Why This Checklist Matters
Working remotely means your home network, personal devices, and public Wi-Fi become part of your company's attack surface. This checklist covers the most impactful security measures you can take in under an hour.
Network Security
1. Use a VPN for All Work Traffic
A VPN encrypts your internet connection, protecting data in transit. This is especially critical on public networks but also important at home — your ISP can see your traffic without a VPN.
Action: Install and enable a VPN. Turn on the kill switch. See our Best VPN for Remote Work guide.
2. Secure Your Home Router
Your home router is the gateway to your network. Default credentials are widely known and easily exploited.
Action: Change the default admin password, enable WPA3 encryption, update firmware, and disable WPS.
3. Use a Separate Network for Work
If your router supports it, create a separate Wi-Fi network (or VLAN) for work devices. This isolates your work traffic from smart home devices, gaming consoles, and family devices.
Action: Set up a guest network for non-work devices, or a dedicated work SSID.
Account Security
4. Enable 2FA on Every Account
Two-factor authentication blocks 99.9% of automated attacks. Prioritize email, cloud storage, and company accounts.
Action: Enable 2FA using an authenticator app (not SMS). See our 2FA guide.
5. Use a Password Manager
Unique, strong passwords for every account. No exceptions. No sticky notes.
Action: Set up Bitwarden (free) or 1Password (premium). Import existing passwords. See our Password Manager guide.
6. Review Connected Apps and Permissions
Third-party apps connected to your Google, Microsoft, or Slack accounts can become attack vectors if compromised.
Action: Audit connected apps in your Google/Microsoft account settings. Remove anything you don't recognize or no longer use.
Device Security
7. Enable Full-Disk Encryption
If your device is lost or stolen, encryption prevents anyone from accessing your data without your password.
Action: Enable BitLocker (Windows) or FileVault (macOS). Both are built-in and free.
8. Keep Everything Updated
Security patches fix known vulnerabilities. Delayed updates leave you exposed to attacks that already have public exploits.
Action: Enable automatic updates for your OS, browser, and all applications.
9. Enable the Firewall
Your OS has a built-in firewall that blocks unauthorized incoming connections. Make sure it's on.
Action: Verify your firewall is enabled in System Settings (macOS) or Windows Security.
10. Configure Remote Wipe
If your device is lost or stolen, remote wipe lets you erase all data remotely.
Action: Enable Find My Mac/iPhone (Apple) or Find My Device (Windows/Android).
Behavioral Security
11. Learn to Recognize Phishing
Phishing is the #1 attack vector. Remote workers are especially targeted with fake IT support requests and VPN login pages.
Action: Read our Phishing guide. When in doubt, verify through a separate channel.
12. Lock Your Screen
Set your device to lock automatically after 2 minutes of inactivity. This is especially important in shared spaces.
Action: Configure auto-lock in your display settings.
13. Use a Privacy Screen
In cafés, airports, and co-working spaces, people can see your screen. A privacy screen filter limits viewing angles.
Action: Purchase a privacy screen for your laptop. They cost $25-50 and are easily removable.
14. Secure Video Calls
Video calls can expose sensitive information through screen shares, background details, or unsecured connections.
Action: Use virtual backgrounds, blur your background, and mute when not speaking. Use your company's approved video platform.
15. Back Up Your Work
Regular backups protect against ransomware, hardware failure, and accidental deletion.
Action: Enable automated cloud backup for critical work files. Maintain a local encrypted backup for essential documents.
How We Verified This Checklist
This checklist is based on NIST Cybersecurity Framework 2.0, CISA telework guidance, and SANS Institute recommendations. All tools and settings were verified on Windows 11 and macOS Sequoia in April 2026.
Related Guides
10 Secure Browsing Habits Every Remote Worker Should Build (2026)
Simple daily habits that dramatically reduce your risk. HTTPS checking, URL verification, download safety, and more.
Sarah ChenSecure Job Searching: Protect Your Privacy While Looking for Work (2026)
Job searching exposes your personal data to recruiters, job boards, and potential scammers. How to search safely while protecting your identity.
Sarah ChenVPN for Accountants & CPAs: Protect Financial Client Data (2026)
Accountants handle the most sensitive financial data. VPN setup for tax season security, client portal access, and IRS compliance.
Sarah ChenWas this guide helpful?
Advertisement
Ready to Get Protected?
Take the next step in securing your remote work setup.
Sources & Citations
- 1NIST Cybersecurity Framework 2.0
- 2CISA: Telework Security Guidance
- 3SANS Institute: Securing the Remote Workforce