Remote work is freedom. Work from a cafe, from home, from another country. But that freedom comes with a trade-off: the security your office IT team used to handle is now your responsibility.
In the first half of 2024, 47% of ransomware infections came through VPN appliances and 36% through remote desktop, accounting for about 83% combined (Japan National Police Agency report). Remote work environments are a primary attack vector — and IBM's 2025 Cost of a Data Breach Report found that breaches involving remote work factors still cost significantly more than average.
This article provides a practical security checklist for freelancers and individual remote workers who need to protect themselves. CISA's Telework Essentials Toolkit and NIST SP 800-46 offer enterprise-level guidance, but this checklist distills the essentials for individuals.
Risks Unique to Remote Work
Let me outline what makes remote work different from office work.
Public WiFi interception. Cafe and coworking WiFi may have weak encryption. Login credentials and traffic can be intercepted — Forgetting to turn on a VPN at a cafe is easy — and captive portals that log DNS queries are more common than most people think. See our public WiFi safety guide for details.
Home router vulnerabilities. Default passwords, outdated firmware — your home router can become an entry point for attackers.
Phishing attacks. Working alone means you cannot quickly ask a colleague "is this email real?" That isolation increases phishing success rates. See our phishing email response guide for what to do when you receive a suspicious message.
Device theft or loss. A laptop left at a cafe or stolen during travel. Without disk encryption, all your work data is exposed.
Shadow IT. Using unapproved cloud services because they are convenient. Business data ends up on platforms that do not meet security standards.
If you manage a small team, these risks multiply across every employee. Our SMB cybersecurity guide covers organization-level defenses.
Network Security
Use a VPN
If you work on public WiFi, a VPN is non-negotiable. It encrypts your traffic, preventing WiFi operators and ISPs from seeing what you do.
NordVPN can automatically activate when you connect to untrusted WiFi. Set it once, and every cafe WiFi connection is protected without thinking about it.
If you have a corporate VPN, use it for company resources. For personal browsing, use a personal VPN. Corporate VPNs provide access to internal networks, not privacy protection.
Harden Your Home Router
Your home router is an overlooked weak point.
- Change the admin password from the default (not admin/password)
- Update firmware to the latest version
- Use WPA3 (or at minimum WPA2) for WiFi encryption
- Disable remote management (no external access to router settings)
If you manage servers remotely, hardening SSH is equally important. See our SSH security hardening guide for best practices.
Strengthen Authentication
Enable 2FA on Every Account
Passwords alone are not enough. Enable two-factor authentication (2FA) on every important account — email, cloud storage, Slack, GitHub.
Prefer TOTP (Google Authenticator) or hardware keys (YubiKey) over SMS. SIM swap attacks that bypass SMS authentication are increasingly common — the FBI's IC3 tracked nearly $26 million in SIM swap losses in 2024 alone, and the UK saw a 1,055% surge in cases. If you want the full breakdown on migrating away from SMS 2FA, see our SMS 2FA risk guide.
Use a Password Manager
Generate unique random passwords for every service. You do not need to remember them — the password manager does. Reusing passwords across services is the single fastest way to get compromised; see our password reuse danger guide for why. If you need password management for a whole team, see our NordPass Business review, or start with our password management beginner's guide if you have never used one.
NordPass includes automatic breach scanning. It checks if any saved passwords appear in known breach databases. See our password breach check guide for details.
Device Security
Encrypt Your Storage
If your laptop is stolen and the disk is not encrypted, your data is fully exposed.
- Windows: Enable BitLocker (Pro edition and above)
- macOS: Enable FileVault
- Linux: Use LUKS encryption
Keep OS and Software Updated
Enable automatic updates. Browsers, operating systems, and development tools should always be on the latest version. Known vulnerabilities are the most efficient entry point for attackers — CISA's Known Exploited Vulnerabilities catalog shows how fast attackers weaponize public CVEs.
