Updates and Patching: How to Stop Being an Easy Target
Nobody gets excited about software updates. They pop up at the worst times, they sometimes restart your computer mid-thought, and occasionally they change something you liked.
But unpatched software is one of the easiest ways attackers get in. Not through clever hacking—through known vulnerabilities that already have fixes available. Updates close those doors.
Why this matters
When a security vulnerability is discovered, the vendor releases a patch. Attackers immediately start scanning the internet for systems that haven’t applied it yet. The window between “patch available” and “attackers exploiting it” has shrunk to days, sometimes hours. Automatic updates mean you’re patched before you even hear about the problem.
What to do (20 minutes)
Operating systems
- Windows: Settings > Windows Update > Turn on automatic updates. Set active hours so restarts happen when you’re not working.
- macOS: System Settings > General > Software Update > Turn on automatic updates, including security responses.
These are the most important updates. Operating system vulnerabilities give attackers the deepest access.
Browsers
Chrome, Edge, Safari, and Firefox all update automatically by default. The catch: they only update when you close and reopen them. If you leave your browser open for weeks, you’re running old code.
Restart your browser once a week. That’s it. Your tabs will come back.
Business applications
- Microsoft 365 apps: Update automatically through the Microsoft 365 service. Make sure automatic updates are enabled in any Office app under File > Account.
- Other software: Most modern applications check for updates on launch. Say yes when they ask.
Routers and Wi-Fi equipment
This one is often forgotten. Your router is the gateway between your network and the internet, and many routers ship with firmware that never gets updated.
- Check your router’s admin page for firmware updates
- If your router is more than 5 years old, consider replacing it—older models often stop getting security patches
- Some newer routers (Ubiquiti, mesh systems like Eero) support automatic firmware updates
The Windows 10 reality
Windows 10 reached end of life in October 2025. Microsoft no longer provides free security updates. If you still have Windows 10 machines, you have a few options:
- Upgrade to Windows 11 if the hardware supports it
- Replace the hardware if it’s too old for Windows 11
- Pay for Extended Security Updates (available for businesses, but not cheap long-term)
- Don’t ignore it. An unpatched Windows machine on your network is an open door
Common mistakes
- “I’ll update this weekend.” You won’t. Turn on automatic updates and let the computer handle it.
- Disabling updates because one broke something once. That trades a small, fixable inconvenience for a large, unfixable risk. If an update causes a problem, deal with it then—don’t disable updates entirely.
- Forgetting about network equipment. Your router, access points, and switches have firmware too. They’re less visible but just as important.
- Running end-of-life software. When a product stops getting updates, it stops getting security fixes. That means every new vulnerability discovered is permanent. Make a plan to replace it.
Quick checklist
- Automatic OS updates enabled (Windows and/or macOS)
- Browsers restarted weekly to pick up updates
- Microsoft 365 / business apps set to auto-update
- Router/Wi-Fi firmware checked and updated
- End-of-life systems identified with a replacement plan
This post is part of the Minimum Security Posture series.
If you’d like a second set of eyes, I can run through this with you and point out the top risks in your setup—no pressure.