How to effectively share household devices

August 2024 Smart Home Automation, Information Security


Anna Collard

It is a familiar scene in South Africa: multiple household members sharing a single device. Due to social and economic challenges, many parents cannot afford to provide each child with a cell phone, tablet, or computer, leading to the eight hours per day online, making device sharing among family members commonplace. However, what are the potential drawbacks and dangers associated with this extensive device use and sharing among parents and siblings?

To navigate this issue successfully, Anna Collard, SVP Content Strategy and Evangelist at KnowBe4 Africa, urges the importance of establishing clear boundaries to prevent conflicts.

“Create a family agreement where you set up some clear guidelines for technology use,” she says. “You should establish rules for when and how long each family member can use the device and what for.” A great site with helpful resources and a family agreement template can be found at Childnet.

Collard recommends having set times for device usage. “Remember, children often need access to screens to do their homework, so this needs to be given a separate time allocation from leisure screen time, such as watching TV or gaming.” Certain times, like mealtimes and other family connection times, should be device-free.

Devices should also be put away at night. “By designating a central location for charging devices overnight, you ensure devices are charged for the next day, and it also encourages unplugging before bedtime.”

Ensure strong privacy settings

If devices are shared, it is paramount to create some virtual boundaries. “Ensure that each user has their own account and understands privacy settings,” advises Collard. “For example, personal email accounts, social media profiles and cloud storage should be separate.”

The importance of individual user profiles for each family member is to keep personal data, documents, and settings separate and secure. “Each profile should require a password that only the owner knows; parents should know the passwords of their younger kids,” she comments. “Use parental control features to restrict access to inappropriate content and to manage screen time and app usage. This not only protects children but also helps to reinforce the family’s screen-time rules.”

Collard recommends regularly going through apps and privacy settings with your children. “This is a good opportunity to discuss what these apps and settings do and why privacy is crucial,” she says. “Monitor the device’s browsing history to ensure that children adhere to the agreed-upon rules and do not engage with harmful content.”

Keep cybersecurity top of mind

For online safety, update software on shared devices as often as possible. “Regularly update operating systems, apps, and security software to protect against vulnerabilities,” urges Collard. She also suggests speaking to your children about recognising scams and the risks of clicking on unknown links.

“Make rules regarding the downloading and purchasing of apps,” she advises. “Children should get permission before downloading any new app or making in-app purchases to prevent unintended expenses and the installation of potentially unsafe apps.”

Other suggestions to improve cybersecurity include making sure parents log out of their profiles before sharing a device with their kids. “When watching a streaming service, parents should ensure their children are accessing it using their profile to avoid exposure to inappropriate content.”

She also recommends securing your home Wi-Fi network with a strong password and to limit the use of the administrator’s account. Only parents should have access to the administrator account, never kids. This will prevent access to inappropriate content, sites, or them installing malware that might overwrite all your files and gain access to your accounts.”

Enable multi-factor authentication (MFA) for online accounts as an extra precaution. “This will add another layer of security even if someone else has access to saved passwords on shared devices,” she says.

Finally, it is important to have honest and open communication with everyone in the family. “Discuss and review the agreement on screen time regularly, as well as the importance of digital safety,” Collard concludes. “If something goes wrong, children need to tell their parents. In turn, parents should model the online behaviour they expect from their kids, from maintaining privacy and security practices to being respectful digital citizens.”




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
The role of safe storage in mitigating burglary and fire risk
Smart Home Automation Fire & Safety
Household burglary and fire remain amongst the most common threats to household assets in South Africa. Statistics South Africa’s 2024 Victims of Crime Survey reported approximately 1,5 million incidents of housebreaking in a single year.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
GenAI fraud forcing banks to shift from identity to intent
AI & Data Analytics Information Security Financial (Industry)
The complexity and velocity of modern fraud schemes, from deepfakes to fraud and scams involving social engineering, demand more than just investment in new tools; they need adaptability and expanding the security net.

Read more...
Cyber attack surface expanding
Asset Management Information Security Logistics (Industry)
Despite the increasing number of attacks, analysis of Allianz Commercial cyber claims shows that severity is down by 50% and large-claim frequency by 30% in H1 2025, driven by larger companies’ enhanced detection and response capabilities.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.