Digital Security
The extensive IT shutdowns caused by a faulty CrowdStrike upgrade have highlighted the significance of software updates. Here’s why you should welcome them.
19 Jul 2024
 •Â
,
3 min. read

Within the field of computing, few occurrences are as disturbing as encountering an azure screen of demise (ASOD) on your Windows system. The foreboding screen with its enigmatic error messages invokes a combination of concern and annoyance even among numerous experienced technology users.
The stakes are escalated when an ASOD occurs on a broad scale; in other words, if it is part of a broader incident that ‘disables’ countless devices worldwide and even disrupts some of the most vital services we rely on daily. This scenario is currently unfolding with widespread disruptions attributed to a defective CrowdStrike upgrade for Windows devices.
Gaining Insight into ASODs
To begin with, what exactly is an ASOD? It is a fatal system mistake that compels Windows to close down to prevent further harm. It can be triggered by various factors such as defective hardware components, outdated drivers causing conflicts within the operating system, severe errors within the system or critical applications (or even their upgrades), and malware.
When such errors are detected, Windows halts operations, shows the ASOD with a stop code and possibly a QR code, and initiates a restart to prevent damage to your system. While an ASOD indicates that something has significantly gone wrong with your machine, it is advisable not to panic but instead refer to this Microsoft guidance. In most cases, the issue is rectifiable, and you can take measures to help prevent it in the future.
Moreover, an ASOD can also function as a reminder of the importance of keeping your software and devices up-to-date. Indeed, comprehending the significance of software upgrades and taking appropriate action is essential for fortifying your defenses against constantly evolving threats.
The Significance of Software Upgrades
Each application necessitates updates, as does the foundational operating system and firmware (a specialized type of software that interfaces with device hardware). Though these upgrades can be a potential productivity inconvenience or at the very least a mild annoyance for many of us, they are indispensable for numerous reasons.
Critically, they aid in bolstering your (and your organization’s) security. No software is flawless and is frequently discovered to contain flaws, including software vulnerabilities that could be exploited by cybercriminals. It is also widely acknowledged that unpatched vulnerabilities are responsible for a significant portion of data breaches.
Hence, patches, distributed by software manufacturers at set intervals or as required, are essential. Last year, more than 29,000 vulnerabilities were reported, an increase from approximately 25,000 reported the previous year.
Aside from aiding in safeguarding you against threats that target your personal and financial information, software upgrades play a crucial role in preserving the general well-being of your device. They extend beyond security patches and also tackle an array of issues, bugs, and glitches, introduce new features and functionalities, enhance your device’s battery life, and boost system performance.
The Hazards of Software Upgrades
Above all, the benefits far outweigh any potential risks – by a considerable margin. Nevertheless, software upgrades may bring about new challenges. For instance, they might occasionally lead to conflicts or unforeseen interactions with existing applications or system software, or they may not always integrate well with older hardware components. They could also impact system stability, potentially resulting in errors and ultimately even prompting rollbacks that provide a safety measure if a recent upgrade has caused issues.
Ironically, updates themselves may introduce new security vulnerabilities that could be exploited by attackers before being patched in subsequent updates. Additionally, as ESET research has consistently demonstrated (here is just one recent example), sophisticated attackers may manipulate the update mechanism itself to disseminate counterfeit updates.
Closing Reflections
In this era, software governs our lives, and ensuring your software stack is up-to-date is among the most effective strategies for safeguarding your digital existence. When doing so, remember to obtain updates from official sources, rather than by clicking on email links or ads. And the next time you feel tempted to overlook or postpone installing software upgrades, recall why they are so vital in the first place.

