Security
How to protect client data working from cafes
Published · About 5 minutes
I like coffee shop white noise and awkward muffins as much as the next freelancer, yet public Wi‑Fi is not a vibes problem. It is a trust contract problem. Borrowing someone else's router to touch client spreadsheets is like hosting a HIPAA folder on a karaoke machine mic. You cannot cute your way past reckless packet exposure.
Realistic posture blends tech habits with honest scope management. Encrypt traffic, tighten logins, limit what lives locally, and confess when tethering beats optimism. Fancy threat models seldom matter compared to sloppy downloads plus unlocked screens wandering to the restroom.
The uncomfortable bit is that clients usually do not care where you work until something feels loose. Then every casual habit gets retroactively judged as policy. "I was just in a café for an hour" sounds normal to freelancers and reckless to a compliance person who has never billed from a tiny table next to a screaming espresso grinder. You need habits that make that conversation boring.
Start by dividing work into risk buckets. Reading a public blog draft is not the same as downloading customer exports. Scheduling social posts is not the same as opening payroll data. That distinction keeps security practical. You can enjoy café work without pretending every task belongs there.
Assume the network wants to babysit nothing
VPN usage should be automatic anytime you bounce off networks you cannot name. Tunneling outbound traffic does not make you immortal, yet it slashes casual snooping and keeps ISP grade meddling out of plaintext sessions. Combine with HTTPS everywhere instincts and suspicious attachment hygiene you already preach to relatives during holidays.
Do not join mystery networks because the café password is printed on a chalkboard and therefore feels official. Fake hotspots thrive on that tiny trust shortcut. If the captive portal looks odd, if the network name has copycat punctuation, or if your VPN refuses to connect cleanly, take the hint. When VPN fails or battery cries, tether from cellular data briefly instead of grinning through sketchy portals pretending SSL saves everything. Phones cost pennies relative to breached retainers evaporating politely.
Locks on accounts beat locks on backpacks
Hardware OTP keys help if you tote them thoughtfully. Hardware absent, app based MFA beats SMS games whenever possible because SIM swaps haunt busy independents juggling phone numbers casually. Separate browser profiles plus password managers isolate client workspaces from meme tabs that love extensions born yesterday.
Auto lock laptops aggressively. Peek aware seating matters: shoulder surfers love invoices with giant hourly rates waving like neon. Privacy screens annoy until someone behind you casually reads your backlog board naming clients publicly. Keep downloaded files scarce, clear local copies when a project ends, and stop letting desktop screenshots become an accidental client archive. Cloud tools are not magic, but they are easier to revoke than a forgotten folder on a travel laptop.
Talk plainly with clients about limits
NDAs rarely ban honest conversation about where work happens. If contracts forbid public network access, budget coworking or home hours for those files instead of gambling quietly. Document internal rules for yourself: which repositories never leave VPN, which documents stay cloud only with device encryption enabled.
Your rulebook can fit on one note: VPN on by default, MFA everywhere, client work in a dedicated browser profile, screen locked before standing, sensitive downloads avoided in public, tethering used for finance or production access. That is not spycraft. It is professional housekeeping for people whose office changes with rent, travel, weather, and coffee quality.
Auditing yourself beats apologizing reactively during incident calls nobody budgets time for politely. Freelancers sell reliability; flaky security storytelling erodes referrals faster than a single late deliverable forgiven once. VPN picks live on our VPN and security roundup reviewing tools that survived my own obsessive café testing seasons.