THE CONSEQUENCES OF UTILIZING PICO ON SOFTWARE UPDATES AND SECURITY PATCHES