With the help of computer analysts, specialists, and technicians, there have been things put in place to ensure your protection against cyber attacks. Open up the browsers on your computer, even the ones that you don’t use, and go to Mozilla’s Plugin checker. It will show you every plug-in installed on the browser and whether it’s up to date. Even though it’s the same company that makes Firefox, the Plugin checker works for Internet Explorer, Chrome, and other browsers. One of the most fundamental security setups is a firewall. Windows and Mac have decent firewalls built in, and many third-party security programs include them. A firewall keeps hackers from seeing your computer online when they’re searching for victims. Even if they know where your computer is, the firewall keeps them out. The first tool in your arsenal is Microsoft Baseline Security Analyzer. This free tool examines your Windows and Office settings for any potential problems, especially contamination.  It’s also a good idea to permanently delete any sensitive files that you no longer need. Frequent and odd pop-up windows are red flags. Pop-ups might prompt you to visit other websites to download antivirus or other software programs, which instead may install malware. Malicious pop-ups and spam may also secretly install spyware that could hijack your browser or steal your passwords and other personal information without your knowledge so it’s so important that you install some type of software that can protect you against these vicous attacks. Here’s another sign that a virus may have infected your computer and is multiplying: a drained battery. As the virus continues to multiply, it uses resources from your computer and creates more activity on your computer. As a result, your battery life is diminished. If your computer charges just fine and stays charged then you have nothing to worry about.