The Essential Checklist for Securing Company Laptops at Home
At home, security incidents don’t look like dramatic movie hacks. They look like stepping away from your laptop during a delivery, or leaving it unlocked while you grab something from another room.
Those ordinary moments, repeated over time, are how work devices end up exposed.
A remote work security checklist focuses on simple, practical controls that hold up in real life. Put it in place once, make it routine, and you’ll prevent the kinds of issues that hurt most because they were entirely avoidable.
Why Home Is a Different Security Environment
A work laptop doesn’t magically become “less secure” at home. But the environment around it does.
In the office, there are built-in boundaries: fewer shared users, fewer casual touchpoints, and more predictable networks. At home, that same laptop is suddenly operating in a space designed for convenience, not control.
For starters, physical exposure goes up.
At home, devices move from room to room, sit on tables and countertops, and are left unattended for short stretches throughout the day.
That’s why a remote work security checklist must treat physical security as part of cyber security.
In its training on device safety, CISA stresses the basics: keep devices secured, limit access, and lock them when you’re not using them. Those simple habits matter more at home because there’s no “office culture” quietly enforcing them for you.
Second, home is where work and personal life collide, and that creates messy, very human risks.
The NI Cyber Security Centre is blunt about it: don’t let other people use your work device, and don’t treat it like the family laptop.
Third, the network is different.
Home Wi-Fi often starts with default settings, old router firmware, or passwords that have been shared with everyone who’s ever visited.
CISA’s guidance on connecting a new computer to the internet offers the baseline steps many people skip at home: secure your router, enable the firewall, use anti-virus, and remove unnecessary software and default features.
Finally, remote access raises the stakes for identity. In its remote workforce security guidance, Microsoft’s best practices frames remote security around a Zero Trust approach and emphasizes that access should be strongly authenticated and checked for anomalies before it’s granted.
The Remote Work Security Checklist
Use this remote work security checklist as your “minimum standard” for company laptops at home. It’s designed to be practical, repeatable, and easy to enforce without turning everyone into part-time IT employees.
Lock the Screen Every Time You Step Away
Set a short auto-lock timer and get into the habit of locking manually, even at home.
Store the Laptop Like it’s Valuable
Assume that “out of sight” is safer than “out of the way.” When you’re finished, store your device somewhere protected, not on the couch, not on the kitchen counter, and never in the car.
Don’t Share Work Laptops with Family
At home, good intentions can still lead to accidental clicks. Even a quick “just checking something” can result in risky downloads, unfamiliar logins, or unwanted browser extensions.
Use a Strong Sign-In and MFA
Use a long passphrase, not a clever but short password, and never reuse it across accounts. Treat multifactor authentication (MFA) as a baseline requirement, not a nice extra.
Stop Using Devices That Can’t Update
If a laptop can’t receive security updates, it’s not a work device. It’s a risk.
Patch Fast
Updates are where most known issues get fixed. The longer you wait, the bigger the risk. Enable automatic updates and restart when prompted.
Secure Home Wi-Fi Like it’s Part of the Office
Use a strong Wi-Fi password and enable modern encryption. If your router still has the default admin login or hasn’t been updated in a long time, consider that your cue to fix it.
Use the Firewall and Keep Security Tools Switched On
Turn on your firewall, keep antivirus software active, and make sure both are properly configured. If security tools feel inconvenient, don’t switch them off, address the friction instead.
Remove Unnecessary Software
The more apps you install, the more updates you have to manage, and the more opportunities there are for something to go wrong. Remove software you don’t need, disable unnecessary default features, and stick to approved applications from trusted sources.
Keep Work Data in Work Storage
Storing work data in approved systems keeps access controlled, audit-ready, and much easier to recover if something goes wrong. Avoid saving work documents to personal cloud accounts or personal backup services.
Be Wary of Unexpected Links and Attachments
If a message pressures you to click, open, download, or “confirm now,” treat it as suspicious. When in doubt, verify the request through a separate, trusted channel before taking any action.
Only Allow Access From “Healthy Devices”
The safest remote setups gate access based on device health. Microsoft warns that unmanaged devices can be a powerful entry point and stresses the importance of allowing access only from healthy devices.
Are Your Laptops “Home-Proof”?
If you want remote work to remain seamless, your devices need to be “home-proof” by default.
That means treating the fundamentals as non-negotiable: automatic screen locks, secure storage, protected sign-ins, timely updates, properly secured Wi-Fi, and work data stored only in approved locations.
Nothing complicated, just consistent execution.
Start by adopting this remote work security checklist as your baseline standard. When the defaults are strong, you reduce avoidable incidents without slowing anyone down.
If you’d like help turning these basics into a practical, enforceable remote work policy, contact us today. We’ll help you standardise protections across your team so remote work stays productive, and secure.
More from our blog

3. A credibility wrapper: “assessment”, “interview pack”, or “onboarding”
Airswift flags link/attachment requests and urgency tactics as common red flags. The story is usually something like: “Download this assessment,” “Review these onboarding steps,” or “Log in here to schedule.” Tag Apps Make decisions visible and repeatable by tagging apps. Microsoft explicitly calls tagging apps as sanctioned or unsanctioned an important step, because it lets you filter, track progress, and drive consistent action over time. 4. The pivot: money, sensitive info, or account takeover Scammers impersonate well-known companies and then ask for things legitimate employers typically don’t: payment for “equipment” or early requests for personal information. Another variation is more subtle: “verification” steps that are really designed to steal identity details or compromise accounts. 5. Pressure to keep moving If someone hesitates, the scam leans on urgency: “limited slots,” “fast-track hiring,” “complete this today.” That’s why Forbes frames the key skill as slowing down and checking details, because the scam depends on momentum. Red Flags Checklist for Staff Here are the red flags to look out for. Red flags in the job posting The role is oddly vague or overly broad. Generic responsibilities, unclear reporting lines, and “we’ll share details later” language are common in fake listings. The company's presence doesn’t match the brand name. Thin company pages, inconsistent logos/branding, or a web presence that feels incomplete are worth pausing on. The process is “too easy, too fast.” If the listing implies immediate hiring with minimal steps, treat it as suspicious. Red flags in recruiter behaviour They push you off LinkedIn quickly. Moving to WhatsApp/Telegram or personal email early is a common tactic. They use a personal email address or unusual contact details. Be specifically cautious of recruiters using free webmail accounts instead of a company domain. They avoid verification. If they dodge basic questions, treat that as a signal, not a scheduling issue Hard-stop requests Any request for money or fees. Application fees, equipment purchases, “training costs”, gift cards, crypto, that’s a hard stop. Requests for sensitive personal info early. Bank details, identity documents, tax forms, or “background checks” before a real interview process is established. Requests for verification codes. If anyone asks you to read back a one-time code sent to your phone/email, assume they’re trying to take over an account. Requests for non-public company information like org charts, internal system details, client lists, invoice processes and security tools. Look out for requisitions for anything beyond what a recruiter would reasonably need. Stop Scams With Simple Defaults LinkedIn recruitment scams don’t succeed because staff are careless. They succeed because the outreach looks normal, the process feels familiar, and the next step is always framed as urgent. The fix isn’t turning everyone into an investigator. It’s setting simple defaults that make scams harder to complete: slow down before clicking, verify the recruiter and role through official channels, keep conversations on-platform until identity checks out, and treat money requests, code requests, and early personal data demands as hard stops. When those habits are standardised, the scam loses its leverage.