Cybersecurity Checklist for Work From Home
Prepared by: [Your Name]
Company: [Your Company Name]
Date: [Date]
1. Secure Your Devices
Task | Completed |
|---|
Ensure all devices are password-protected with strong, unique passwords. | |
Use multi-factor authentication (MFA) wherever possible. | |
Keep operating systems and software up to date with the latest patches and security updates. | |
Install and enable reputable antivirus and anti-malware software. | |
Encrypt your hard drive to protect data in case of loss or theft. | |
2. Secure Your Network
Task | Completed |
|---|
Use a secure Wi-Fi connection with WPA3/WPA2 encryption. | |
Change the default router username and password. | |
Enable a firewall on your router and devices. | |
Avoid using public Wi-Fi for work activities; use a VPN if public Wi-Fi is necessary. | |
3. Protect Confidential Data
Task | Completed |
|---|
Store sensitive company data in approved, encrypted cloud services. | |
Avoid saving sensitive files locally on personal devices. | |
Disable automatic syncing of work data with personal accounts. | |
Regularly back up important work files to a secure location. | |
4. Email and Communication Safety
Task | Completed |
|---|
Be cautious of phishing emails; check sender addresses and avoid clicking suspicious links. | |
Report any phishing attempts to the IT team. | |
Use company-approved communication tools (e.g., Slack, Teams, Zoom). | |
Avoid sharing sensitive data over unencrypted emails. | |
5. Physical Security
Task | Completed |
|---|
Lock your devices when not in use, even at home. | |
Keep your workspace free from unauthorized access (e.g., roommates, family members). | |
Store physical work documents in a locked cabinet or drawer. | |
Shred any printed documents containing confidential information. | |
6. Password and Authentication Management
Task | Completed |
|---|
Use a password manager to store and generate strong passwords. | |
Avoid reusing passwords across accounts. | |
Change passwords periodically and immediately after suspected compromise. | |
7. Video Conferencing Security
Task | Completed |
|---|
Use meeting passwords and waiting rooms to secure video calls. | |
Avoid sharing meeting links publicly. | |
Turn off recording unless necessary and store recordings securely. | |
Be mindful of what’s visible in your background during video calls. | |
8. Use Company-Issued Devices
Task | Completed |
|---|
Work only on company-provided devices if available. | |
Avoid using personal devices for work activities unless approved by IT. | |
Do not install unauthorized software on work devices. | |
9. Stay Vigilant for Cyber Threats
Task | Completed |
|---|
Monitor unusual activity, such as unexpected pop-ups or system slowdowns. | |
Report any suspicious activities or potential breaches to the IT team immediately. | |
Stay updated with company policies regarding cybersecurity. | |
10. Maintain a Safe Work Environment
Task | Completed |
|---|
Be aware of shoulder surfing (others viewing your screen). | |
Avoid printing sensitive documents unless necessary. | |
Regularly review and follow company cybersecurity policies. | |
Checklist Templates @ Template.net