Set Up Screen Lock
Configure automatic screen lock when idle. Someone can steal data from an unlocked laptop in the few minutes you step away at a cafe.
- Windows: Win + L for manual lock. Shorten auto-lock timeout in settings
- macOS: Hot corners or Ctrl + Command + Q
Data Management
Store Work Data Safely
- Do not carry work data on USB drives
- Do not store work files in personal Google Drive or Dropbox (shadow IT)
- Encrypt sensitive files before sharing. NordLocker provides zero-knowledge encryption for secure file storage and sharing
Maintain Backups
If ransomware hits and you have no backup, your data is gone. Follow the 3-2-1 rule.
- 3 copies of your data
- 2 different storage media
- 1 copy offsite (cloud or physically separate location)
Daily Habits
Spot Phishing
The Anti-Phishing Working Group (APWG) recorded 3.8 million phishing attacks in 2024. Here is how to catch them:
- Check the sender's email address down to the domain
- Be suspicious of "urgent action required" messages
- Hover over links to verify the destination before clicking
- When in doubt, navigate to the official site directly
Prevent Shoulder Surfing
In coworking spaces and cafes, people can see your screen.
- Apply a privacy filter to your monitor
- Be careful about what is visible during screen shares in video calls
- Disable notification previews (no email snippets in popups)
FAQ
Do I really need a VPN if I only work from home?
Even at home, your ISP can see every site you visit. A VPN encrypts that traffic. If you ever work from a cafe, hotel, or airport, a VPN becomes essential. It is simpler to keep it always on than to remember to toggle it.
Is free VPN software safe for remote work?
Most free VPNs monetize by logging and selling your browsing data — the exact thing you are trying to prevent. Some inject ads or have been caught bundling malware. For work, use a reputable paid service. See our free VPN dangers guide for details.
What is the biggest security risk for freelancers?
Password reuse across services. If one service gets breached, attackers try those credentials everywhere (credential stuffing). A password manager eliminates this risk entirely.
Should I use my personal laptop for client work?
Ideally, no. Dedicate a device (or at least a separate user account) to client work. This reduces exposure if your personal browsing leads to malware. At minimum, enable disk encryption and keep personal and work files strictly separated.
How do I secure my home WiFi network?
Change the default admin password, update firmware, enable WPA3 (or WPA2 minimum), and disable remote management. Consider hiding your SSID and setting up a guest network for IoT devices.
Is two-factor authentication really necessary for every account?
Yes, for every account that matters. Email, cloud storage, source code repos, banking, social media — if an attacker takes over any of these, the damage cascades. TOTP apps or hardware keys are far more secure than SMS codes.
What should I do if my work laptop is stolen?
Immediately change passwords for all accounts accessed from that device. If disk encryption (BitLocker/FileVault/LUKS) was enabled, your data is protected. Contact clients if their data may be affected. File a police report and enable remote wipe if your OS supports it.
How often should I back up my work data?
Daily for active projects. Automated cloud backup (encrypted) plus a local backup covers the 3-2-1 rule. Test a restore at least once a quarter — backups you cannot restore are useless.
Wrapping Up
| Category | Minimum actions |
|---|---|
| Network | Use NordVPN on public WiFi. Change home router password |
| Authentication | 2FA on all accounts. Use a password manager |
| Device | Encrypt storage. Auto-update OS. Auto screen lock |
| Data | Backups (3-2-1 rule). No work data on USB drives |
| Habits | Develop phishing awareness. Use a privacy filter |
Remote work security does not need to be perfect. Just running through the minimums in the table above makes you a "difficult target" for attackers. Attackers go after easy targets. Getting the basics right dramatically reduces your risk.
The world's leading VPN — fast, secure, and easy to use
- 6,400+ servers across 111 countries
- NordLynx protocol (WireGuard-based)
- Threat Protection Pro (ads & malware blocking)
Related articles: