Zero Data RetentionQuantum-Ready Entropy256-bit MinimumClient-Side OnlyPost-Quantum ReadyZero KnowledgeNIST SP 800-63BFIPS 140-3 AlignedNo Account NeededDoD CompliantZero Data RetentionQuantum-Ready Entropy256-bit MinimumClient-Side OnlyPost-Quantum ReadyZero KnowledgeNIST SP 800-63BFIPS 140-3 AlignedNo Account NeededDoD Compliant
Remote Work11 min readUpdated March 2025

Password Security for Remote Workers: VPN, Home Networks, and More

Remote work introduced new credential risks: home networks, personal devices, public WiFi, and blurred work/personal boundaries. This guide covers all of it.

The remote worker threat model

The office network, for all its imperfections, provided meaningful security guarantees: corporate firewall, managed devices, physical access controls, and IT staff who could respond to incidents. Remote work eliminates most of these. The threat model for a remote worker is fundamentally different from an office worker's:

  • Home networks are shared with family members, smart devices, gaming consoles, and other systems over which the corporate IT team has no visibility
  • Personal devices may have weaker security configurations, out-of-date software, and personal applications that are vectors for malware
  • Work sessions happen alongside personal sessions in the same browser, the same device, the same network — blurring the security boundary
  • Physical security is absent — shoulder surfing in cafes, shoulder surfing by family members, unattended unlocked screens
  • IT response time to a security incident is measured in hours or days, not minutes

The credential implications: every credential you use for work is more exposed when you work remotely than when you work in an office. The compensating controls are primarily authentication-based — stronger credentials, MFA, and clear separation between work and personal accounts.

Home network security

Your home router is the perimeter between your work traffic and the internet. Default configurations on most home routers are inadequate for work-from-home use:

  • Change the router admin password: The default admin credential for your router is the same as every other router of that model. If your router administration interface is accessible from your local network (it typically is), anyone on your network can access it with a Google search for the default password. Change it to a unique 20-character randomly generated password, stored in your password manager.
  • Update router firmware: Router firmware updates patch security vulnerabilities. Most routers don't auto-update. Check your router's admin interface for firmware updates annually at minimum.
  • Separate work from IoT devices: Smart TVs, cameras, thermostats, and other IoT devices often have poor security. A separate guest network or VLAN for IoT devices isolates them from your work devices.
  • Use WPA3 if available: If your router supports WPA3, enable it for your primary network. If not, WPA2-AES is acceptable; WEP and WPA are not.
  • Strong WiFi password: The password for your work WiFi network should be a minimum 20-character randomly generated string, not YourAddress2024!.

Personal devices for work (BYOD)

Using personal devices for work (BYOD — Bring Your Own Device) is common in remote work but creates credential risks that office environments don't have:

  • Browser profiles: Use a separate browser profile (or a separate browser) for work. This prevents personal browser extensions from accessing work sessions, and prevents work cookies and sessions from being exposed if you visit a malicious site during personal browsing.
  • Keep OS and software updated: Personal devices that accumulate updates are a common attack vector. Enable automatic OS updates.
  • Device encryption: Enable full-disk encryption. On macOS, this is FileVault (System Preferences → Security & Privacy). On Windows, BitLocker. If the device is stolen, encryption prevents access to stored credentials and documents.
  • Screen lock: Auto-lock after 5 minutes of inactivity. This is especially important in shared spaces or when you have family members around.
  • Antivirus: On Windows, Windows Defender is adequate for most users. On macOS, the built-in XProtect combined with careful behaviour is sufficient — expensive commercial AV products add little on modern macOS.

Public WiFi and coffee shops

Public WiFi networks — cafes, airports, hotels, co-working spaces — should be treated as hostile networks for work purposes. Specific risks:

  • Evil twin attacks: An attacker sets up a WiFi network named "Starbucks WiFi" or "Airport Free WiFi" that proxies traffic — allowing credential interception on non-HTTPS connections and session hijacking on poorly implemented HTTPS sites.
  • Network sniffing: On unencrypted or weakly encrypted public networks, traffic can be observed by other network participants.
  • Physical shoulder surfing: In busy public spaces, screens are visible to people behind and beside you. Password fields, MFA codes, and sensitive documents can be observed directly.

The mitigation: always use a VPN when on public WiFi. Your employer should provide one. If they don't, a personal VPN (Mullvad, ProtonVPN) is adequate for personal threat models — though it does not provide the network access controls of a corporate VPN. A cellular hotspot (personal hotspot from your phone) is preferable to public WiFi for sensitive work.

VPN authentication

Corporate VPNs are primary targets for credential attacks — a compromised VPN credential gives an attacker direct access to the internal network from anywhere in the world. VPN authentication deserves heightened security compared to other credentials:

  • Your VPN password should be unique, long (≥ 20 characters), and stored in your password manager — never reused anywhere else
  • MFA must be enabled for VPN access — if your employer hasn't required it, ask IT to enable it
  • TOTP authenticator app or hardware key for VPN MFA — SMS OTP is the weakest acceptable option
  • Never share VPN credentials with family members or give someone else access to your VPN session — your credentials are tied to your identity and audited
  • Report immediately if you suspect your VPN credentials have been compromised — VPN credential compromise is a major incident, not a minor issue

Shared home devices

Working from home in a household with other adults or children creates credential risks that single-occupant offices don't have:

  • Separate user accounts: If family members use your work computer, they should have their own user account — not access under your account. This prevents accidental access to work systems and credential exposure.
  • Lock before walking away: Develop the habit of locking (Win+L or Cmd+Ctrl+Q on macOS) whenever you leave the keyboard — even to answer the door or get coffee.
  • Password manager master password: Your password manager's master password should be something you have memorised and that family members (especially children) do not know. Consider using a passphrase that you don't write down anywhere in the home.
  • Work documents and shared folders: Don't save work documents to shared family cloud storage (family Google Drive, Dropbox). Keep work documents in employer-provided or dedicated work storage.

Video conferencing credentials

Video conferencing accounts — Zoom, Teams, Google Meet, Webex — are a frequently underestimated credential risk. A compromised Zoom account can expose private meetings, recorded calls, and in some enterprise configurations, access to shared content and directories:

  • Use a unique, strong password for your video conferencing account — separate from your corporate SSO where possible
  • Enable MFA on your Zoom or conferencing account if not enforced by your employer's SSO
  • Use waiting rooms for all meetings — this prevents uninvited participants from joining if a meeting link is shared
  • Don't post meeting links publicly — especially for recurring meetings with consistent links
  • Log out of video conferencing apps when not in use, particularly on devices shared with family members

Password manager for remote work

A password manager is the central tool for remote work credential security. The specific remote work benefits:

  • Unique passwords for every system without memorisation burden — enabling the unique-credential requirement without cognitive overload
  • Works across all devices — desktop, laptop, mobile — ensuring you have access to credentials when working from different locations
  • Auto-fill reduces the risk of accidentally typing credentials into phishing sites (the password manager recognises the correct domain and won't fill on lookalike sites)
  • Encrypted vault — if your device is lost or stolen, credentials are not exposed as plaintext

For remote workers: 1Password ($2.99/month individual, $4/user for teams) or Bitwarden (free individual plan) are the standard choices. If your employer provides a password manager, use it — and use a separate personal password manager for personal accounts to maintain separation.

Meeting your employer's expectations

Most employers have remote work security policies. Beyond the technical controls, the credential-specific obligations typically are:

  • Don't share credentials with household members even for "just a minute"
  • Report any suspected credential compromise to IT Security immediately — delays allow attackers more time in the network
  • Use only employer-approved tools for work communication — personal WhatsApp for sensitive business communication is typically a policy violation
  • Don't store work credentials in your personal password manager if your employer has a provided tool — this creates a separation between personal and corporate credential stores that your employer may require
  • Complete required security training — remote work expands the attack surface, and most employer training covers the specific risks introduced by home environments

Frequently asked questions

What password security practices should remote workers follow?

Remote workers should: use a password manager with unique credentials for every account, enable MFA on all work accounts (email, VPN, cloud tools), never work from public WiFi without a VPN, keep home router firmware updated, and follow company policy on approved tools for credential sharing.

Is home WiFi safe enough for remote work?

Home WiFi is significantly less secure than a managed corporate network. Use WPA3 if your router supports it, use a strong unique password for the router admin interface (not the default), keep firmware updated, and enable VPN for any work involving sensitive client or company data. Segregate work devices from IoT/smart home devices on a separate WiFi network.

What should remote workers do about shared devices?

Personal computers used for work should have separate browser profiles for work and personal use, a password manager installed with work credentials in a separate vault, automatic screen lock after 5 minutes of inactivity, and full-disk encryption enabled (FileVault on Mac, BitLocker on Windows).

How should remote workers share credentials with colleagues?

Never share credentials via Slack, WhatsApp, email, or SMS — all of these leave permanent records. Use a team password manager vault for ongoing shared access. For one-time credential handoffs, use PassGeni's Secure Share tool, which creates an AES-256 encrypted link that expires after one view.

What is the biggest password security risk for remote workers?

Phishing attacks targeting remote workers are the leading threat. Attackers impersonate IT support, VPN providers, and cloud tool vendors to harvest credentials. MFA prevents account takeover even when credentials are phished. FIDO2 hardware keys provide complete phishing resistance for critical accounts.

Does remote work require different passwords than office work?

The passwords themselves don't change, but the access context matters. Remote workers should expect additional authentication challenges (MFA prompts, conditional access policies) when connecting from new locations or devices. This is normal and a security feature, not a bug.

How do I set up a VPN correctly for remote work?

Use your company-provided VPN rather than a consumer VPN service for work access. Enable VPN automatically for work applications (split tunneling). Your VPN credentials should be strong and unique — not the same as any other work account. MFA on VPN access is strongly recommended.

What should I do if I suspect my work credentials were phished?

Immediately notify your IT security team or help desk. Change your password right away even before they respond. If you have MFA enabled, check recent login activity for unauthorised access. If your work email credentials were compromised, change your password manager master password as well (attackers will use email access to reset other accounts).

How often should remote workers update their passwords?

Following NIST 800-63B guidance, passwords don't need to be changed on a fixed schedule. Change them immediately if you suspect compromise, if your account appears in a breach notification, or if you previously used the same password on a breached site. Use PassGeni's Breach Checker to verify your credentials periodically.

Are passkeys a good option for remote workers?

Passkeys are an excellent option where supported, as they eliminate phishing risk entirely. Many cloud tools (Google, Microsoft, GitHub) now support passkeys. For a remote worker, passkeys on your primary email and work cloud accounts provide significantly stronger protection than passwords plus SMS 2FA.

Related guides
← All guidesGenerate password →