OS Updates & Patching Basics

See why skipping updates opens real attack paths.

What You'll Learn

Training Steps

  1. Introduction

    Welcome to Meridian Analytics! You are Alice, a data analyst responsible for processing client reports and financial data. Today, you will learn why operating system updates are critical for security - and what can happen when they are ignored.

  2. Starting the Workday

    It's Monday morning at Meridian Analytics. Alice settles into her home office and opens her email. A message from her manager David is at the top of the inbox - the Q4 quarterly report is due by Friday, and the client presentation needs to be finalized before tomorrow's meeting.

  3. Working on the Presentation

    With the deadline looming, Alice opens her file manager to work on the client presentation. She needs to review the slides and make sure the data analysis sections are complete before tomorrow's meeting.

  4. Update Notification

    While reviewing the presentation slides, a notification appears in the corner of Alice's screen: 'Critical Security Update Available - Restart Required' The update has been pending for several days. Alice knows she should install it, but the client presentation is due tomorrow and the quarterly report by Friday.

  5. Back to Work

    Alice dismisses the notification, telling herself she'll install the update after the report is finished. She returns to the presentation, focused on meeting the deadline. The update notification fades from her mind as she dives into the slides. Three days pass. Alice has been busy with meetings, client calls, and more reports. The update notification has appeared twice more, and each time she clicked 'Remind me later.' Meanwhile, news reports reveal that a major vulnerability in operating systems is being actively exploited by attackers worldwide.

  6. Lunch Break Browsing

    It's Thursday. After a productive morning working on the presentation, Alice takes a break to catch up on some reading. A colleague has shared an article about market trends that could be useful for the quarterly report. She opens the email and clicks the link without a second thought.

  7. The Attack Begins

    The article page begins to load, but something is wrong. Alice's computer suddenly freezes. The screen flickers, and a dreaded blue screen appears with an error message. The news website had been compromised with a malicious script that exploited the exact vulnerability the pending security update was meant to fix.

  8. Restarting the System

    Alice restarts her computer, hoping it was just a glitch. As the system boots up, she notices something is wrong - the desktop background has changed, and several of her files have strange extensions.

  9. Checking the Files

    Something feels wrong. Alice rushes to check her important work documents - the quarterly report she's been working on for weeks.

  10. The Ransom Note

    Alice's presentation is gone - replaced by a chilling ransom demand. Every file on her computer has been encrypted. The attackers are demanding 0.5 Bitcoin to unlock her files. The quarterly report, the client presentation, months of financial analysis - all held hostage.