Remote work is freedom. Work from a cafe, from home, from another country. But that freedom comes with a trade-off: the security your office IT team used to handle is now your responsibility.
In 2024, 55% of ransomware infections came through VPN appliances and 31% through remote desktop (Japan National Police Agency report). Remote work environments are a primary attack vector.
This article provides a practical security checklist for freelancers and individual remote workers who need to protect themselves.
Risks Unique to Remote Work
Let me outline what makes remote work different from office work.
Public WiFi interception. Cafe and coworking WiFi may have weak encryption. Login credentials and traffic can be intercepted. See our public WiFi safety guide for details.
Home router vulnerabilities. Default passwords, outdated firmware — your home router can become an entry point for attackers.
Phishing attacks. Working alone means you cannot quickly ask a colleague "is this email real?" That isolation increases phishing success rates.
Device theft or loss. A laptop left at a cafe or stolen during travel. Without disk encryption, all your work data is exposed.
Shadow IT. Using unapproved cloud services because they are convenient. Business data ends up on platforms that do not meet security standards.
Network Security
Use a VPN
If you work on public WiFi, a VPN is non-negotiable. It encrypts your traffic, preventing WiFi operators and ISPs from seeing what you do.
NordVPN can automatically activate when you connect to untrusted WiFi. Set it once, and every cafe WiFi connection is protected without thinking about it.
If you have a corporate VPN, use it for company resources. For personal browsing, use a personal VPN. Corporate VPNs provide access to internal networks, not privacy protection.
Harden Your Home Router
Your home router is an overlooked weak point.
- Change the admin password from the default (not admin/password)
- Update firmware to the latest version
- Use WPA3 (or at minimum WPA2) for WiFi encryption
- Disable remote management (no external access to router settings)
Strengthen Authentication
Enable 2FA on Every Account
Passwords alone are not enough. Enable two-factor authentication (2FA) on every important account — email, cloud storage, Slack, GitHub.
Prefer TOTP (Google Authenticator) or hardware keys (YubiKey) over SMS. SIM swap attacks that bypass SMS authentication are increasingly common.
Use a Password Manager
Generate unique random passwords for every service. You do not need to remember them — the password manager does.
NordPass includes automatic breach scanning. It checks if any saved passwords appear in known breach databases. See our password breach check guide for details.
Device Security
Encrypt Your Storage
If your laptop is stolen and the disk is not encrypted, your data is fully exposed.
- Windows: Enable BitLocker (Pro edition and above)
- macOS: Enable FileVault
- Linux: Use LUKS encryption
Keep OS and Software Updated
Enable automatic updates. Browsers, operating systems, and development tools should always be on the latest version. Known vulnerabilities are the most efficient entry point for attackers.
Set Up Screen Lock
Configure automatic screen lock when idle. Someone can steal data from an unlocked laptop in the few minutes you step away at a cafe.
- Windows: Win + L for manual lock. Shorten auto-lock timeout in settings
- macOS: Hot corners or Ctrl + Command + Q
Data Management
Store Work Data Safely
- Do not carry work data on USB drives
- Do not store work files in personal Google Drive or Dropbox (shadow IT)
- Encrypt sensitive files before sharing. NordLocker provides zero-knowledge encryption for secure file storage and sharing
Maintain Backups
If ransomware hits and you have no backup, your data is gone. Follow the 3-2-1 rule.
- 3 copies of your data
- 2 different storage media
- 1 copy offsite (cloud or physically separate location)
Daily Habits
Spot Phishing
- Check the sender's email address down to the domain
- Be suspicious of "urgent action required" messages
- Hover over links to verify the destination before clicking
- When in doubt, navigate to the official site directly
Prevent Shoulder Surfing
In coworking spaces and cafes, people can see your screen.
- Apply a privacy filter to your monitor
- Be careful about what is visible during screen shares in video calls
- Disable notification previews (no email snippets in popups)
Wrapping Up
| Category | Minimum actions |
|---|---|
| Network | Use NordVPN on public WiFi. Change home router password |
| Authentication | 2FA on all accounts. Use a password manager |
| Device | Encrypt storage. Auto-update OS. Auto screen lock |
| Data | Backups (3-2-1 rule). No work data on USB drives |
| Habits | Develop phishing awareness. Use a privacy filter |
Remote work security does not need to be perfect. Just running through the minimums in the table above makes you a "difficult target" for attackers. Attackers go after easy targets. Getting the basics right dramatically reduces your risk.