Free Cybersecurity Checklist for Work From Home Template
Cybersecurity Checklist for Work From Home
Prepared by: [Your Name]
Company: [Your Company Name]
Date: [Date]
1. Secure Your Devices
Task |
Completed |
---|---|
Ensure all devices are password-protected with strong, unique passwords. |
|
Use multi-factor authentication (MFA) wherever possible. |
|
Keep operating systems and software up to date with the latest patches and security updates. |
|
Install and enable reputable antivirus and anti-malware software. |
|
Encrypt your hard drive to protect data in case of loss or theft. |
|
2. Secure Your Network
Task |
Completed |
---|---|
Use a secure Wi-Fi connection with WPA3/WPA2 encryption. |
|
Change the default router username and password. |
|
Enable a firewall on your router and devices. |
|
Avoid using public Wi-Fi for work activities; use a VPN if public Wi-Fi is necessary. |
|
3. Protect Confidential Data
Task |
Completed |
---|---|
Store sensitive company data in approved, encrypted cloud services. |
|
Avoid saving sensitive files locally on personal devices. |
|
Disable automatic syncing of work data with personal accounts. |
|
Regularly back up important work files to a secure location. |
|
4. Email and Communication Safety
Task |
Completed |
---|---|
Be cautious of phishing emails; check sender addresses and avoid clicking suspicious links. |
|
Report any phishing attempts to the IT team. |
|
Use company-approved communication tools (e.g., Slack, Teams, Zoom). |
|
Avoid sharing sensitive data over unencrypted emails. |
|
5. Physical Security
Task |
Completed |
---|---|
Lock your devices when not in use, even at home. |
|
Keep your workspace free from unauthorized access (e.g., roommates, family members). |
|
Store physical work documents in a locked cabinet or drawer. |
|
Shred any printed documents containing confidential information. |
|
6. Password and Authentication Management
Task |
Completed |
---|---|
Use a password manager to store and generate strong passwords. |
|
Avoid reusing passwords across accounts. |
|
Change passwords periodically and immediately after suspected compromise. |
|
7. Video Conferencing Security
Task |
Completed |
---|---|
Use meeting passwords and waiting rooms to secure video calls. |
|
Avoid sharing meeting links publicly. |
|
Turn off recording unless necessary and store recordings securely. |
|
Be mindful of what’s visible in your background during video calls. |
|
8. Use Company-Issued Devices
Task |
Completed |
---|---|
Work only on company-provided devices if available. |
|
Avoid using personal devices for work activities unless approved by IT. |
|
Do not install unauthorized software on work devices. |
|
9. Stay Vigilant for Cyber Threats
Task |
Completed |
---|---|
Monitor unusual activity, such as unexpected pop-ups or system slowdowns. |
|
Report any suspicious activities or potential breaches to the IT team immediately. |
|
Stay updated with company policies regarding cybersecurity. |
|
10. Maintain a Safe Work Environment
Task |
Completed |
---|---|
Be aware of shoulder surfing (others viewing your screen). |
|
Avoid printing sensitive documents unless necessary. |
|
Regularly review and follow company cybersecurity policies. |
|