Security
Why café Wi‑Fi is a freelancer risk (and what to do)
Published · About 4 minutes
Public Wi-Fi is convenient, cheap, and exactly the kind of thing freelancers learn to depend on until it bites. Café work feels harmless because everyone around you is editing slides, scrolling, or pretending the tiny table counts as ergonomic. But the network does not become trustworthy because the cappuccino has latte art. You are still borrowing a router you do not control while touching client accounts, files, messages, and sometimes money.
The real risk is not a movie hacker in a corner hoodie targeting your invoice PDF by name. It is boring exposure: spoofed hotspots, sloppy captive portals, local snooping, weak router settings, and rushed freelancers clicking through warnings because a deadline is louder than caution. Security failures often start with one tiny "it is probably fine" decision repeated until it becomes a habit.
That habit matters because freelance work blends personal and client systems on the same machine. One morning can include email, bank logins, shared drives, proposal drafts, analytics, password resets, and private Slack channels. Café Wi‑Fi does not know which tab matters. It just sees a tired person trying to finish the day.
Good security keeps that ordinary morning from turning into a weird client call you never wanted.
VPN adds encryption to untrusted networks
A reputable VPN tunnels traffic so neighbors on the same router see far less. Pair it with HTTPS everywhere and MFA on email, banking, and cloud workspaces so stolen passwords alone are not enough. The VPN is not a force field, but it is a sensible default when your office can be any SSID with a pastry case nearby.
Turn it on before opening client tools, not after you have already logged into the finance portal. Auto-connect settings help because willpower is a weak security policy, especially when the barista is calling your name and the client is asking for a file "real quick." Test the VPN on your usual café, phone, and travel networks so you know how it behaves before a nervous production fix depends on it.
Also remember what a VPN does not solve. It will not save you from phishing, reused passwords, malware, or uploading the wrong spreadsheet to the wrong client folder. It mainly protects traffic across networks you do not trust. That is useful, but the rest of the stack still has to behave like grown-up business infrastructure.
Phones can tether when stakes are high
Phone tethering is not perfect, but it avoids sketchy captive portals when you need sensitive access. I would rather burn mobile data for ten minutes than argue with a fake hotspot while moving money, accessing production, or downloading confidential client assets.
Use tethering for the moments that would be painful to explain later: banking, tax portals, password resets, admin consoles, unreleased campaigns, customer exports, and anything governed by a strict contract. If your mobile plan is stingy, save it for those windows. If you travel often, budget for enough data to make safe choices easier. Security habits collapse quickly when every safer option feels like a luxury.
Teach clients you take hygiene seriously
Mentioning baseline practices signals maturity without fearmongering. Security competence quietly reinforces trust. You do not need to brag about your VPN in every proposal, but you can mention sensible habits during onboarding when a client handles sensitive material: encrypted devices, password manager, MFA, VPN on public networks, and no casual local copies of files that belong in approved cloud storage.
The point is not to sound paranoid. The point is to remove doubt before it forms. Freelancers are often judged by invisible process. A client may never see your network habits, but they absolutely feel the difference between someone who treats security as part of delivery and someone who improvises after getting nervous.
Compare VPN options including NordVPN, ExpressVPN, and Surfshark. Pick the one you will actually leave on during messy workdays, because a perfect security tool you disable under pressure is just branding.