung History Startup Unified Threat Management Unified Threat Management Outlook Augmented Reality SharePoint Vendor Mangement Tip of the week Content Addiction Disaster Website IBM Computing Infrastructure Google Docs Screen Reader Hosted Solutions Virtual Reality Automobile Access Distributed Denial of Service Business Mangement Machine Learning Unified Communications Legislation Best Practice Networking Budget Communication Employer-Employee Relationship Redundancy Company Culture Spyware Freedom of Information HTML Cortana Knowledge Printing Virtualization Unsupported Software Software as a Service Business Cards Tablet News Network Management Conferencing Identity Theft Analytics Virtual Assistant Government Apple How to Fake News Service Level Agreement Comparison Chromebook Desktop Windows 10 Twitter Marketing CrashOverride Managing Stress Multi-Factor Security BYOD Office Users Office Tips

Latest Blog

IT support is one of the most important parts of any modern business simply because it’s just not feasible to run a business without any form of technology at its core. For example, most businesses rely on email and other forms of communication, whereas stores might require ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.