Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

Email Malware is the New Schrӧdinger’s Cat

Email Malware is the New Schrӧdinger’s Cat

There is a famous thought experiment devised by physicist Erwin Schrӧdinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrӧdinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security.

Schrӧdinger devised the thought experiment to combat the Copenhagen interpretation of quantum mechanics, which posited that, when unobserved, an object can exist in all states, and reverts to one if observed. In Schrӧdinger’s thought experiment, a cat was hypothetically shut in a box with a small enough amount of radioactive material to only have a 50/50 chance of being detected by a Geiger counter. If it was, a hammer would break open a container of poison, killing the cat. The premise was that, if the Copenhagen interpretation was correct, the cat could be assumed to be both alive and dead simultaneously until it was observed to be one or the other.

While Schrӧdinger’s cat was meant to discredit the Copenhagen interpretation, there is a modern version of this thought experiment that businesses should be concerned about. This version focuses on email, and the attachments that often come with it.

It is no secret that email is a very popular way for cybercriminals and other online mischief-makers to deliver their tools. If we treat emails the way that Schrodinger’s cat was approached, any email could feasibly contain a malicious threat, as well as no threats at all. The thing is, while determining if Schrӧdinger’s cat was alive or dead would be a relatively harmless activity (except potentially for the cat), finding out whether or not an email attachment is infected could cause quite a bit of damage to your system.

Fortunately, there are ways to protect yourself and your system against threats like email malware and phishing attempts. Antivirus and anti-malware scanners can catch many threats on their way in, and a spam blocker can help keep out many more.

If you’d rather know for sure that your inbox doesn’t contain any threats (or dead cats), let Tekie Geek suggest a few solutions. Give us a call at (347) 830-7322.

Tech Term: HTML vs Plain Text
Disasters Come in All Sizes
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, March 22, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Vulnerabilities Processor IT services New York City Hard Drive Banking IT support Staten Islans Professional Services Artificial Intelligence Server CryptoLocker Television Social DDoS Unified Threat Management IT consulting Congratulations Staten Island computer support History Bluetooth Malware Cloud computing Staten Island Gadgets Vendor Mangement Software as a Service Smartphone Office 365 IT consulting company Desktop IT support NYC Devices Start Menu Cabling Alert Business Continuity Gamification Big Data Twitter Hacking IT consulting firms Flash Search Username Administrator Google Calendar Virtualization Operating System Management Emails Network Management Money Computer Malfunction App Antivirus Wireless Headphones Solutions Printer Cache Administration Sports Gmail Multi-factor Authentication Corporate Profile Drones Accountants Legislation Content Filtering managed it services Tablet Data Tech Windows XP Wireless Technology Text Messaging Bookmark Tablets IT consulting NYC Equifax Network Security Collaboration Save Money Safety Wi-Fi Hosted Solution Company Culture Settings Mouse Wireless Laptop Hiring/Firing Windows 7 Microsoft 365 Navigation Computing Encryption Health IT Cloud Computing Physical Security Vulnerability Thank You Notifications Paperless Office Saving Time data recovery Social Engineering Employer-Employee Relationship Best Practices Work/Life Balance Uninterrupted Power Supply Digital Payment Mobile Device Training IBM Scalability WiFi Recovery Distributed Denial of Service data loss Technology Staten Island tech support Cost Management computer repair BDR Document Management Integration Tech Terms Experience Supercomputer Startup managed services Managed IT Services Term Data Breach Google Play Digital Microsoft Office SaaS Service Level Agreement Google Docs Analytics IT consulting Staten island Time Management computer services Laptops Tip of the Week Business Management Content computer services Staten Island Comparison BYOD Augmented Reality Smartphones PDF Proxy Server Security Cameras Windows 10 Outlook Deep Learning Access Music Voice over Internet Protocol Hackers VoIP Staten Island IT consulting Email Data Backup User Tip Backup and Disaster Recovery Excel Data Analysis Ransomware Automation Device security Microsoft Excel IT support New York City Hard Drive Disposal ransomware attacks PowerPoint IT services Staten Island Web Server Business Metrics computer repair Staten Island Electronic Medical Records end-user files malware worms Healthcare Cybercrime Black Market Tech Support Office Remote Monitoring Data Protection Touchscreen eWaste Education Reliable Computing Microchip Meetings Efficiency SSID tech support Downtime Printers Virtual Assistant Error Virtual Reality Remote Computing Staten Island IT support Telephone System today ’s organizations 3D Printing Apps Budget Audit Social Network Mobile Technology Telephone Systems IT Services Lithium-ion battery Bitcoin Networking Freedom of Information Business Growth Powerful Technology Solutions Streaming Media Hacks News Health Flexibility Evernote Upgrade Mobile Security Communication SharePoint Automobile Webcam Word Disaster Computers Motion Sickness managed IT services NYC Bring Your Own Device Apple Hack Browser Relocation Miscellaneous Internet computer support LiFi Help Desk Google Wallet Bandwidth Windows 8 Android Writing computer support firms Two-factor Authentication Cleaning Public Cloud CrashOverride Mobility Politics Productivity computer support NYC Computer Data Management Workers Going Green Fileless Malware End of Support Tech Term IT consulting firm Piracy Cooperation Robot Chromebook HTML Emergency tech support Staten Island Applications Trends iPhone Information Technology Holiday VoIP Microsoft Google Drive IT consulting Staten Island CCTV Conferencing Cloud Accidental deletion Modem Workplace Tips Spyware Spam IT support Staten Island Users Addiction Government Advertising Database Travel Securty malware Hard disk Windows 10 Lenovo Managed Service Provider Medical IT Unified Communications Multi-Factor Security Browsers Downloads File Sharing VPN Privacy Facebook Website IT Consultant Tip of the week Data Security Office Tips In Internet of Things Business Computing Disaster Recovery Blockchain Backup Mobile Device Management Patch Management Access Control Retail Managed IT Router Monitoring Regulations data recovery Staten Island Worker Unified Threat Management Security Documents Download Business IT support Legal Cybersecurity Proactive IT IT Support Botnet YouTube User Tips Screen Reader Directions Fake News managed services Staten Island Machine Learning Employer Employee Relationship Mobile Devices Business Cards email scam Hardware Solutions Knowledge Monitors Business Mangement Managing Stress Hardware tech support Staten Isalnd Google Update Language datto Productivity Domains Memory computer support Staten Island Outsourced IT Information IT services NYC Google Maps managed IT services staten island Displays Staffing Private Cloud Processors Tracking Small Business Best Practice Computing Infrastructure How To Taxes Samsung it support IT Management The Internet of Things Tactics Running Cable Redundancy staten island managed services Software License Hacker Telephone Virus Passwords Vendor Nanotechnology Maintenance Software Identity Theft Telephony Websites Customer Service Workstations Network Innovation Regulation Social Media Compliance Windows Society Firewall Network Congestion Managed Service Internet of Things Solid State Drive Cortana Printing Vendor Management G Suite communications IT support firms Quick Tips Business Technology Saving Money Virtual Desktop Password Cryptocurrency Computer Care Entertainment Phishing Customer Resource management Managed IT Services Visible Light Communication Specifications Hosted Solutions Project Management Data storage Rental Service Upload Law Enforcement Scam

Newsletter Sign Up