Free Cybersecurity Checklist for Work From Home Template

Cybersecurity Checklist for Work From Home


Prepared by: [Your Name]

Company: [Your Company Name]

Date: [Date]


1. Secure Your Devices

Task

Completed

Ensure all devices are password-protected with strong, unique passwords.

  • Yes

  • No

Use multi-factor authentication (MFA) wherever possible.

  • Yes

  • No

Keep operating systems and software up to date with the latest patches and security updates.

  • Yes

  • No

Install and enable reputable antivirus and anti-malware software.

  • Yes

  • No

Encrypt your hard drive to protect data in case of loss or theft.

  • Yes

  • No


2. Secure Your Network

Task

Completed

Use a secure Wi-Fi connection with WPA3/WPA2 encryption.

  • Yes

  • No

Change the default router username and password.

  • Yes

  • No

Enable a firewall on your router and devices.

  • Yes

  • No

Avoid using public Wi-Fi for work activities; use a VPN if public Wi-Fi is necessary.

  • Yes

  • No


3. Protect Confidential Data

Task

Completed

Store sensitive company data in approved, encrypted cloud services.

  • Yes

  • No

Avoid saving sensitive files locally on personal devices.

  • Yes

  • No

Disable automatic syncing of work data with personal accounts.

  • Yes

  • No

Regularly back up important work files to a secure location.

  • Yes

  • No


4. Email and Communication Safety

Task

Completed

Be cautious of phishing emails; check sender addresses and avoid clicking suspicious links.

  • Yes

  • No

Report any phishing attempts to the IT team.

  • Yes

  • No

Use company-approved communication tools (e.g., Slack, Teams, Zoom).

  • Yes

  • No

Avoid sharing sensitive data over unencrypted emails.

  • Yes

  • No


5. Physical Security

Task

Completed

Lock your devices when not in use, even at home.

  • Yes

  • No

Keep your workspace free from unauthorized access (e.g., roommates, family members).

  • Yes

  • No

Store physical work documents in a locked cabinet or drawer.

  • Yes

  • No

Shred any printed documents containing confidential information.

  • Yes

  • No


6. Password and Authentication Management

Task

Completed

Use a password manager to store and generate strong passwords.

  • Yes

  • No

Avoid reusing passwords across accounts.

  • Yes

  • No

Change passwords periodically and immediately after suspected compromise.

  • Yes

  • No


7. Video Conferencing Security

Task

Completed

Use meeting passwords and waiting rooms to secure video calls.

  • Yes

  • No

Avoid sharing meeting links publicly.

  • Yes

  • No

Turn off recording unless necessary and store recordings securely.

  • Yes

  • No

Be mindful of what’s visible in your background during video calls.

  • Yes

  • No


8. Use Company-Issued Devices

Task

Completed

Work only on company-provided devices if available.

  • Yes

  • No

Avoid using personal devices for work activities unless approved by IT.

  • Yes

  • No

Do not install unauthorized software on work devices.

  • Yes

  • No


9. Stay Vigilant for Cyber Threats

Task

Completed

Monitor unusual activity, such as unexpected pop-ups or system slowdowns.

  • Yes

  • No

Report any suspicious activities or potential breaches to the IT team immediately.

  • Yes

  • No

Stay updated with company policies regarding cybersecurity.

  • Yes

  • No


10. Maintain a Safe Work Environment

Task

Completed

Be aware of shoulder surfing (others viewing your screen).

  • Yes

  • No

Avoid printing sensitive documents unless necessary.

  • Yes

  • No

Regularly review and follow company cybersecurity policies.

  • Yes

  • No

Checklist Templates @ Template.net