Like any good computer Samaritan I do all I can to avoid having my computer taken over and used in denial of service attack or to send volumes of spam messages on behalf of those malicious people who benefit from both of these activities.
I think I am well protected. My corporate virus scanner catches e-mail threats such as executable files sent via e-mail that could cause damage if clicked on. I have an anti-spyware program that updates regularly and scans constantly. I occasionally run anti-adware programs to stop malicious programs from monitoring websites I visit and possibly steal passwords I type in.
I also subscribe to the Microsoft Windows Update program and every night my computer checks for updates and installs them automatically.
In addition I scan through volumes of e-mail, the majority of which is spam and malicious content designed to steal passwords and/or my identity.
If all this wasn’t enough of a productivity drain, I have noticed a new and more annoying problem that is zapping corporate productivity. Often when I come to work in the morning my computer has automatically rebooted after a Windows Update of high priority was installed on my computer.
The problem is that I often leave documents open on my desktop with the intent of getting to them later. Perhaps later in the day or the next day. I don’t always keep a record of these documents and if the thing I am working on is not critical I don’t even save it as my office doesn’t lose power often enough for me to worry about it.
Lately the Microsoft Windows Update program has taken control of my computer and rebooted it at least a few time in the past few months. TMCnet’s webmaster Robert Hashemian has also mentioned to me the same thing has happened to him.
This leads one to wonder how much productivity damage is really being done by malicious programs and the people who invent and intentionally propagate them. The soft loss of productivity — thousands or hundreds of thousands of people losing their work is possibly as bad as getting a virus in the first place. One hopes stories like this help the powers that be build better operating systems that aren’t as vulnerable to attack in the first place.
When trying to ascertain the true value of malicious programs one needs to make sure to count the soft losses as well as the more easily trackable ones.