Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

Email Malware is the New Schrӧdinger’s Cat

Email Malware is the New Schrӧdinger’s Cat

There is a famous thought experiment devised by physicist Erwin Schrӧdinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrӧdinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security.

Schrӧdinger devised the thought experiment to combat the Copenhagen interpretation of quantum mechanics, which posited that, when unobserved, an object can exist in all states, and reverts to one if observed. In Schrӧdinger’s thought experiment, a cat was hypothetically shut in a box with a small enough amount of radioactive material to only have a 50/50 chance of being detected by a Geiger counter. If it was, a hammer would break open a container of poison, killing the cat. The premise was that, if the Copenhagen interpretation was correct, the cat could be assumed to be both alive and dead simultaneously until it was observed to be one or the other.

While Schrӧdinger’s cat was meant to discredit the Copenhagen interpretation, there is a modern version of this thought experiment that businesses should be concerned about. This version focuses on email, and the attachments that often come with it.

It is no secret that email is a very popular way for cybercriminals and other online mischief-makers to deliver their tools. If we treat emails the way that Schrodinger’s cat was approached, any email could feasibly contain a malicious threat, as well as no threats at all. The thing is, while determining if Schrӧdinger’s cat was alive or dead would be a relatively harmless activity (except potentially for the cat), finding out whether or not an email attachment is infected could cause quite a bit of damage to your system.

Fortunately, there are ways to protect yourself and your system against threats like email malware and phishing attempts. Antivirus and anti-malware scanners can catch many threats on their way in, and a spam blocker can help keep out many more.

If you’d rather know for sure that your inbox doesn’t contain any threats (or dead cats), let Tekie Geek suggest a few solutions. Give us a call at (347) 830-7322.

Tech Term: HTML vs Plain Text
Disasters Come in All Sizes


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, June 21, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

email scam Budget Managing Stress Retail Antivirus Text Messaging Data Management malware worms Cleaning Websites Maintenance Vulnerability Corporate Profile Desktop Flexibility Disaster Outsourced IT Samsung Government Business Metrics Managed Service Provider IT consulting firm Data Breach Cloud Computing Digital Motion Sickness Administrator Settings Meetings Search Tip of the Week Best Practices Company Culture Experience IT Management Conferencing Physical Security Computing Infrastructure Politics Cloud Database Bitcoin Business Growth IT support firms Employer Employee Relationship Hackers Spyware Private Cloud communications Automation Redundancy Computer Care Software Data Business Mangement Language Document Management Network CrashOverride Managed IT Services Word How To Flash Laptops Paperless Office IT support NYC Hosted Solutions Equifax Email CCTV Web Server Streaming Media Hiring/Firing Laptop datto Holiday Start Menu Managed IT Services Printing Staten Island IT support Tactics Google Drive Google Maps Backup and Disaster Recovery Telephony Innovation ransomware attacks Thank You Android Passwords Smartphones Operating System Processors Chromebook Miscellaneous Accountants Remote Monitoring Fake News Blockchain Scalability tech support Staten Island Ransomware App Big Data Internet of Things Computer Malfunction Money Excel Mouse Uninterrupted Power Supply it support Server Efficiency malware Hard disk Augmented Reality Workstations Tech Term data recovery Google Calendar The Internet of Things SaaS managed services Staten Island Workers Specifications BYOD BDR Cryptocurrency Malware Hosted Solution Technology Network Congestion Banking Data storage Hard Drive Disposal Worker Mobile Technology Vulnerabilities Identity Theft Privacy Windows 10 Help Desk Devices Work/Life Balance Displays Content Filtering Office 365 Disaster Recovery History Hardware Solutions Business Computing Data Backup Service Level Agreement Twitter Phishing Startup Wireless Technology Mobile Security Domains G Suite Compliance Robot Patch Management Hacking IT support Staten Island Piracy YouTube Tablet Sports computer services Staten Island Mobile Device Management Hard Drive Tracking Virus Cost Management Health Applications Gamification Mobile Devices Freedom of Information Printer Windows XP Notifications Lithium-ion battery Wireless Headphones Business Management Wireless Data Security Administration Society HTML Workplace Tips Touchscreen Business Law Enforcement Staten Island tech support Unified Threat Management Hacker IT services NYC Bluetooth Cabling Powerful Technology Solutions PDF Recovery Telephone Systems Digital Payment Business Technology Knowledge Machine Learning Device security Emergency Advertising Multi-factor Authentication File Sharing News Productivity Social Memory end-user files Productivity Microsoft Office IT consulting firms Lenovo Windows 8 LiFi Music Mobile Device Distributed Denial of Service Downloads IT support Staten Islans Downtime Encryption Training Tablets managed IT services staten island Securty Virtual Desktop In Internet of Things tech support Staten Isalnd Save Money Staffing Google Wallet Documents Addiction Cloud computing Staten Island Remote Computing Staten Island IT consulting Artificial Intelligence Managed IT Accidental deletion Business Cards Best Practice Legislation IT consulting Staten Island tech support Supercomputer eWaste Tech Terms Comparison IT services Staten Island Rental Service Education Windows 10 Gadgets Smartphone Cortana Software as a Service Spam Unified Communications Virtual Reality Legal Upgrade Security 3D Printing Alert Monitors Data Protection End of Support Computers Tech Support Wi-Fi Networking Backup Hardware Apps Going Green data loss Nanotechnology Tip of the week Multi-Factor Security Bring Your Own Device Windows WiFi Scam computer services Travel Screen Reader Browser Mobility Cybercrime Running Cable Trends IT support New York City Office Analytics Cache Communication IT Support computer support firms today ’s organizations Google Docs Botnet computer support Staten Island IT Services Office Tips Drones Gmail managed it services Saving Money Customer Service Password Microsoft Black Market Software License Social Engineering IT Consultant Writing SharePoint Google IT consulting NYC Apple Access computer support computer support NYC Taxes Upload Relocation Vendor Management VoIP Webcam Regulations Cybersecurity VPN staten island managed services Small Business Quick Tips Staten Island computer support managed services Social Media Business Continuity Time Management computer repair Deep Learning Access Control Hacks Two-factor Authentication Facebook Emails Public Cloud computer repair Staten Island IT consulting Staten island Internet IT consulting Reliable Computing CryptoLocker managed IT services NYC Computer Safety VoIP data recovery Staten Island Microsoft Excel Solid State Drive Microchip Vendor Mangement IT services New York City Information Technology Visible Light Communication IT support Firewall Website Hack Download Congratulations Employer-Employee Relationship Collaboration Network Security Automobile Virtualization Bandwidth Computing Outlook Unified Threat Management Content Television Update Audit Project Management DDoS User Tips Network Management Proactive IT IT consulting company IBM Virtual Assistant

Newsletter Sign Up